You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: lib/aws/generated/ecs.ex
+2-17Lines changed: 2 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -5633,7 +5633,8 @@ defmodule AWS.ECS do
5633
5633
(provided that the cluster resources required to do this are available).
5634
5634
5635
5635
When
5636
-
[UpdateService](https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_UpdateService.html) stops a task during a deployment, the equivalent of `docker stop` is issued
key pair or an SM2 key pair (China Regions only). The private key in an
3149
+
asymmetric KMS
3150
+
key never leaves KMS unencrypted. However, you can use the `GetPublicKey`
3151
+
operation to download the public key so it can be used
3152
+
outside of KMS. Each KMS key can have only one key usage. KMS keys with RSA key
3156
3153
pairs
3157
-
can be used to sign and verify messages or derive shared secrets (but not both).
3158
-
KMS
3159
-
keys with `ECC_SECG_P256K1` can be used only to sign and verify messages. KMS
3160
-
keys with SM2 key pairs (China Regions only) can be used to either encrypt and
3161
-
decrypt
3162
-
data, sign and verify messages, or derive shared secrets (you must choose one
3163
-
key usage
3164
-
type). For information about asymmetric KMS keys, see [Asymmetric KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html)
3165
-
in the
3166
-
*Key Management Service Developer Guide*.
3154
+
can be used to encrypt and decrypt data or sign and verify messages (but not
3155
+
both). KMS
3156
+
keys with NIST-recommended ECC key pairs can be used to sign and verify messages
3157
+
or
3158
+
derive shared secrets (but not both). KMS keys with `ECC_SECG_P256K1` can be
3159
+
used only to sign and verify messages. KMS keys with ML-DSA key pairs can be
3160
+
used to
3161
+
sign and verify messages. KMS keys with SM2 key pairs (China Regions only) can
3162
+
be used
3163
+
to either encrypt and decrypt data, sign and verify messages, or derive shared
3164
+
secrets
3165
+
(you must choose one key usage type). For information about asymmetric KMS keys,
0 commit comments