net/http.Request.Header (field)

253 uses

	net/http (current package)
		client.go#L233: 	if req.Header == nil {
		client.go#L235: 		req.Header = make(Header)
		client.go#L238: 	if u := req.URL.User; u != nil && req.Header.Get("Authorization") == "" {
		client.go#L242: 		req.Header = cloneOrMakeHeader(ireq.Header)
		client.go#L243: 		req.Header.Set("Authorization", "Basic "+basicAuth(username, password))
		client.go#L658: 				Header:   make(Header),
		client.go#L681: 				req.Header.Set("Referer", ref)
		client.go#L747: 		ireqhdr  = cloneOrMakeHeader(ireq.Header)
		client.go#L750: 	if c.Jar != nil && ireq.Header.Get("Cookie") != "" {
		client.go#L796: 				req.Header[k] = vv
		client.go#L844: 	req.Header.Set("Content-Type", contentType)
		fs.go#L392: 	im := r.Header.Get("If-Match")
		fs.go#L422: 	ius := r.Header.Get("If-Unmodified-Since")
		fs.go#L441: 	inm := r.Header.get("If-None-Match")
		fs.go#L474: 	ims := r.Header.Get("If-Modified-Since")
		fs.go#L495: 	ir := r.Header.get("If-Range")
		fs.go#L578: 	rangeHeader = r.Header.get("Range")
		h2_bundle.go#L5438: 	} else if err := http2checkValidHTTP2RequestHeaders(req.Header); err != nil {
		h2_bundle.go#L5675: 		Header:     rp.header,
		h2_bundle.go#L7505: 	if v := req.Header.Get("Upgrade"); v != "" {
		h2_bundle.go#L7506: 		return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
		h2_bundle.go#L7508: 	if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
		h2_bundle.go#L7511: 	if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !strings.EqualFold(vv[0], "close") && !strings.EqualFold(vv[0], "keep-alive")) {
		h2_bundle.go#L7562: 		req.Header.Get("Accept-Encoding") == "" &&
		h2_bundle.go#L7563: 		req.Header.Get("Range") == "" &&
		h2_bundle.go#L8004: 	for k, vv := range req.Header {
		h2_bundle.go#L8036: 		for k, vv := range req.Header {
		h2_bundle.go#L9119: 			cs.req.Header["Expect"],
		h2_bundle.go#L9175: 	return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")
		request.go#L165: 	Header Header
		request.go#L379: 	if r.Header != nil {
		request.go#L380: 		r2.Header = r.Header.Clone()
		request.go#L405: 	return r.Header.Get("User-Agent")
		request.go#L410: 	return readCookies(r.Header, "")
		request.go#L421: 	for _, c := range readCookies(r.Header, name) {
		request.go#L435: 	if c := r.Header.Get("Cookie"); c != "" {
		request.go#L436: 		r.Header.Set("Cookie", c+"; "+s)
		request.go#L438: 		r.Header.Set("Cookie", s)
		request.go#L451: 	return r.Header.Get("Referer")
		request.go#L478: 	v := r.Header.Get("Content-Type")
		request.go#L496: 	return r.Method == "PRI" && len(r.Header) == 0 && r.URL.Path == "*" && r.Proto == "HTTP/2.0"
		request.go#L627: 	if r.Header.has("User-Agent") {
		request.go#L628: 		userAgent = r.Header.Get("User-Agent")
		request.go#L650: 	err = r.Header.writeSubset(w, reqWriteExcludeHeader, trace)
		request.go#L883: 		Header:     make(Header),
		request.go#L938: 	auth := r.Header.Get("Authorization")
		request.go#L975: 	r.Header.Set("Authorization", "Basic "+basicAuth(username, password))
		request.go#L1078: 	req.Header = Header(mimeHeader)
		request.go#L1089: 		req.Host = req.Header.get("Host")
		request.go#L1092: 		delete(req.Header, "Host")
		request.go#L1095: 	fixPragmaCacheControl(req.Header)
		request.go#L1097: 	req.Close = shouldClose(req.ProtoMajor, req.ProtoMinor, req.Header, false)
		request.go#L1192: 	ct := r.Header.Get("Content-Type")
		request.go#L1384: 	return hasToken(r.Header.get("Expect"), "100-continue")
		request.go#L1391: 	return hasToken(r.Header.get("Connection"), "keep-alive")
		request.go#L1398: 	return hasToken(r.Header.get("Connection"), "close")
		request.go#L1417: 		if r.Header.has("Idempotency-Key") || r.Header.has("X-Idempotency-Key") {
		request.go#L1454: 	return hasToken(r.Header.Get("Connection"), "upgrade") &&
		request.go#L1455: 		strings.EqualFold(r.Header.Get("Upgrade"), "websocket")
		server.go#L1001: 	hosts, haveHost := req.Header["Host"]
		server.go#L1012: 	for k, vv := range req.Header {
		server.go#L1022: 	delete(req.Header, "Host")
		server.go#L1932: 		} else if req.Header.get("Expect") != "" {
		transfer.go#L88: 		t.Header = rr.Header
		transfer.go#L499: 		t.Header = rr.Header
		transport.go#L511: 	if req.Header == nil {
		transport.go#L518: 		for k, vv := range req.Header {
		transport.go#L1669: 			Header: hdr,
		transport.go#L2545: 		req.Header.Get("Accept-Encoding") == "" &&
		transport.go#L2546: 		req.Header.Get("Range") == "" &&
		transport.go#L2571: 		!isProtocolSwitchHeader(req.Header) {

