alicloud_kms_ciphertext
更新时间:
Encrypt a given plaintext with KMS. The produced ciphertext stays stable across applies. If the plaintext should be re-encrypted on each apply use the alicloud_kms_ciphertext
data source.
-> NOTE: Available since v1.63.0.
-> NOTE: Using this data provider will allow you to conceal secret data within your resource definitions but does not take care of protecting that data in all Terraform logging and state output. Please take care to secure your secret data beyond just the Terraform configuration.
Example Usage
resource "alicloud_kms_key" "key" {
description = "example key"
status = "Enabled"
pending_window_in_days = 7
}
resource "alicloud_kms_ciphertext" "encrypted" {
key_id = alicloud_kms_key.key.id
plaintext = "example"
}
Argument Reference
The following arguments are supported:
plaintext
- (Required, ForceNew) The plaintext to be encrypted which must be encoded in Base64.key_id
- (Required, ForceNew) The globally unique ID of the CMK.encryption_context
- (Optional, ForceNew) The Encryption context. If you specify this parameter here, it is also required when you call the Decrypt API operation. For more information, see Encryption Context.
Attributes Reference
The following attributes are exported in addition to the arguments listed above:
ciphertext_blob
- The ciphertext of the data key encrypted with the primary CMK version.
文档内容是否对您有帮助?