| Interface and Description |
|---|
| com.ibm.cos.v2.core.signer.AsyncRequestBodySigner
Replaced by
com.ibm.cos.v2.http.auth.spi.signer.HttpSigner in 'http-auth-spi'. |
| com.ibm.cos.v2.core.signer.AsyncSigner
Replaced by
com.ibm.cos.v2.http.auth.spi.signer.HttpSigner in 'http-auth-spi'. |
| com.ibm.cos.v2.awscore.internal.authcontext.AuthorizationStrategy
This is only used for compatibility with pre-SRA authorization logic. After we are comfortable that the new code
paths are working, we should migrate old clients to the new code paths (where possible) and delete this code.
|
| com.ibm.cos.v2.authcrt.signer.AwsCrtS3V4aSigner
Use
com.ibm.cos.v2.http.auth.aws.signer.AwsV4aHttpSigner from the 'http-auth-aws' module. |
| com.ibm.cos.v2.authcrt.signer.AwsCrtV4aSigner
Use
com.ibm.cos.v2.http.auth.aws.signer.AwsV4aHttpSigner from the 'http-auth-aws' module. |
| com.ibm.cos.v2.core.retry.backoff.BackoffStrategy
Use instead
BackoffStrategy |
| com.ibm.cos.v2.core.signer.Presigner
Replaced by
com.ibm.cos.v2.http.auth.spi.signer.HttpSigner in 'http-auth-spi'. |
| com.ibm.cos.v2.core.retry.conditions.RetryCondition
Use instead
RetryStrategy.Builder.retryOnException(Predicate). |
| com.ibm.cos.v2.core.checksums.SdkChecksum
this class is deprecated and will not be updated.
|
| com.ibm.cos.v2.core.signer.Signer
Replaced by
com.ibm.cos.v2.http.auth.spi.signer.HttpSigner in 'http-auth-spi'. |
| Class and Description |
|---|
| com.ibm.cos.v2.awscore.internal.authcontext.AuthorizationStrategyFactory
This is only used for compatibility with pre-SRA authorization logic. After we are comfortable that the new code
paths are working, we should migrate old clients to the new code paths (where possible) and delete this code.
|
| com.ibm.cos.v2.auth.signer.Aws4Signer
Use
com.ibm.cos.v2.http.auth.aws.signer.AwsV4HttpSigner from the 'http-auth-aws' module. |
| com.ibm.cos.v2.awscore.internal.authcontext.AwsCredentialsAuthorizationStrategy
This is only used for compatibility with pre-SRA authorization logic. After we are comfortable that the new code
paths are working, we should migrate old clients to the new code paths (where possible) and delete this code.
|
| com.ibm.cos.v2.awscore.retry.AwsRetryPolicy
Use instead
AwsRetryStrategy |
| com.ibm.cos.v2.auth.signer.AwsS3V4Signer
Use
com.ibm.cos.v2.http.auth.aws.signer.AwsV4HttpSigner from the 'http-auth-aws' module. |
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute
Signer execution attributes have been deprecated in favor of signer properties, set on the auth scheme's signer
option.
|
| com.ibm.cos.v2.auth.signer.internal.BaseAws4Signer |
| com.ibm.cos.v2.core.checksums.Crc32CChecksum
this class is deprecated and subject to removal.
|
| com.ibm.cos.v2.core.checksums.Crc32Checksum
this class is deprecated and subject to removal.
|
| com.ibm.cos.v2.awscore.endpoint.DefaultServiceEndpointBuilder
Use
AwsClientEndpointProvider. This is only used by old client versions. |
| com.ibm.cos.v2.core.retry.backoff.EqualJitterBackoffStrategy |
| com.ibm.cos.v2.core.retry.backoff.FixedDelayBackoffStrategy
Use instead
BackoffStrategy and
BackoffStrategy.fixedDelay(Duration). |
| com.ibm.cos.v2.core.retry.backoff.FullJitterBackoffStrategy |
| com.ibm.cos.v2.core.checksums.Md5Checksum
this class is deprecated and subject to removal.
