Skip to content

h2 recv buffer coverage#1608

Merged
alyssawilk merged 2 commits intoenvoyproxy:masterfrom
alyssawilk:h2-coverage
Sep 7, 2017
Merged

h2 recv buffer coverage#1608
alyssawilk merged 2 commits intoenvoyproxy:masterfrom
alyssawilk:h2-coverage

Conversation

@alyssawilk
Copy link
Copy Markdown
Contributor

Ask and ye shall receive :-)

Vaguely part of #150

EXPECT_EQ(initial_connection_window, nghttp2_session_get_remote_window_size(client_.session()));
}

TEST_P(Http2CodecImplFlowControlTest, FlowControlPendingRecvData) {
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you add a one line // above explaining what is being validated? In general I prefer all tests to have this when non-trivial.

@mattklein123
Copy link
Copy Markdown
Member

@alyssawilk I think the CLA tool was made more robust so you will need to "verify" your GH email address. (Basically if you look at your commits you will need to get rid of the '?' next to your name).

@alyssawilk alyssawilk closed this Sep 7, 2017
@alyssawilk alyssawilk reopened this Sep 7, 2017
@alyssawilk
Copy link
Copy Markdown
Contributor Author

Oh weird, something I set up when I was doing QUIC commits for Chrome latched on to my chromium.org address instead of google.com. I have no idea what part of the system has the "wrong" address but it'd be a pain to switch it's easy enough to verify :-)

@alyssawilk alyssawilk closed this Sep 7, 2017
@alyssawilk alyssawilk reopened this Sep 7, 2017
@alyssawilk alyssawilk merged commit 0e96d33 into envoyproxy:master Sep 7, 2017
@alyssawilk alyssawilk deleted the h2-coverage branch September 7, 2017 19:37
jpsim pushed a commit that referenced this pull request Nov 28, 2022
Propercasing both request and response path for the ALPN pool

Risk Level: low (alpn-pool only)
Testing: n/a
Docs Changes: n/a
Release Notes: n/a
Fixes #1558

Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
Propercasing both request and response path for the ALPN pool

Risk Level: low (alpn-pool only)
Testing: n/a
Docs Changes: n/a
Release Notes: n/a
Fixes #1558

Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Signed-off-by: JP Simard <jp@jpsim.com>
mathetake pushed a commit that referenced this pull request Mar 3, 2026
**Description**

Add the configured scopes to the `WWW-Authenticate` headers. At
initialization time, which is when the first authentication will occur,
we don't have enough information to provide a fine-grained list of
scopes, so the best we can do is to default to the ones defined in the
protected resource metadata.

**Related Issues/PRs (if applicable)**

Fixes envoyproxy/ai-gateway#1578

The addition of the header on 403 requests is implemented in
envoyproxy/ai-gateway#1482, but this issue can
be closed as soon as this PR is merged, because we'll be compatible with
the latest spec.

**Special notes for reviewers (if applicable)**

cc @zhaohuabing can you take a look?

Signed-off-by: Ignasi Barrera <nacx@apache.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants