gcloud kms keys versions import

gcloud kms keys versions import - import a version into an existing crypto key
gcloud kms keys versions import --algorithm=ALGORITHM --import-job=IMPORT_JOB [--key=KEY] [--keyring=KEYRING] [--location=LOCATION] [--public-key-file=PUBLIC_KEY_FILE] [--rsa-aes-wrapped-key-file=RSA_AES_WRAPPED_KEY_FILE] [--target-key-file=TARGET_KEY_FILE] [GCLOUD_WIDE_FLAG]
Imports wrapped key material into a new version within an existing crypto key following the import procedure documented at https://cloud.google.com/kms/docs/importing-a-key.
The algorithm to assign to the new key version. For more information about supported algorithms, see https://cloud.google.com/kms/docs/algorithms. ALGORITHM must be one of: ec-sign-p256-sha256, ec-sign-p384-sha384, google-symmetric-encryption, rsa-decrypt-oaep-2048-sha256, rsa-decrypt-oaep-3072-sha256, rsa-decrypt-oaep-4096-sha256, rsa-decrypt-oaep-4096-sha512, rsa-sign-pkcs1-2048-sha256, rsa-sign-pkcs1-3072-sha256, rsa-sign-pkcs1-4096-sha256, rsa-sign-pkcs1-4096-sha512, rsa-sign-pss-2048-sha256, rsa-sign-pss-3072-sha256, rsa-sign-pss-4096-sha256, rsa-sign-pss-4096-sha512.
Name of the import job to import from.
The containing key to import into.
Key ring of the key.
Location of the keyring.
Optional path to the public key of the ImportJob, used to wrap the key for import. If missing, the public key will be fetched on your behalf.
Path to the wrapped RSA AES key file to import.
Optional path to the unwrapped target key to import into a Cloud KMS key version. If specified, the key will be securely wrapped before transmission to Google.
These flags are available to all commands: --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.

Run $ gcloud help for details.

The following command will read the files 'path/to/ephemeral/key' and 'path/to/target/key' and use them to create a new version with algorithm 'google-symmetric-encryption' within the 'frodo' crypto key, 'fellowship' keyring, and 'us-central1' location using import job 'strider' to unwrap the provided key material.
  $ gcloud kms keys versions import --location=global \
       --keyring=fellowship \
       --key=frodo \
       --import-job=strider \
       --rsa-aes-wrapped-key-file=path/to/target/key \
These variants are also available:
  $ gcloud alpha kms keys versions import
  $ gcloud beta kms keys versions import