net/http.Request.Header (field)

116 uses

	net/http (current package)
		client.go#L241: 	if req.Header == nil {
		client.go#L243: 		req.Header = make(Header)
		client.go#L246: 	if u := req.URL.User; u != nil && req.Header.Get("Authorization") == "" {
		client.go#L250: 		req.Header = cloneOrMakeHeader(ireq.Header)
		client.go#L251: 		req.Header.Set("Authorization", "Basic "+basicAuth(username, password))
		client.go#L664: 				Header:   make(Header),
		client.go#L691: 			if ref := refererForURL(reqs[len(reqs)-1].URL, req.URL, req.Header.Get("Referer")); ref != "" {
		client.go#L692: 				req.Header.Set("Referer", ref)
		client.go#L759: 		ireqhdr  = cloneOrMakeHeader(ireq.Header)
		client.go#L762: 	if c.Jar != nil && ireq.Header.Get("Cookie") != "" {
		client.go#L813: 				req.Header[k] = vv
		client.go#L865: 	req.Header.Set("Content-Type", contentType)
		fs.go#L479: 	im := r.Header.Get("If-Match")
		fs.go#L509: 	ius := r.Header.Get("If-Unmodified-Since")
		fs.go#L528: 	inm := r.Header.get("If-None-Match")
		fs.go#L561: 	ims := r.Header.Get("If-Modified-Since")
		fs.go#L582: 	ir := r.Header.get("If-Range")
		fs.go#L666: 	rangeHeader = r.Header.get("Range")
		h2_bundle.go#L6159: 	} else if err := http2checkValidHTTP2RequestHeaders(req.Header); err != nil {
		h2_bundle.go#L6421: 		Header:     rp.header,
		h2_bundle.go#L8729: 	if v := req.Header.Get("Upgrade"); v != "" {
		h2_bundle.go#L8730: 		return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
		h2_bundle.go#L8732: 	if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
		h2_bundle.go#L8735: 	if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !http2asciiEqualFold(vv[0], "close") && !http2asciiEqualFold(vv[0], "keep-alive")) {
		h2_bundle.go#L8788: 		req.Header.Get("Accept-Encoding") == "" &&
		h2_bundle.go#L8789: 		req.Header.Get("Range") == "" &&
		h2_bundle.go#L8925: 	if req.Method == "CONNECT" && req.Header.Get(":protocol") != "" {
		h2_bundle.go#L8977: 		if !httpguts.HeaderValuesContainsToken(req.Header["Expect"], "100-continue") {
		h2_bundle.go#L9532: 	protocol := req.Header.Get(":protocol")
		h2_bundle.go#L9558: 	if err := http2validateHeaders(req.Header); err != "" {
		h2_bundle.go#L9589: 		for k, vv := range req.Header {
		h2_bundle.go#L10850: 	return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")
		request.go#L172: 	Header Header
		request.go#L394: 	r2.Header = r.Header.Clone()
		request.go#L424: 	return r.Header.Get("User-Agent")
		request.go#L429: 	return readCookies(r.Header, "")
		request.go#L438: 	return readCookies(r.Header, name)
		request.go#L452: 	for _, c := range readCookies(r.Header, name) {
		request.go#L466: 	if c := r.Header.Get("Cookie"); c != "" {
		request.go#L467: 		r.Header.Set("Cookie", c+"; "+s)
		request.go#L469: 		r.Header.Set("Cookie", s)
		request.go#L482: 	return r.Header.Get("Referer")
		request.go#L509: 	v := r.Header.Get("Content-Type")
		request.go#L530: 	return r.Method == "PRI" && len(r.Header) == 0 && r.URL.Path == "*" && r.Proto == "HTTP/2.0"
		request.go#L690: 	if r.Header.has("User-Agent") {
		request.go#L691: 		userAgent = r.Header.Get("User-Agent")
		request.go#L715: 	err = r.Header.writeSubset(w, reqWriteExcludeHeader, trace)
		request.go#L919: 		Header:     make(Header),
		request.go#L974: 	auth := r.Header.Get("Authorization")
		request.go#L1023: 	r.Header.Set("Authorization", "Basic "+basicAuth(username, password))
		request.go#L1064: 	delete(req.Header, "Host")
		request.go#L1137: 	req.Header = Header(mimeHeader)
		request.go#L1138: 	if len(req.Header["Host"]) > 1 {
		request.go#L1151: 		req.Host = req.Header.get("Host")
		request.go#L1154: 	fixPragmaCacheControl(req.Header)
		request.go#L1156: 	req.Close = shouldClose(req.ProtoMajor, req.ProtoMinor, req.Header, false)
		request.go#L1268: 	ct := r.Header.Get("Content-Type")
		request.go#L1510: 	return hasToken(r.Header.get("Expect"), "100-continue")
		request.go#L1517: 	return hasToken(r.Header.get("Connection"), "keep-alive")
		request.go#L1524: 	return hasToken(r.Header.get("Connection"), "close")
		request.go#L1543: 		if r.Header.has("Idempotency-Key") || r.Header.has("X-Idempotency-Key") {
		request.go#L1580: 	return hasToken(r.Header.Get("Connection"), "upgrade") &&
		request.go#L1581: 		ascii.EqualFold(r.Header.Get("Upgrade"), "websocket")
		server.go#L1063: 	hosts, haveHost := req.Header["Host"]
		server.go#L1071: 	for k, vv := range req.Header {
		server.go#L1081: 	delete(req.Header, "Host")
		server.go#L2081: 		} else if req.Header.get("Expect") != "" {
		transfer.go#L91: 		t.Header = rr.Header
		transfer.go#L508: 		t.Header = rr.Header
		transport.go#L591: 	if req.Header == nil {
		transport.go#L599: 		if err := validateHeaders(req.Header); err != "" {
		transport.go#L1849: 			Header: hdr,
		transport.go#L2757: 		req.Header.Get("Accept-Encoding") == "" &&
		transport.go#L2758: 		req.Header.Get("Range") == "" &&
		transport.go#L2783: 		!isProtocolSwitchHeader(req.Header) {

