Google Cloud Native is in preview. Google Cloud Classic is fully supported.
google-native.cloudkms/v1.ImportJob
Explore with Pulumi AI
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Create a new ImportJob within a KeyRing. ImportJob.import_method is required. Note - this resource’s API doesn’t support deletion. When deleted, the resource will persist on Google Cloud even though it will be deleted from Pulumi state.
Create ImportJob Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ImportJob(name: string, args: ImportJobArgs, opts?: CustomResourceOptions);@overload
def ImportJob(resource_name: str,
              args: ImportJobArgs,
              opts: Optional[ResourceOptions] = None)
@overload
def ImportJob(resource_name: str,
              opts: Optional[ResourceOptions] = None,
              import_method: Optional[ImportJobImportMethod] = None,
              key_ring_id: Optional[str] = None,
              protection_level: Optional[ImportJobProtectionLevel] = None,
              import_job_id: Optional[str] = None,
              location: Optional[str] = None,
              project: Optional[str] = None)func NewImportJob(ctx *Context, name string, args ImportJobArgs, opts ...ResourceOption) (*ImportJob, error)public ImportJob(string name, ImportJobArgs args, CustomResourceOptions? opts = null)
public ImportJob(String name, ImportJobArgs args)
public ImportJob(String name, ImportJobArgs args, CustomResourceOptions options)
type: google-native:cloudkms/v1:ImportJob
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ImportJobArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ImportJobArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ImportJobArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ImportJobArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ImportJobArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var importJobResource = new GoogleNative.Cloudkms.V1.ImportJob("importJobResource", new()
{
    ImportMethod = GoogleNative.Cloudkms.V1.ImportJobImportMethod.ImportMethodUnspecified,
    KeyRingId = "string",
    ProtectionLevel = GoogleNative.Cloudkms.V1.ImportJobProtectionLevel.ProtectionLevelUnspecified,
    ImportJobId = "string",
    Location = "string",
    Project = "string",
});
example, err := cloudkms.NewImportJob(ctx, "importJobResource", &cloudkms.ImportJobArgs{
	ImportMethod:    cloudkms.ImportJobImportMethodImportMethodUnspecified,
	KeyRingId:       pulumi.String("string"),
	ProtectionLevel: cloudkms.ImportJobProtectionLevelProtectionLevelUnspecified,
	ImportJobId:     pulumi.String("string"),
	Location:        pulumi.String("string"),
	Project:         pulumi.String("string"),
})
var importJobResource = new ImportJob("importJobResource", ImportJobArgs.builder()
    .importMethod("IMPORT_METHOD_UNSPECIFIED")
    .keyRingId("string")
    .protectionLevel("PROTECTION_LEVEL_UNSPECIFIED")
    .importJobId("string")
    .location("string")
    .project("string")
    .build());
import_job_resource = google_native.cloudkms.v1.ImportJob("importJobResource",
    import_method=google_native.cloudkms.v1.ImportJobImportMethod.IMPORT_METHOD_UNSPECIFIED,
    key_ring_id="string",
    protection_level=google_native.cloudkms.v1.ImportJobProtectionLevel.PROTECTION_LEVEL_UNSPECIFIED,
    import_job_id="string",
    location="string",
    project="string")
const importJobResource = new google_native.cloudkms.v1.ImportJob("importJobResource", {
    importMethod: google_native.cloudkms.v1.ImportJobImportMethod.ImportMethodUnspecified,
    keyRingId: "string",
    protectionLevel: google_native.cloudkms.v1.ImportJobProtectionLevel.ProtectionLevelUnspecified,
    importJobId: "string",
    location: "string",
    project: "string",
});
type: google-native:cloudkms/v1:ImportJob
properties:
    importJobId: string
    importMethod: IMPORT_METHOD_UNSPECIFIED
    keyRingId: string
    location: string
    project: string
    protectionLevel: PROTECTION_LEVEL_UNSPECIFIED
ImportJob Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ImportJob resource accepts the following input properties:
- ImportMethod Pulumi.Google Native. Cloudkms. V1. Import Job Import Method 
- Immutable. The wrapping method to be used for incoming key material.
- KeyRing stringId 
- ProtectionLevel Pulumi.Google Native. Cloudkms. V1. Import Job Protection Level 
- Immutable. The protection level of the ImportJob. This must match the protection_level of the version_template on the CryptoKey you attempt to import into.
- ImportJob stringId 
- Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63}
- Location string
- Project string
- ImportMethod ImportJob Import Method 
- Immutable. The wrapping method to be used for incoming key material.
