- NAME
-
- gcloud beta kms keys versions import - import a version into an existing crypto key
- SYNOPSIS
-
-
gcloud beta kms keys versions import
--algorithm
=ALGORITHM
--import-job
=IMPORT_JOB
[--key
=KEY
] [--keyring
=KEYRING
] [--location
=LOCATION
] [--public-key-file
=PUBLIC_KEY_FILE
] [--target-key-file
=TARGET_KEY_FILE
] [--version
=VERSION
] [--wrapped-key-file
=WRAPPED_KEY_FILE
] [GCLOUD_WIDE_FLAG …
]
-
- DESCRIPTION
-
(BETA)
Imports wrapped key material into a new version within an existing crypto key following the import procedure documented at https://cloud.google.com/kms/docs/importing-a-key. - EXAMPLES
-
The following command will read the files 'path/to/ephemeral/key' and
'path/to/target/key' and use them to create a new version with algorithm
'google-symmetric-encryption' within the 'frodo' crypto key, 'fellowship'
keyring, and 'us-central1' location using import job 'strider' to unwrap the
provided key material.
gcloud beta kms keys versions import --location=global --keyring=fellowship --key=frodo --import-job=strider --wrapped-key-file=path/to/target/key --algorithm=google-symmetric-encryption
- REQUIRED FLAGS
-
--algorithm
=ALGORITHM
-
The algorithm to assign to the new key version. For more information about
supported algorithms, see https://cloud.google.com/kms/docs/algorithms.
ALGORITHM
must be one of:aes-128-cbc
,aes-128-ctr
,aes-128-gcm
,aes-256-cbc
,aes-256-ctr
,aes-256-gcm
,ec-sign-ed25519
,ec-sign-p256-sha256
,ec-sign-p384-sha384
,ec-sign-secp256k1-sha256
,google-symmetric-encryption
,hmac-sha1
,hmac-sha224
,hmac-sha256
,hmac-sha384
,hmac-sha512
,rsa-decrypt-oaep-2048-sha1
,rsa-decrypt-oaep-2048-sha256
,rsa-decrypt-oaep-3072-sha1
,rsa-decrypt-oaep-3072-sha256
,rsa-decrypt-oaep-4096-sha1
,rsa-decrypt-oaep-4096-sha256
,rsa-decrypt-oaep-4096-sha512
,rsa-sign-pkcs1-2048-sha256
,rsa-sign-pkcs1-3072-sha256
,rsa-sign-pkcs1-4096-sha256
,rsa-sign-pkcs1-4096-sha512
,rsa-sign-pss-2048-sha256
,rsa-sign-pss-3072-sha256
,rsa-sign-pss-4096-sha256
,rsa-sign-pss-4096-sha512
,rsa-sign-raw-pkcs1-2048
,rsa-sign-raw-pkcs1-3072
,rsa-sign-raw-pkcs1-4096
. --import-job
=IMPORT_JOB
- Name of the import job to import from.
- OPTIONAL FLAGS
-
--key
=KEY
- The containing key to import into.
--keyring
=KEYRING
- Key ring of the key.
--location
=LOCATION
- Location of the keyring.
--public-key-file
=PUBLIC_KEY_FILE
- Path to the public key of the ImportJob, used to wrap the key for import. If missing, the public key will be fetched on your behalf.
--target-key-file
=TARGET_KEY_FILE
- Path to the unwrapped target key to import into a Cloud KMS key version. If specified, the key will be securely wrapped before transmission to Google.
--version
=VERSION
- Version to re-import into. Omit this field for first-time import.
--wrapped-key-file
=WRAPPED_KEY_FILE
- Path to the RSA/RSA+AES wrapped key file to import.
- GCLOUD WIDE FLAGS
-
These flags are available to all commands:
--access-token-file
,--account
,--billing-project
,--configuration
,--flags-file
,--flatten
,--format
,--help
,--impersonate-service-account
,--log-http
,--project
,--quiet
,--trace-token
,--user-output-enabled
,--verbosity
.Run
$ gcloud help
for details. - NOTES
-
This command is currently in beta and might change without notice. These
variants are also available:
gcloud kms keys versions import
gcloud alpha kms keys versions import
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2024-05-14 UTC.