This allows HTTP/2 connection negotiation if custom http client is provided.
At first I wanted to remove this forcing of "legacy" HTTP/1 protocol, but couldn't pass integration test for Vault Agent: io.github.jopenlibs.vault.api.VaultAgentTests.testWriteAndReadFromAgent,
because Vault Agent failed to proxy unsecured HTTP/2 (h2c) connections to secured HTTPS.
Therefore I kept default to HTTP/1.1 for builtin client.
This allows HTTP/2 connection negotiation if custom http client is provided.
At first I wanted to remove this forcing of "legacy" HTTP/1 protocol, but couldn't pass integration test for Vault Agent: io.github.jopenlibs.vault.api.VaultAgentTests.testWriteAndReadFromAgent, because Vault Agent failed to proxy unsecured HTTP/2 (h2c) connections to secured HTTPS. Therefore I kept default to HTTP/1.1 for builtin client.