- KeyRing stringId 
- ProtectionLevel ImportJob Protection Level 
- Immutable. The protection level of the ImportJob. This must match the protection_level of the version_template on the CryptoKey you attempt to import into.
- ImportJob stringId 
- Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63}
- Location string
- Project string
- importMethod ImportJob Import Method 
- Immutable. The wrapping method to be used for incoming key material.
- keyRing StringId 
- protectionLevel ImportJob Protection Level 
- Immutable. The protection level of the ImportJob. This must match the protection_level of the version_template on the CryptoKey you attempt to import into.
- importJob StringId 
- Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63}
- location String
- project String
- importMethod ImportJob Import Method 
- Immutable. The wrapping method to be used for incoming key material.
- keyRing stringId 
- protectionLevel ImportJob Protection Level 
- Immutable. The protection level of the ImportJob. This must match the protection_level of the version_template on the CryptoKey you attempt to import into.
- importJob stringId 
- Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63}
- location string
- project string
- import_method ImportJob Import Method 
- Immutable. The wrapping method to be used for incoming key material.
- key_ring_ strid 
- protection_level ImportJob Protection Level 
- Immutable. The protection level of the ImportJob. This must match the protection_level of the version_template on the CryptoKey you attempt to import into.
- import_job_ strid 
- Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63}
- location str
- project str
- importMethod "IMPORT_METHOD_UNSPECIFIED" | "RSA_OAEP_3072_SHA1_AES_256" | "RSA_OAEP_4096_SHA1_AES_256" | "RSA_OAEP_3072_SHA256_AES_256" | "RSA_OAEP_4096_SHA256_AES_256" | "RSA_OAEP_3072_SHA256" | "RSA_OAEP_4096_SHA256"
- Immutable. The wrapping method to be used for incoming key material.
- keyRing StringId 
- protectionLevel "PROTECTION_LEVEL_UNSPECIFIED" | "SOFTWARE" | "HSM" | "EXTERNAL" | "EXTERNAL_VPC"
- Immutable. The protection level of the ImportJob. This must match the protection_level of the version_template on the CryptoKey you attempt to import into.
- importJob StringId 
- Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63}
- location String
- project String
Outputs
All input properties are implicitly available as output properties. Additionally, the ImportJob resource produces the following output properties:
- Attestation
Pulumi.Google Native. Cloudkms. V1. Outputs. Key Operation Attestation Response 
- Statement that was generated and signed by the key creator (for example, an HSM) at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only present if the chosen ImportMethod is one with a protection level of HSM.
- CreateTime string
- The time at which this ImportJob was created.
- ExpireEvent stringTime 
- The time this ImportJob expired. Only present if state is EXPIRED.
- ExpireTime string
- The time at which this ImportJob is scheduled for expiration and can no longer be used to import key material.
- GenerateTime string
- The time this ImportJob's key material was generated.
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The resource name for this ImportJob in the format projects/*/locations/*/keyRings/*/importJobs/*.
- PublicKey Pulumi.Google Native. Cloudkms. V1. Outputs. Wrapping Public Key Response 
- The public key with which to wrap key material prior to import. Only returned if state is ACTIVE.
- State string
- The current state of the ImportJob, indicating if it can be used.
- Attestation
KeyOperation Attestation Response 
- Statement that was generated and signed by the key creator (for example, an HSM) at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only present if the chosen ImportMethod is one with a protection level of HSM.
- CreateTime string
- The time at which this ImportJob was created.
- ExpireEvent stringTime 
- The time this ImportJob expired. Only present if state is EXPIRED.
- ExpireTime string
- The time at which this ImportJob is scheduled for expiration and can no longer be used to import key material.
- GenerateTime string
- The time this ImportJob's key material was generated.
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The resource name for this ImportJob in the format projects/*/locations/*/keyRings/*/importJobs/*.
- PublicKey WrappingPublic Key Response 
- The public key with which to wrap key material prior to import. Only returned if state is ACTIVE.
- State string
- The current state of the ImportJob, indicating if it can be used.
- attestation
KeyOperation Attestation Response 
- Statement that was generated and signed by the key creator (for example, an HSM) at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only present if the chosen ImportMethod is one with a protection level of HSM.
- createTime String
- The time at which this ImportJob was created.
- expireEvent StringTime 
- The time this ImportJob expired. Only present if state is EXPIRED.
- expireTime String
- The time at which this ImportJob is scheduled for expiration and can no longer be used to import key material.
- generateTime String
- The time this ImportJob's key material was generated.