	net/http/httputil
		dump.go#L265: 	err = req.Header.WriteSubset(&b, reqWriteExcludeHeaderDump)
		reverseproxy.go#L153: 		if _, ok := req.Header["User-Agent"]; !ok {
		reverseproxy.go#L155: 			req.Header.Set("User-Agent", "")
		reverseproxy.go#L237: 	if outreq.Header == nil {
		reverseproxy.go#L238: 		outreq.Header = make(http.Header) // Issue 33142: historical behavior was to always allocate
		reverseproxy.go#L244: 	reqUpType := upgradeType(outreq.Header)
		reverseproxy.go#L245: 	removeConnectionHeaders(outreq.Header)
		reverseproxy.go#L251: 		hv := outreq.Header.Get(h)
		reverseproxy.go#L264: 		outreq.Header.Del(h)
		reverseproxy.go#L270: 		outreq.Header.Set("Connection", "Upgrade")
		reverseproxy.go#L271: 		outreq.Header.Set("Upgrade", reqUpType)
		reverseproxy.go#L278: 		prior, ok := outreq.Header["X-Forwarded-For"]
		reverseproxy.go#L284: 			outreq.Header.Set("X-Forwarded-For", clientIP)
		reverseproxy.go#L545: 	reqUpType := upgradeType(req.Header)

	cloud.google.com/go/compute/metadata
		metadata.go#L132: 		req.Header.Set("User-Agent", userAgent)
		metadata.go#L305: 	req.Header.Set("Metadata-Flavor", "Google")
		metadata.go#L306: 	req.Header.Set("User-Agent", userAgent)

	cloud.google.com/go/logging
		logging.go#L879: 		traceHeader := e.HTTPRequest.Request.Header.Get("X-Cloud-Trace-Context")

	cloud.google.com/go/storage
		reader.go#L124: 		req.Header.Set("X-Goog-User-Project", o.userProject)
		reader.go#L127: 		req.Header.Set("Accept-Encoding", "gzip")
		reader.go#L129: 	if err := setEncryptionHeaders(req.Header, o.encryptionKey, false); err != nil {
		reader.go#L140: 			req.Header.Set("Range", fmt.Sprintf("bytes=%d", start))
		reader.go#L142: 			req.Header.Set("Range", fmt.Sprintf("bytes=%d-", start))
		reader.go#L145: 			req.Header.Set("Range", fmt.Sprintf("bytes=%d-%d", start, offset+length-1))

	github.com/aws/aws-sdk-go/aws/corehandlers
		handlers.go#L34: 	if slength := r.HTTPRequest.Header.Get("Content-Length"); slength != "" {
		handlers.go#L49: 		r.HTTPRequest.Header.Set("Content-Length", fmt.Sprintf("%d", length))
		handlers.go#L52: 		r.HTTPRequest.Header.Del("Content-Length")

