文档

alicloud_kms_ciphertext

更新时间:
一键部署

Encrypt a given plaintext with KMS. The produced ciphertext stays stable across applies. If the plaintext should be re-encrypted on each apply use the alicloud_kms_ciphertext data source.

-> NOTE: Available since v1.63.0.

-> NOTE: Using this data provider will allow you to conceal secret data within your resource definitions but does not take care of protecting that data in all Terraform logging and state output. Please take care to secure your secret data beyond just the Terraform configuration.

Example Usage

resource "alicloud_kms_key" "key" {
  description            = "example key"
  status                 = "Enabled"
  pending_window_in_days = 7
}

resource "alicloud_kms_ciphertext" "encrypted" {
  key_id    = alicloud_kms_key.key.id
  plaintext = "example"
}

Argument Reference

The following arguments are supported:

  • plaintext - (Required, ForceNew) The plaintext to be encrypted which must be encoded in Base64.
  • key_id - (Required, ForceNew) The globally unique ID of the CMK.
  • encryption_context - (Optional, ForceNew) The Encryption context. If you specify this parameter here, it is also required when you call the Decrypt API operation. For more information, see Encryption Context.

Attributes Reference

The following attributes are exported in addition to the arguments listed above:

  • ciphertext_blob - The ciphertext of the data key encrypted with the primary CMK version.

  • 本页导读 (0)
文档反馈