	net/http/httputil
		dump.go#L262: 	err = req.Header.WriteSubset(&b, reqWriteExcludeHeaderDump)
		reverseproxy.go#L81: 		prior := r.Out.Header["X-Forwarded-For"]
		reverseproxy.go#L85: 		r.Out.Header.Set("X-Forwarded-For", clientIP)
		reverseproxy.go#L87: 		r.Out.Header.Del("X-Forwarded-For")
		reverseproxy.go#L89: 	r.Out.Header.Set("X-Forwarded-Host", r.In.Host)
		reverseproxy.go#L91: 		r.Out.Header.Set("X-Forwarded-Proto", "http")
		reverseproxy.go#L93: 		r.Out.Header.Set("X-Forwarded-Proto", "https")
		reverseproxy.go#L377: 	if outreq.Header == nil {
		reverseproxy.go#L378: 		outreq.Header = make(http.Header) // Issue 33142: historical behavior was to always allocate
		reverseproxy.go#L394: 	reqUpType := upgradeType(outreq.Header)
		reverseproxy.go#L399: 	removeHopByHopHeaders(outreq.Header)
		reverseproxy.go#L406: 	if httpguts.HeaderValuesContainsToken(req.Header["Te"], "trailers") {
		reverseproxy.go#L407: 		outreq.Header.Set("Te", "trailers")
		reverseproxy.go#L413: 		outreq.Header.Set("Connection", "Upgrade")
		reverseproxy.go#L414: 		outreq.Header.Set("Upgrade", reqUpType)
		reverseproxy.go#L421: 		outreq.Header.Del("Forwarded")
		reverseproxy.go#L422: 		outreq.Header.Del("X-Forwarded-For")
		reverseproxy.go#L423: 		outreq.Header.Del("X-Forwarded-Host")
		reverseproxy.go#L424: 		outreq.Header.Del("X-Forwarded-Proto")
		reverseproxy.go#L440: 			prior, ok := outreq.Header["X-Forwarded-For"]
		reverseproxy.go#L446: 				outreq.Header.Set("X-Forwarded-For", clientIP)
		reverseproxy.go#L451: 	if _, ok := outreq.Header["User-Agent"]; !ok {
		reverseproxy.go#L454: 		outreq.Header.Set("User-Agent", "")
		reverseproxy.go#L738: 	reqUpType := upgradeType(req.Header)

	go.uber.org/zap
		http_handler.go#L85: 		requestedLvl, err := decodePutRequest(r.Header.Get("Content-Type"), r)

	golang.org/x/net/http2
		server.go#L2108: 	} else if err := checkValidHTTP2RequestHeaders(req.Header); err != nil {
		server.go#L2327: 		Header:     rp.Header,
		transport.go#L1334: 	cs.requestedGzip = httpcommon.IsRequestGzip(req.Method, req.Header, cc.t.disableCompression())
		transport.go#L1451: 	if req.Method == "CONNECT" && req.Header.Get(":protocol") != "" {
		transport.go#L1503: 		if !httpguts.HeaderValuesContainsToken(req.Header["Expect"], "100-continue") {
		transport.go#L1631: 			Header:              req.Header,
		transport.go#L3169: 	return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")

	google.golang.org/grpc/internal/transport
		handler_server.go#L60: 	contentType := r.Header.Get("Content-Type")
		handler_server.go#L105: 	if v := r.Header.Get("grpc-timeout"); v != "" {
		handler_server.go#L120: 	for k, vv := range r.Header {
		handler_server.go#L418: 			recvCompress:   req.Header.Get("grpc-encoding"),
		proxy.go#L67: 		Header: map[string][]string{"User-Agent": {grpcUA}},
		proxy.go#L72: 		req.Header.Add(proxyAuthHeaderKey, "Basic "+basicAuth(u, p))