	github.com/aws/aws-sdk-go/aws/credentials/endpointcreds
		provider.go#L166: 	req.HTTPRequest.Header.Set("Accept", "application/json")
		provider.go#L168: 		req.HTTPRequest.Header.Set("Authorization", authToken)

	github.com/aws/aws-sdk-go/aws/csm
		reporter.go#L62: 		UserAgent: aws.String(r.HTTPRequest.Header.Get("User-Agent")),
		reporter.go#L116: 		UserAgent:          aws.String(r.HTTPRequest.Header.Get("User-Agent")),

	github.com/aws/aws-sdk-go/aws/ec2metadata
		api.go#L37: 	req.HTTPRequest.Header.Set(ttlHeader, ttl)
		token_provider.go#L45: 		r.HTTPRequest.Header.Set(tokenHeader, ec2Token.token)
		token_provider.go#L81: 		r.HTTPRequest.Header.Set(tokenHeader, ec2Token.token)

	github.com/aws/aws-sdk-go/aws/request
		handlers.go#L341: 		r.HTTPRequest.Header[k] = []string{v}
		http_request.go#L16: 	req.Header = http.Header{}
		http_request.go#L17: 	for k, v := range r.Header {
		http_request.go#L19: 			req.Header.Add(k, vv)
		request.go#L620: 	curUA := r.HTTPRequest.Header.Get("User-Agent")
		request.go#L624: 	r.HTTPRequest.Header.Set("User-Agent", s)

	github.com/aws/aws-sdk-go/aws/signer/v4
		v4.go#L406: 		ctx.Request.Header.Set("X-Amz-Security-Token", ctx.credValues.SessionToken)
		v4.go#L521: 	unsignedHeaders := ctx.Request.Header
		v4.go#L545: 		ctx.Request.Header.Set(authorizationHeader, strings.Join(parts, ", "))
		v4.go#L556: 	if auth := r.Header.Get(authorizationHeader); len(auth) != 0 {
		v4.go#L582: 		ctx.Request.Header.Set("X-Amz-Date", formatTime(ctx.Time))
		v4.go#L688: 	hash := ctx.Request.Header.Get("X-Amz-Content-Sha256")
		v4.go#L713: 			ctx.Request.Header.Set("X-Amz-Content-Sha256", hash)
		v4.go#L726: 	if ctx.Request.Header.Get("Authorization") != "" {

	github.com/aws/aws-sdk-go/private/protocol/query
		build.go#L30: 		r.HTTPRequest.Header.Set("Content-Type", "application/x-www-form-urlencoded; charset=utf-8")

	github.com/aws/aws-sdk-go/private/protocol/rest
		build.go#L110: 				err = buildHeaderMap(&r.HTTPRequest.Header, m, field.Tag)
		build.go#L112: 				err = buildHeader(&r.HTTPRequest.Header, m, name, field.Tag)

	github.com/evanw/esbuild/pkg/api
		serve_other.go#L242: 			if begin, end, ok := parseRangeHeader(req.Header.Get("Range"), len(fileContents)); ok && begin < end {

	github.com/go-git/go-git/v5/plumbing/transport/http
		common.go#L20: 	req.Header.Add("User-Agent", "git/1.0")
		common.go#L21: 	req.Header.Add("Host", host) // host:port
		common.go#L24: 		req.Header.Add("Accept", "*/*")
		common.go#L28: 	req.Header.Add("Accept", fmt.Sprintf("application/x-%s-result", requestType))
		common.go#L29: 	req.Header.Add("Content-Type", fmt.Sprintf("application/x-%s-request", requestType))
		common.go#L30: 	req.Header.Add("Content-Length", strconv.Itoa(content.Len()))
		common.go#L233: 	r.Header.Add("Authorization", fmt.Sprintf("Bearer %s", a.Token))

	github.com/prometheus/client_golang/prometheus/promhttp
		http.go#L147: 		contentType := expfmt.Negotiate(req.Header)
		http.go#L152: 		if !opts.DisableCompression && gzipAccepted(req.Header) {
		instrument_server.go#L306: 	for name, values := range r.Header {

	go.opencensus.io/plugin/ochttp
		trace.go#L76: 		for k, v := range req.Header {
		trace.go#L79: 		req.Header = header

