net/http.Request.Header (field)
116 uses
net/http (current package)
client.go#L241: if req.Header == nil {
client.go#L243: req.Header = make(Header)
client.go#L246: if u := req.URL.User; u != nil && req.Header.Get("Authorization") == "" {
client.go#L250: req.Header = cloneOrMakeHeader(ireq.Header)
client.go#L251: req.Header.Set("Authorization", "Basic "+basicAuth(username, password))
client.go#L664: Header: make(Header),
client.go#L691: if ref := refererForURL(reqs[len(reqs)-1].URL, req.URL, req.Header.Get("Referer")); ref != "" {
client.go#L692: req.Header.Set("Referer", ref)
client.go#L759: ireqhdr = cloneOrMakeHeader(ireq.Header)
client.go#L762: if c.Jar != nil && ireq.Header.Get("Cookie") != "" {
client.go#L813: req.Header[k] = vv
client.go#L865: req.Header.Set("Content-Type", contentType)
fs.go#L479: im := r.Header.Get("If-Match")
fs.go#L509: ius := r.Header.Get("If-Unmodified-Since")
fs.go#L528: inm := r.Header.get("If-None-Match")
fs.go#L561: ims := r.Header.Get("If-Modified-Since")
fs.go#L582: ir := r.Header.get("If-Range")
fs.go#L666: rangeHeader = r.Header.get("Range")
h2_bundle.go#L6159: } else if err := http2checkValidHTTP2RequestHeaders(req.Header); err != nil {
h2_bundle.go#L6421: Header: rp.header,
h2_bundle.go#L8729: if v := req.Header.Get("Upgrade"); v != "" {
h2_bundle.go#L8730: return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
h2_bundle.go#L8732: if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
h2_bundle.go#L8735: if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !http2asciiEqualFold(vv[0], "close") && !http2asciiEqualFold(vv[0], "keep-alive")) {
h2_bundle.go#L8788: req.Header.Get("Accept-Encoding") == "" &&
h2_bundle.go#L8789: req.Header.Get("Range") == "" &&
h2_bundle.go#L8925: if req.Method == "CONNECT" && req.Header.Get(":protocol") != "" {
h2_bundle.go#L8977: if !httpguts.HeaderValuesContainsToken(req.Header["Expect"], "100-continue") {
h2_bundle.go#L9532: protocol := req.Header.Get(":protocol")
h2_bundle.go#L9558: if err := http2validateHeaders(req.Header); err != "" {
h2_bundle.go#L9589: for k, vv := range req.Header {
h2_bundle.go#L10850: return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")
request.go#L172: Header Header
request.go#L394: r2.Header = r.Header.Clone()
request.go#L424: return r.Header.Get("User-Agent")
request.go#L429: return readCookies(r.Header, "")
request.go#L438: return readCookies(r.Header, name)
request.go#L452: for _, c := range readCookies(r.Header, name) {
request.go#L466: if c := r.Header.Get("Cookie"); c != "" {
request.go#L467: r.Header.Set("Cookie", c+"; "+s)
request.go#L469: r.Header.Set("Cookie", s)
request.go#L482: return r.Header.Get("Referer")
request.go#L509: v := r.Header.Get("Content-Type")
request.go#L530: return r.Method == "PRI" && len(r.Header) == 0 && r.URL.Path == "*" && r.Proto == "HTTP/2.0"
request.go#L690: if r.Header.has("User-Agent") {
request.go#L691: userAgent = r.Header.Get("User-Agent")
request.go#L715: err = r.Header.writeSubset(w, reqWriteExcludeHeader, trace)
request.go#L919: Header: make(Header),
request.go#L974: auth := r.Header.Get("Authorization")
request.go#L1023: r.Header.Set("Authorization", "Basic "+basicAuth(username, password))
request.go#L1064: delete(req.Header, "Host")
request.go#L1137: req.Header = Header(mimeHeader)
request.go#L1138: if len(req.Header["Host"]) > 1 {
request.go#L1151: req.Host = req.Header.get("Host")
request.go#L1154: fixPragmaCacheControl(req.Header)
request.go#L1156: req.Close = shouldClose(req.ProtoMajor, req.ProtoMinor, req.Header, false)
request.go#L1268: ct := r.Header.Get("Content-Type")
request.go#L1510: return hasToken(r.Header.get("Expect"), "100-continue")
