net/url.URL.Host (field)
63 uses
net/url (current package)
url.go#L375: Host string // host or host:port (see Hostname and Port methods)
url.go#L568: url.User, url.Host, err = parseAuthority(authority)
url.go#L837: if !u.OmitHost && (u.Scheme != "" || u.Host != "" || u.User != nil) {
url.go#L840: n += len(username) + len(password) + len(u.Host)
url.go#L855: if u.Scheme != "" || u.Host != "" || u.User != nil {
url.go#L856: if u.OmitHost && u.Host == "" && u.User == nil {
url.go#L859: if u.Host != "" || u.Path != "" || u.User != nil {
url.go#L866: if h := u.Host; h != "" {
url.go#L872: if path != "" && path[0] != '/' && u.Host != "" {
url.go#L1117: if ref.Scheme != "" || ref.Host != "" || ref.User != nil {
url.go#L1126: url.Host = ""
url.go#L1140: url.Host = ""
url.go#L1145: url.Host = u.Host
url.go#L1184: host, _ := splitHostPort(u.Host)
url.go#L1192: _, port := splitHostPort(u.Host)
net/http
client.go#L651: if req.Host != "" && req.Host != req.URL.Host {
client.go#L682: if !stripSensitiveHeaders && reqs[0].URL.Host != req.URL.Host {
h2_bundle.go#L6401: url_ = &url.URL{Host: rp.authority}
h2_bundle.go#L7204: u.Host = w.rws.req.Host
h2_bundle.go#L7209: if u.Host == "" {
h2_bundle.go#L7330: authority: msg.url.Host,
h2_bundle.go#L8054: addr := http2authorityAddr(req.URL.Scheme, req.URL.Host)
h2_bundle.go#L9520: host = req.URL.Host
h2_bundle.go#L11271: http2encKV(enc, ":authority", w.url.Host)
request.go#L610: host = r.URL.Host
request.go#L911: u.Host = removeEmptyPort(u.Host)
request.go#L921: Host: u.Host,
request.go#L1149: req.Host = req.URL.Host
servemux121.go#L111: if u, ok := mux.redirectToPathSlash(r.URL.Host, r.URL.Path, r.URL); ok {
server.go#L2380: if u.Scheme == "" && u.Host == "" {
server.go#L2662: host := r.URL.Host
transport.go#L632: if req.URL.Host == "" {
net/http/httputil
dump.go#L250: host = req.URL.Host
reverseproxy.go#L272: req.URL.Host = target.Host
crypto/x509
parser.go#L398: if len(uri.Host) > 0 {
parser.go#L399: if _, ok := domainToReverseLabels(uri.Host); !ok {
verify.go#L456: host := uri.Host
verify.go#L463: host, _, err = net.SplitHostPort(uri.Host)
golang.org/x/net/http2
server.go#L3108: u.Host = w.rws.req.Host
server.go#L3113: if u.Host == "" {
server.go#L3234: Authority: msg.url.Host,
transport.go#L632: addr := authorityAddr(req.URL.Scheme, req.URL.Host)
write.go#L285: encKV(enc, ":authority", w.url.Host)
golang.org/x/net/internal/httpcommon
request.go#L78: host = req.URL.Host
request.go#L448: url_ = &url.URL{Host: rp.Authority}
google.golang.org/grpc/internal/credentials
spiffe.go#L59: if len(uri.Host) == 0 || len(uri.Path) == 0 {
spiffe.go#L63: if len(uri.Host) > 255 {
google.golang.org/grpc/internal/resolver/delegatingresolver
delegatingresolver.go#L85: Host: address,
delegatingresolver.go#L161: url.Path = "/" + r.proxyURL.Host
delegatingresolver.go#L162: url.Host = "" // Clear the Host field to conform to the "dns:///" format
delegatingresolver.go#L217: Host: address.Addr,
delegatingresolver.go#L254: proxyAddr = resolver.Address{Addr: r.proxyURL.Host}
google.golang.org/grpc/internal/resolver/dns
dns_resolver.go#L144: d.resolver, err = internal.NewNetResolver(target.URL.Host)
google.golang.org/grpc/internal/resolver/unix
unix.go#L37: if target.URL.Host != "" {
unix.go#L38: return nil, fmt.Errorf("invalid (non-empty) authority: %v", target.URL.Host)
google.golang.org/grpc/internal/transport
http_util.go#L462: addr = t.Host
proxy.go#L66: URL: &url.URL{Host: opts.ConnectAddr},
google.golang.org/grpc/resolver
resolver.go#L296: return t.URL.Scheme + "://" + t.URL.Host + "/" + t.Endpoint()
vendor/golang.org/x/net/http/httpproxy
proxy.go#L153: if err != nil || proxyURL.Scheme == "" || proxyURL.Host == "" {