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The resource name for this ImportJob in the format projects/*/locations/*/keyRings/*/importJobs/*.
- publicKey WrappingPublic Key Response 
- The public key with which to wrap key material prior to import. Only returned if state is ACTIVE.
- state String
- The current state of the ImportJob, indicating if it can be used.
- attestation
KeyOperation Attestation Response 
- Statement that was generated and signed by the key creator (for example, an HSM) at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only present if the chosen ImportMethod is one with a protection level of HSM.
- createTime string
- The time at which this ImportJob was created.
- expireEvent stringTime 
- The time this ImportJob expired. Only present if state is EXPIRED.
- expireTime string
- The time at which this ImportJob is scheduled for expiration and can no longer be used to import key material.
- generateTime string
- The time this ImportJob's key material was generated.
- id string
- The provider-assigned unique ID for this managed resource.
- name string
- The resource name for this ImportJob in the format projects/*/locations/*/keyRings/*/importJobs/*.
- publicKey WrappingPublic Key Response 
- The public key with which to wrap key material prior to import. Only returned if state is ACTIVE.
- state string
- The current state of the ImportJob, indicating if it can be used.
- attestation
KeyOperation Attestation Response 
- Statement that was generated and signed by the key creator (for example, an HSM) at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only present if the chosen ImportMethod is one with a protection level of HSM.
- create_time str
- The time at which this ImportJob was created.
- expire_event_ strtime 
- The time this ImportJob expired. Only present if state is EXPIRED.
- expire_time str
- The time at which this ImportJob is scheduled for expiration and can no longer be used to import key material.
- generate_time str
- The time this ImportJob's key material was generated.
- id str
- The provider-assigned unique ID for this managed resource.
- name str
- The resource name for this ImportJob in the format projects/*/locations/*/keyRings/*/importJobs/*.
- public_key WrappingPublic Key Response 
- The public key with which to wrap key material prior to import. Only returned if state is ACTIVE.
- state str
- The current state of the ImportJob, indicating if it can be used.
- attestation Property Map
- Statement that was generated and signed by the key creator (for example, an HSM) at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only present if the chosen ImportMethod is one with a protection level of HSM.
- createTime String
- The time at which this ImportJob was created.
- expireEvent StringTime 
- The time this ImportJob expired. Only present if state is EXPIRED.
- expireTime String
- The time at which this ImportJob is scheduled for expiration and can no longer be used to import key material.
- generateTime String
- The time this ImportJob's key material was generated.
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The resource name for this ImportJob in the format projects/*/locations/*/keyRings/*/importJobs/*.
- publicKey Property Map
- The public key with which to wrap key material prior to import. Only returned if state is ACTIVE.
- state String
- The current state of the ImportJob, indicating if it can be used.
Supporting Types
CertificateChainsResponse, CertificateChainsResponseArgs      
- CaviumCerts List<string>
- Cavium certificate chain corresponding to the attestation.
- GoogleCard List<string>Certs 
- Google card certificate chain corresponding to the attestation.
- GooglePartition List<string>Certs 
- Google partition certificate chain corresponding to the attestation.
- CaviumCerts []string
- Cavium certificate chain corresponding to the attestation.
- GoogleCard []stringCerts 
- Google card certificate chain corresponding to the attestation.
- GooglePartition []stringCerts 
- Google partition certificate chain corresponding to the attestation.
- caviumCerts List<String>
- Cavium certificate chain corresponding to the attestation.
- googleCard List<String>Certs 
- Google card certificate chain corresponding to the attestation.
- googlePartition List<String>Certs 
- Google partition certificate chain corresponding to the attestation.
- caviumCerts string[]
- Cavium certificate chain corresponding to the attestation.
- googleCard string[]Certs 
- Google card certificate chain corresponding to the attestation.
- googlePartition string[]Certs 
- Google partition certificate chain corresponding to the attestation.
- cavium_certs Sequence[str]
- Cavium certificate chain corresponding to the attestation.
- google_card_ Sequence[str]certs 
- Google card certificate chain corresponding to the attestation.
- google_partition_ Sequence[str]certs 
- Google partition certificate chain corresponding to the attestation.
- caviumCerts List<String>
- Cavium certificate chain corresponding to the attestation.
- googleCard List<String>Certs 
- Google card certificate chain corresponding to the attestation.
- googlePartition List<String>Certs 
- Google partition certificate chain corresponding to the attestation.
ImportJobImportMethod, ImportJobImportMethodArgs        
- ImportMethod Unspecified 
- IMPORT_METHOD_UNSPECIFIEDNot specified.
