Skip to main content

crypto_key_versions

Creates, updates, deletes, gets or lists a crypto_key_versions resource.

Overview

Namecrypto_key_versions
TypeResource
Idgoogle.cloudkms.crypto_key_versions

Fields

The following fields are returned by SELECT queries:

Successful response

NameDatatypeDescription
namestringOutput only. The resource name for this CryptoKeyVersion in the format projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*.
algorithmstringOutput only. The CryptoKeyVersionAlgorithm that this CryptoKeyVersion supports.
attestationobjectOutput only. Statement that was generated and signed by the HSM at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only provided for key versions with protection_level HSM. (id: KeyOperationAttestation)
createTimestring (google-datetime)Output only. The time at which this CryptoKeyVersion was created.
destroyEventTimestring (google-datetime)Output only. The time this CryptoKeyVersion's key material was destroyed. Only present if state is DESTROYED.
destroyTimestring (google-datetime)Output only. The time this CryptoKeyVersion's key material is scheduled for destruction. Only present if state is DESTROY_SCHEDULED.
externalDestructionFailureReasonstringOutput only. The root cause of the most recent external destruction failure. Only present if state is EXTERNAL_DESTRUCTION_FAILED.
externalProtectionLevelOptionsobjectExternalProtectionLevelOptions stores a group of additional fields for configuring a CryptoKeyVersion that are specific to the EXTERNAL protection level and EXTERNAL_VPC protection levels. (id: ExternalProtectionLevelOptions)
generateTimestring (google-datetime)Output only. The time this CryptoKeyVersion's key material was generated.
generationFailureReasonstringOutput only. The root cause of the most recent generation failure. Only present if state is GENERATION_FAILED.
importFailureReasonstringOutput only. The root cause of the most recent import failure. Only present if state is IMPORT_FAILED.
importJobstringOutput only. The name of the ImportJob used in the most recent import of this CryptoKeyVersion. Only present if the underlying key material was imported.
importTimestring (google-datetime)Output only. The time at which this CryptoKeyVersion's key material was most recently imported.
protectionLevelstringOutput only. The ProtectionLevel describing how crypto operations are performed with this CryptoKeyVersion.
reimportEligiblebooleanOutput only. Whether or not this key version is eligible for reimport, by being specified as a target in ImportCryptoKeyVersionRequest.crypto_key_version.
statestringThe current state of the CryptoKeyVersion.

Methods

The following methods are available for this resource:

NameAccessible byRequired ParamsOptional ParamsDescription
getselectprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdReturns metadata for a given CryptoKeyVersion.
listselectprojectsId, locationsId, keyRingsId, cryptoKeysIdpageSize, pageToken, view, filter, orderByLists CryptoKeyVersions.
createinsertprojectsId, locationsId, keyRingsId, cryptoKeysIdCreate a new CryptoKeyVersion in a CryptoKey. The server will assign the next sequential id. If unset, state will be set to ENABLED.
patchupdateprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdupdateMaskUpdate a CryptoKeyVersion's metadata. state may be changed between ENABLED and DISABLED using this method. See DestroyCryptoKeyVersion and RestoreCryptoKeyVersion to move between other states.
destroydeleteprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdSchedule a CryptoKeyVersion for destruction. Upon calling this method, CryptoKeyVersion.state will be set to DESTROY_SCHEDULED, and destroy_time will be set to the time destroy_scheduled_duration in the future. At that time, the state will automatically change to DESTROYED, and the key material will be irrevocably destroyed. Before the destroy_time is reached, RestoreCryptoKeyVersion may be called to reverse the process.
importexecprojectsId, locationsId, keyRingsId, cryptoKeysIdImport wrapped key material into a CryptoKeyVersion. All requests must specify a CryptoKey. If a CryptoKeyVersion is additionally specified in the request, key material will be reimported into that version. Otherwise, a new version will be created, and will be assigned the next sequential id within the CryptoKey.
restoreexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdRestore a CryptoKeyVersion in the DESTROY_SCHEDULED state. Upon restoration of the CryptoKeyVersion, state will be set to DISABLED, and destroy_time will be cleared.
raw_encryptexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdEncrypts data using portable cryptographic primitives. Most users should choose Encrypt and Decrypt rather than their raw counterparts. The CryptoKey.purpose must be RAW_ENCRYPT_DECRYPT.
raw_decryptexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdDecrypts data that was originally encrypted using a raw cryptographic mechanism. The CryptoKey.purpose must be RAW_ENCRYPT_DECRYPT.
asymmetric_signexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdSigns data using a CryptoKeyVersion with CryptoKey.purpose ASYMMETRIC_SIGN, producing a signature that can be verified with the public key retrieved from GetPublicKey.
asymmetric_decryptexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdDecrypts data that was encrypted with a public key retrieved from GetPublicKey corresponding to a CryptoKeyVersion with CryptoKey.purpose ASYMMETRIC_DECRYPT.
mac_signexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdSigns data using a CryptoKeyVersion with CryptoKey.purpose MAC, producing a tag that can be verified by another source with the same key.
mac_verifyexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdVerifies MAC tag using a CryptoKeyVersion with CryptoKey.purpose MAC, and returns a response that indicates whether or not the verification was successful.
decapsulateexecprojectsId, locationsId, keyRingsId, cryptoKeysId, cryptoKeyVersionsIdDecapsulates data that was encapsulated with a public key retrieved from GetPublicKey corresponding to a CryptoKeyVersion with CryptoKey.purpose KEY_ENCAPSULATION.