|
| com.ibm.cos.v2.core.signer.NoOpSigner
Replaced by
com.ibm.cos.v2.http.auth.spi.signer.HttpSigner#doNotSign() in
'http-auth-spi'. |
| com.ibm.cos.v2.core.retry.RetryPolicy
Use instead
RetryStrategy. |
| com.ibm.cos.v2.auth.signer.S3SignerExecutionAttribute
Signer execution attributes have been deprecated in favor of signer properties, set on the auth scheme's signer
option.
|
| com.ibm.cos.v2.auth.token.signer.SdkTokenExecutionAttribute
Signer execution attributes have been deprecated in favor of signer properties, set on the auth scheme's signer
options.
|
| com.ibm.cos.v2.core.util.SdkUserAgent |
| com.ibm.cos.v2.core.checksums.Sha1Checksum
this class is deprecated and subject to removal.
|
| com.ibm.cos.v2.core.checksums.Sha256Checksum
this class is deprecated and subject to removal.
|
| com.ibm.cos.v2.auth.signer.params.SignerChecksumParams
this class is deprecated and will not be updated. Use
SignerProperty and
HttpSigner in 'http-auth-spi' instead. |
| com.ibm.cos.v2.auth.signer.SignerLoader |
| com.ibm.cos.v2.awscore.internal.authcontext.TokenAuthorizationStrategy
This is only used for compatibility with pre-SRA authorization logic. After we are comfortable that the new code
paths are working, we should migrate old clients to the new code paths (where possible) and delete this code.
|
| Enum and Description |
|---|
| com.ibm.cos.v2.core.checksums.Algorithm
this class is deprecated and will not be updated.
|
| Field and Description |
|---|
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.AWS_CREDENTIALS
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the credential provider via the
SdkRequest's
overrideConfiguration.credentialsProvider. If you're using it to call the SDK's signers, you should migrate to a
subtype of HttpSigner. |
| com.ibm.cos.v2.core.interceptor.SdkExecutionAttribute.CLIENT_ENDPOINT
This value is not usually accurate, now that the endpoint is almost entirely determined by the
service's endpoint rules. Use
SdkHttpRequest.getUri() from interceptors, to get or modify the actual
endpoint. |
| com.ibm.cos.v2.awscore.client.config.AwsClientOption.CREDENTIALS_PROVIDER |
| com.ibm.cos.v2.SDKGlobalConfiguration.DEFAULT_S3_STREAM_BUFFER_SIZE
with
//AmazonWebServiceRequest#getRequestClientOptions()
and //RequestClientOptions#setReadLimit(int).
The default size of the buffer when uploading data from a stream. A buffer of this size will be created and filled with the first bytes from a stream being uploaded so that any transmit errors that occur in that section of the data can be automatically retried without the caller's intervention. If not set, the default value of 128 KB will be used. |
| com.ibm.cos.v2.auth.signer.S3SignerExecutionAttribute.ENABLE_CHUNKED_ENCODING
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the chunk encoding setting via the
AuthSchemeProvider
that is configured on the SDK client builder. If you're using it to call the SDK's signers, you should migrate to a
subtype of HttpSigner. |
| com.ibm.cos.v2.auth.signer.S3SignerExecutionAttribute.ENABLE_PAYLOAD_SIGNING
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the payload signing setting via the
AuthSchemeProvider that is configured on the SDK client builder. If you're using it to call the SDK's signers, you
should migrate to a subtype of HttpSigner. |
| com.ibm.cos.v2.SDKGlobalConfiguration.ENABLE_S3_SIGV4_SYSTEM_PROPERTY |
| com.ibm.cos.v2.core.client.config.SdkClientOption.ENDPOINT
Use
SdkClientOption.CLIENT_ENDPOINT_PROVIDER for client-level endpoint configuration, or
SdkClientOption.ENDPOINT_PROVIDER for deriving the request-level endpoint. |
| com.ibm.cos.v2.core.client.config.SdkClientOption.ENDPOINT_OVERRIDDEN |
| com.ibm.cos.v2.core.interceptor.SdkExecutionAttribute.ENDPOINT_OVERRIDDEN
This value should not be trusted. To modify the endpoint used for requests, you should decorate the
EndpointProvider of the client. This value can be determined there, by checking for the existence of an