- RsaOaep3072Sha1Aes256 
- RSA_OAEP_3072_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep4096Sha1Aes256 
- RSA_OAEP_4096_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep3072Sha256Aes256 
- RSA_OAEP_3072_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep4096Sha256Aes256 
- RSA_OAEP_4096_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep3072Sha256 
- RSA_OAEP_3072_SHA256This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- RsaOaep4096Sha256 
- RSA_OAEP_4096_SHA256This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- ImportJob Import Method Import Method Unspecified 
- IMPORT_METHOD_UNSPECIFIEDNot specified.
- ImportJob Import Method Rsa Oaep3072Sha1Aes256 
- RSA_OAEP_3072_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- ImportJob Import Method Rsa Oaep4096Sha1Aes256 
- RSA_OAEP_4096_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- ImportJob Import Method Rsa Oaep3072Sha256Aes256 
- RSA_OAEP_3072_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- ImportJob Import Method Rsa Oaep4096Sha256Aes256 
- RSA_OAEP_4096_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- ImportJob Import Method Rsa Oaep3072Sha256 
- RSA_OAEP_3072_SHA256This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- ImportJob Import Method Rsa Oaep4096Sha256 
- RSA_OAEP_4096_SHA256This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- ImportMethod Unspecified 
- IMPORT_METHOD_UNSPECIFIEDNot specified.
- RsaOaep3072Sha1Aes256 
- RSA_OAEP_3072_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep4096Sha1Aes256 
- RSA_OAEP_4096_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep3072Sha256Aes256 
- RSA_OAEP_3072_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep4096Sha256Aes256 
- RSA_OAEP_4096_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep3072Sha256 
- RSA_OAEP_3072_SHA256This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- RsaOaep4096Sha256 
- RSA_OAEP_4096_SHA256This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- ImportMethod Unspecified 
- IMPORT_METHOD_UNSPECIFIEDNot specified.
- RsaOaep3072Sha1Aes256 
- RSA_OAEP_3072_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep4096Sha1Aes256 
- RSA_OAEP_4096_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep3072Sha256Aes256 
- RSA_OAEP_3072_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep4096Sha256Aes256 
- RSA_OAEP_4096_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RsaOaep3072Sha256 
- RSA_OAEP_3072_SHA256This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- RsaOaep4096Sha256 
- RSA_OAEP_4096_SHA256This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- IMPORT_METHOD_UNSPECIFIED
- IMPORT_METHOD_UNSPECIFIEDNot specified.
- RSA_OAEP3072_SHA1_AES256
- RSA_OAEP_3072_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RSA_OAEP4096_SHA1_AES256
- RSA_OAEP_4096_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RSA_OAEP3072_SHA256_AES256
- RSA_OAEP_3072_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RSA_OAEP4096_SHA256_AES256
- RSA_OAEP_4096_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- RSA_OAEP3072_SHA256
- RSA_OAEP_3072_SHA256This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- RSA_OAEP4096_SHA256
- RSA_OAEP_4096_SHA256This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- "IMPORT_METHOD_UNSPECIFIED"
- IMPORT_METHOD_UNSPECIFIEDNot specified.
- "RSA_OAEP_3072_SHA1_AES_256"
- RSA_OAEP_3072_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- "RSA_OAEP_4096_SHA1_AES_256"
- RSA_OAEP_4096_SHA1_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- "RSA_OAEP_3072_SHA256_AES_256"
- RSA_OAEP_3072_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism.
- "RSA_OAEP_4096_SHA256_AES_256"
- RSA_OAEP_4096_SHA256_AES_256This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism.
- "RSA_OAEP_3072_SHA256"
- RSA_OAEP_3072_SHA256This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
- "RSA_OAEP_4096_SHA256"
- RSA_OAEP_4096_SHA256This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import.
ImportJobProtectionLevel, ImportJobProtectionLevelArgs        
- ProtectionLevel Unspecified 
- PROTECTION_LEVEL_UNSPECIFIEDNot specified.
- Software
- SOFTWARECrypto operations are performed in software.
- Hsm
- HSMCrypto operations are performed in a Hardware Security Module.
- External
- EXTERNALCrypto operations are performed by an external key manager.
- ExternalVpc 
- EXTERNAL_VPCCrypto operations are performed in an EKM-over-VPC backend.
- ImportJob Protection Level Protection Level Unspecified 
- PROTECTION_LEVEL_UNSPECIFIEDNot specified.
- ImportJob Protection Level Software 
- SOFTWARECrypto operations are performed in software.