Parameters

Parameters can be passed in the WHERE clause of a query. Check the Methods section to see which parameters are required or optional for each operation.

NameDatatypeDescription
cryptoKeyVersionsIdstring
cryptoKeysIdstring
keyRingsIdstring
locationsIdstring
projectsIdstring
filterstring
orderBystring
pageSizeinteger (int32)
pageTokenstring
updateMaskstring (google-fieldmask)
viewstring

SELECT examples

Returns metadata for a given CryptoKeyVersion.

SELECT
name,
algorithm,
attestation,
createTime,
destroyEventTime,
destroyTime,
externalDestructionFailureReason,
externalProtectionLevelOptions,
generateTime,
generationFailureReason,
importFailureReason,
importJob,
importTime,
protectionLevel,
reimportEligible,
state
FROM google.cloudkms.crypto_key_versions
WHERE projectsId = '{{ projectsId }}' -- required
AND locationsId = '{{ locationsId }}' -- required
AND keyRingsId = '{{ keyRingsId }}' -- required
AND cryptoKeysId = '{{ cryptoKeysId }}' -- required
AND cryptoKeyVersionsId = '{{ cryptoKeyVersionsId }}' -- required;

INSERT examples

Create a new CryptoKeyVersion in a CryptoKey. The server will assign the next sequential id. If unset, state will be set to ENABLED.

INSERT INTO google.cloudkms.crypto_key_versions (
data__state,
data__externalProtectionLevelOptions,
projectsId,
locationsId,
keyRingsId,
cryptoKeysId
)
SELECT
'{{ state }}',
'{{ externalProtectionLevelOptions }}',
'{{ projectsId }}',
'{{ locationsId }}',
'{{ keyRingsId }}',
'{{ cryptoKeysId }}'
RETURNING
name,
algorithm,
attestation,
createTime,
destroyEventTime,
destroyTime,
externalDestructionFailureReason,
externalProtectionLevelOptions,
generateTime,
generationFailureReason,
importFailureReason,
importJob,
importTime,
protectionLevel,
reimportEligible,
state
;

UPDATE examples

Update a CryptoKeyVersion's metadata. state may be changed between ENABLED and DISABLED using this method. See DestroyCryptoKeyVersion and RestoreCryptoKeyVersion to move between other states.

UPDATE google.cloudkms.crypto_key_versions
SET
data__state = '{{ state }}',
data__externalProtectionLevelOptions = '{{ externalProtectionLevelOptions }}'
WHERE
projectsId = '{{ projectsId }}' --required
AND locationsId = '{{ locationsId }}' --required
AND keyRingsId = '{{ keyRingsId }}' --required
AND cryptoKeysId = '{{ cryptoKeysId }}' --required
AND cryptoKeyVersionsId = '{{ cryptoKeyVersionsId }}' --required
AND updateMask = '{{ updateMask}}'
RETURNING
name,
algorithm,
attestation,
createTime,
destroyEventTime,
destroyTime,
externalDestructionFailureReason,
externalProtectionLevelOptions,
generateTime,
generationFailureReason,
importFailureReason,
importJob,
importTime,
protectionLevel,
reimportEligible,
state;

DELETE examples

Schedule a CryptoKeyVersion for destruction. Upon calling this method, CryptoKeyVersion.state will be set to DESTROY_SCHEDULED, and destroy_time will be set to the time destroy_scheduled_duration in the future. At that time, the state will automatically change to DESTROYED, and the key material will be irrevocably destroyed. Before the destroy_time is reached, RestoreCryptoKeyVersion may be called to reverse the process.

DELETE FROM google.cloudkms.crypto_key_versions
WHERE projectsId = '{{ projectsId }}' --required
AND locationsId = '{{ locationsId }}' --required
AND keyRingsId = '{{ keyRingsId }}' --required
AND cryptoKeysId = '{{ cryptoKeysId }}' --required
AND cryptoKeyVersionsId = '{{ cryptoKeyVersionsId }}' --required;

Lifecycle Methods

Import wrapped key material into a CryptoKeyVersion. All requests must specify a CryptoKey. If a CryptoKeyVersion is additionally specified in the request, key material will be reimported into that version. Otherwise, a new version will be created, and will be assigned the next sequential id within the CryptoKey.

EXEC google.cloudkms.crypto_key_versions.import 
@projectsId='{{ projectsId }}' --required,
@locationsId='{{ locationsId }}' --required,
@keyRingsId='{{ keyRingsId }}' --required,
@cryptoKeysId='{{ cryptoKeysId }}' --required
@@json=
'{
"cryptoKeyVersion": "{{ cryptoKeyVersion }}",
"algorithm": "{{ algorithm }}",
"importJob": "{{ importJob }}",
"wrappedKey": "{{ wrappedKey }}",
"rsaAesWrappedKey": "{{ rsaAesWrappedKey }}"
}';