override endpoint. |
| com.ibm.cos.v2.SDKGlobalConfiguration.ENFORCE_S3_SIGV4_SYSTEM_PROPERTY |
| com.ibm.cos.v2.core.interceptor.SdkExecutionAttribute.HTTP_CHECKSUM_VALIDATION_ALGORITHM |
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.PRESIGNER_EXPIRATION
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the expiration via the
AuthSchemeProvider that is
configured on the SDK client builder. If you're using it to call the SDK's signers, you should migrate to a subtype of
HttpSigner. |
| com.ibm.cos.v2.core.client.config.SdkClientOption.PROFILE_FILE
This option was used to:
- Read configuration options in profile files in aws-core, sdk-core
- Build service configuration objects from profile files in codegen, s3control
- Build service configuration objects from profile files, set endpoint options in s3
- Set retry mode in dynamodb, kinesis
This has been replaced with
PROFILE_FILE_SUPPLIER.get(). |
| com.ibm.cos.v2.core.interceptor.SdkExecutionAttribute.PROFILE_FILE
This attribute is used for:
- Set profile file of service endpoint builder docdb, nepture, rds
This has been replaced with
PROFILE_FILE_SUPPLIER.get(). |
| com.ibm.cos.v2.SDKGlobalConfiguration.PROFILING_SYSTEM_PROPERTY |
| com.ibm.cos.v2.auth.token.signer.SdkTokenExecutionAttribute.SDK_TOKEN
This is a protected class that is internal to the SDK, so you shouldn't be using it.
|
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.SERVICE_SIGNING_NAME
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the signing region name via the
AuthSchemeProvider
that is configured on the SDK client builder. If you're using it to call the SDK's signers, you should migrate to a
subtype of HttpSigner. |
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.SIGNER_DOUBLE_URL_ENCODE
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the double-url-encode setting via the
AuthSchemeProvider that is configured on the SDK client builder. If you're using it to call the SDK's signers, you
should migrate to a subtype of HttpSigner. |
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.SIGNER_NORMALIZE_PATH
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the normalize-path setting via the
AuthSchemeProvider that is configured on the SDK client builder. If you're using it to call the SDK's signers, you
should migrate to a subtype of HttpSigner. |
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.SIGNING_CLOCK
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the clock setting via the
AuthSchemeProvider that is configured on the SDK client builder. If you're using it to call the SDK's signers, you
should migrate to a subtype of HttpSigner. |
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.SIGNING_REGION
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the signing region via the
AuthSchemeProvider that
is configured on the SDK client builder. If you're using it to call the SDK's signers, you should migrate to a
subtype of HttpSigner. |
| com.ibm.cos.v2.auth.signer.AwsSignerExecutionAttribute.SIGNING_REGION_SCOPE
This is a protected class that is internal to the SDK, so you shouldn't be using it. If you are using it
from execution interceptors, you should instead be overriding the signing region scope via the
AuthSchemeProvider
that is configured on the SDK client builder. If you're using it to call the SDK's signers, you should migrate to a
subtype of HttpSigner. |
| com.ibm.cos.v2.awscore.client.config.AwsClientOption.TOKEN_PROVIDER |
| Enum Constant and Description |
|---|
| com.ibm.cos.v2.core.retry.RetryMode.ADAPTIVE
As of 2.25.xx, replaced by
RetryMode.ADAPTIVE_V2. The ADAPTIVE implementation has a bug that prevents it
from remembering its state across requests which is needed to correctly estimate its sending rate. Given that
this bug has been present since its introduction and that correct version might change the traffic patterns of the SDK we
deemed too risky to fix this implementation. |
Copyright © 2026. All rights reserved.