-
### Detailed Description of the Problem
I have an application based on the Spring Boot framework with Jetty as an embedded server. This application is configured to handle HTTP/2 cleartext (H2C) re…
-
Today tus supports http/1.1 and http/2
> Abstract
> The protocol provides a mechanism for resumable file uploads via HTTP/1.1 ([RFC 7230](https://tools.ietf.org/html/rfc7230)) and HTTP/2 ([RFC 754…
-
It is technically impossible to handle 100% score in your server test by properly implementing HTTP/2 in TLS 1.2 according to RFC 7540, which mandates to support this cipher. The scanner could be adju…
-
Hello,
I have a question that anyone knows please let me know. I am studying about server push of http/2. First I need to do simulation to calculate the latency of HTTP/2 with and without server pu…
-
According to RFC 7540, Section 5.1.2,:
"An endpoint that receives a HEADERS frame that causes its advertised concurrent stream limit to be exceeded MUST treat this as a stream error (Section 5.4.2) …
-
My openssl version is 1.0.1f. And I use the method `nghttp2_select_next_protocol()` to check the HTTP/2 advertise for the server. So the negotiation way is NPN not ALPN. But I reviewed the RFC 7540, i…
-
RFC 7540 section 6.8 seems to indicate that traffic can continue flowing in both directions after a GOAWAY frame, with the only restriction being that the recipient can't open new streams after receiv…
-
The latest revision to HTTP/2, RFC 9112, deprecated a few things that turned out to be duds but it didn't go as far as making any breaking changes.
What if we had infinite scope to change the wire…
-
Sebastien Rosset wrote:
> Would it be worthwhile clarifying in section 2.3 what are the encoding rules for the :path pseudo header (including query)? Or at least provide an example that has character…
-
I can't understand why this error occurred.
![argocd issue](https://github.com/user-attachments/assets/ede7d6e2-c5d7-48c2-889f-3bd67e065f51)