request.go#L1517: return hasToken(r.Header.get("Connection"), "keep-alive")
request.go#L1524: return hasToken(r.Header.get("Connection"), "close")
request.go#L1543: if r.Header.has("Idempotency-Key") || r.Header.has("X-Idempotency-Key") {
request.go#L1580: return hasToken(r.Header.Get("Connection"), "upgrade") &&
request.go#L1581: ascii.EqualFold(r.Header.Get("Upgrade"), "websocket")
server.go#L1063: hosts, haveHost := req.Header["Host"]
server.go#L1071: for k, vv := range req.Header {
server.go#L1081: delete(req.Header, "Host")
server.go#L2081: } else if req.Header.get("Expect") != "" {
transfer.go#L91: t.Header = rr.Header
transfer.go#L508: t.Header = rr.Header
transport.go#L591: if req.Header == nil {
transport.go#L599: if err := validateHeaders(req.Header); err != "" {
transport.go#L1849: Header: hdr,
transport.go#L2757: req.Header.Get("Accept-Encoding") == "" &&
transport.go#L2758: req.Header.Get("Range") == "" &&
transport.go#L2783: !isProtocolSwitchHeader(req.Header) {
net/http/httputil
dump.go#L262: err = req.Header.WriteSubset(&b, reqWriteExcludeHeaderDump)
reverseproxy.go#L81: prior := r.Out.Header["X-Forwarded-For"]
reverseproxy.go#L85: r.Out.Header.Set("X-Forwarded-For", clientIP)
reverseproxy.go#L87: r.Out.Header.Del("X-Forwarded-For")
reverseproxy.go#L89: r.Out.Header.Set("X-Forwarded-Host", r.In.Host)
reverseproxy.go#L91: r.Out.Header.Set("X-Forwarded-Proto", "http")
reverseproxy.go#L93: r.Out.Header.Set("X-Forwarded-Proto", "https")
reverseproxy.go#L377: if outreq.Header == nil {
reverseproxy.go#L378: outreq.Header = make(http.Header) // Issue 33142: historical behavior was to always allocate
reverseproxy.go#L394: reqUpType := upgradeType(outreq.Header)
reverseproxy.go#L399: removeHopByHopHeaders(outreq.Header)
reverseproxy.go#L406: if httpguts.HeaderValuesContainsToken(req.Header["Te"], "trailers") {
reverseproxy.go#L407: outreq.Header.Set("Te", "trailers")
reverseproxy.go#L413: outreq.Header.Set("Connection", "Upgrade")
reverseproxy.go#L414: outreq.Header.Set("Upgrade", reqUpType)
reverseproxy.go#L421: outreq.Header.Del("Forwarded")
reverseproxy.go#L422: outreq.Header.Del("X-Forwarded-For")
reverseproxy.go#L423: outreq.Header.Del("X-Forwarded-Host")
reverseproxy.go#L424: outreq.Header.Del("X-Forwarded-Proto")
reverseproxy.go#L440: prior, ok := outreq.Header["X-Forwarded-For"]
reverseproxy.go#L446: outreq.Header.Set("X-Forwarded-For", clientIP)
reverseproxy.go#L451: if _, ok := outreq.Header["User-Agent"]; !ok {
reverseproxy.go#L454: outreq.Header.Set("User-Agent", "")
reverseproxy.go#L738: reqUpType := upgradeType(req.Header)
go.uber.org/zap
http_handler.go#L85: requestedLvl, err := decodePutRequest(r.Header.Get("Content-Type"), r)
golang.org/x/net/http2
server.go#L2108: } else if err := checkValidHTTP2RequestHeaders(req.Header); err != nil {
server.go#L2327: Header: rp.Header,
transport.go#L1334: cs.requestedGzip = httpcommon.IsRequestGzip(req.Method, req.Header, cc.t.disableCompression())
transport.go#L1451: if req.Method == "CONNECT" && req.Header.Get(":protocol") != "" {
transport.go#L1503: if !httpguts.HeaderValuesContainsToken(req.Header["Expect"], "100-continue") {
transport.go#L1631: Header: req.Header,
transport.go#L3169: return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")
google.golang.org/grpc/internal/transport
handler_server.go#L60: contentType := r.Header.Get("Content-Type")
handler_server.go#L105: if v := r.Header.Get("grpc-timeout"); v != "" {
handler_server.go#L120: for k, vv := range r.Header {
handler_server.go#L418: recvCompress: req.Header.Get("grpc-encoding"),
proxy.go#L67: Header: map[string][]string{"User-Agent": {grpcUA}},
proxy.go#L72: req.Header.Add(proxyAuthHeaderKey, "Basic "+basicAuth(u, p))