- ImportJob Protection Level Hsm 
- HSMCrypto operations are performed in a Hardware Security Module.
- ImportJob Protection Level External 
- EXTERNALCrypto operations are performed by an external key manager.
- ImportJob Protection Level External Vpc 
- EXTERNAL_VPCCrypto operations are performed in an EKM-over-VPC backend.
- ProtectionLevel Unspecified 
- PROTECTION_LEVEL_UNSPECIFIEDNot specified.
- Software
- SOFTWARECrypto operations are performed in software.
- Hsm
- HSMCrypto operations are performed in a Hardware Security Module.
- External
- EXTERNALCrypto operations are performed by an external key manager.
- ExternalVpc 
- EXTERNAL_VPCCrypto operations are performed in an EKM-over-VPC backend.
- ProtectionLevel Unspecified 
- PROTECTION_LEVEL_UNSPECIFIEDNot specified.
- Software
- SOFTWARECrypto operations are performed in software.
- Hsm
- HSMCrypto operations are performed in a Hardware Security Module.
- External
- EXTERNALCrypto operations are performed by an external key manager.
- ExternalVpc 
- EXTERNAL_VPCCrypto operations are performed in an EKM-over-VPC backend.
- PROTECTION_LEVEL_UNSPECIFIED
- PROTECTION_LEVEL_UNSPECIFIEDNot specified.
- SOFTWARE
- SOFTWARECrypto operations are performed in software.
- HSM
- HSMCrypto operations are performed in a Hardware Security Module.
- EXTERNAL
- EXTERNALCrypto operations are performed by an external key manager.
- EXTERNAL_VPC
- EXTERNAL_VPCCrypto operations are performed in an EKM-over-VPC backend.
- "PROTECTION_LEVEL_UNSPECIFIED"
- PROTECTION_LEVEL_UNSPECIFIEDNot specified.
- "SOFTWARE"
- SOFTWARECrypto operations are performed in software.
- "HSM"
- HSMCrypto operations are performed in a Hardware Security Module.
- "EXTERNAL"
- EXTERNALCrypto operations are performed by an external key manager.
- "EXTERNAL_VPC"
- EXTERNAL_VPCCrypto operations are performed in an EKM-over-VPC backend.
KeyOperationAttestationResponse, KeyOperationAttestationResponseArgs        
- CertChains Pulumi.Google Native. Cloudkms. V1. Inputs. Certificate Chains Response 
- The certificate chains needed to validate the attestation
- Content string
- The attestation data provided by the HSM when the key operation was performed.
- Format string
- The format of the attestation data.
- CertChains CertificateChains Response 
- The certificate chains needed to validate the attestation
- Content string
- The attestation data provided by the HSM when the key operation was performed.
- Format string
- The format of the attestation data.
- certChains CertificateChains Response 
- The certificate chains needed to validate the attestation
- content String
- The attestation data provided by the HSM when the key operation was performed.
- format String
- The format of the attestation data.
- certChains CertificateChains Response 
- The certificate chains needed to validate the attestation
- content string
- The attestation data provided by the HSM when the key operation was performed.
- format string
- The format of the attestation data.
- cert_chains CertificateChains Response 
- The certificate chains needed to validate the attestation
- content str
- The attestation data provided by the HSM when the key operation was performed.
- format str
- The format of the attestation data.
- certChains Property Map
- The certificate chains needed to validate the attestation
- content String
- The attestation data provided by the HSM when the key operation was performed.
- format String
- The format of the attestation data.
WrappingPublicKeyResponse, WrappingPublicKeyResponseArgs        
- Pem string
- The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and [Textual Encoding of Subject Public Key Info] (https://tools.ietf.org/html/rfc7468#section-13).
- Pem string
- The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and [Textual Encoding of Subject Public Key Info] (https://tools.ietf.org/html/rfc7468#section-13).
- pem String
- The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and [Textual Encoding of Subject Public Key Info] (https://tools.ietf.org/html/rfc7468#section-13).
- pem string
- The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and [Textual Encoding of Subject Public Key Info] (https://tools.ietf.org/html/rfc7468#section-13).
- pem str
- The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and [Textual Encoding of Subject Public Key Info] (https://tools.ietf.org/html/rfc7468#section-13).
- pem String
- The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and [Textual Encoding of Subject Public Key Info] (https://tools.ietf.org/html/rfc7468#section-13).
Package Details
- Repository
- Google Cloud Native pulumi/pulumi-google-native
- License
- Apache-2.0
Google Cloud Native is in preview. Google Cloud Classic is fully supported.