	go.opencensus.io/plugin/ochttp/propagation/b3
		b3.go#L49: 	tid, ok := ParseTraceID(req.Header.Get(TraceIDHeader))
		b3.go#L53: 	sid, ok := ParseSpanID(req.Header.Get(SpanIDHeader))
		b3.go#L57: 	sampled, _ := ParseSampled(req.Header.Get(SampledHeader))
		b3.go#L113: 	req.Header.Set(TraceIDHeader, hex.EncodeToString(sc.TraceID[:]))
		b3.go#L114: 	req.Header.Set(SpanIDHeader, hex.EncodeToString(sc.SpanID[:]))
		b3.go#L122: 	req.Header.Set(SampledHeader, sampled)

	golang.org/x/net/context/ctxhttp
		ctxhttp.go#L64: 	req.Header.Set("Content-Type", bodyType)

	golang.org/x/net/http2
		server.go#L1883: 	} else if err := checkValidHTTP2RequestHeaders(req.Header); err != nil {
		server.go#L2120: 		Header:     rp.header,
		transport.go#L1002: 	if v := req.Header.Get("Upgrade"); v != "" {
		transport.go#L1003: 		return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
		transport.go#L1005: 	if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
		transport.go#L1008: 	if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !strings.EqualFold(vv[0], "close") && !strings.EqualFold(vv[0], "keep-alive")) {
		transport.go#L1059: 		req.Header.Get("Accept-Encoding") == "" &&
		transport.go#L1060: 		req.Header.Get("Range") == "" &&
		transport.go#L1501: 	for k, vv := range req.Header {
		transport.go#L1533: 		for k, vv := range req.Header {
		transport.go#L2615: 			cs.req.Header["Expect"],
		transport.go#L2671: 	return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")

	golang.org/x/oauth2
		token.go#L80: 	r.Header.Set("Authorization", t.Type()+" "+t.AccessToken)
		transport.go#L84: 	r2.Header = make(http.Header, len(r.Header))
		transport.go#L85: 	for k, s := range r.Header {
		transport.go#L86: 		r2.Header[k] = append([]string(nil), s...)

	golang.org/x/oauth2/internal
		token.go#L173: 	req.Header.Set("Content-Type", "application/x-www-form-urlencoded")

	golang.org/x/pkgsite/cmd/prober
		main.go#L344: 			req.Header.Set(config.BypassCacheAuthHeader, authValue)
		main.go#L346: 		req.Header.Set(config.BypassQuotaAuthHeader, authValue)

	golang.org/x/pkgsite/internal/auth
		auth.go#L54: 	return req.Header.Get("Authorization"), nil

	golang.org/x/pkgsite/internal/config
		config.go#L577: 	req.Header.Set("Metadata-Flavor", "Google")

	golang.org/x/pkgsite/internal/frontend
		playground.go#L35: 			req.Header.Add("X-Forwarded-Host", req.Host)
		playground.go#L36: 			req.Header.Add("X-Origin-Host", pgURL.Host)
		server.go#L190: 	userAgent := r.Header.Get("User-Agent")

	golang.org/x/pkgsite/internal/middleware
		caching.go#L129: 	authVal := r.Header.Get(config.BypassCacheAuthHeader)
		experiment.go#L121: 	ip := ipKey(r.Header.Get("X-Forwarded-For"))
		iapheader.go#L25: 				token := r.Header.Get("X-Goog-IAP-JWT-Assertion")
		quota.go#L80: 			authVal := r.Header.Get(config.BypassQuotaAuthHeader)
		quota.go#L89: 			header := r.Header.Get("X-Godoc-Forwarded-For")
		quota.go#L91: 				header = r.Header.Get("X-Forwarded-For")
		requestlog.go#L61: 	traceID := r.Header.Get("X-Cloud-Trace-Context")
		requestlog.go#L91: 			"isRobot":     isRobot(r.Header.Get("User-Agent")),

	golang.org/x/pkgsite/internal/proxy
		client.go#L256: 		req.Header.Set(disableFetchHeader, "true")
		server.go#L45: 		if uncached && r.Header.Get(disableFetchHeader) == "true" {

	google.golang.org/api/internal/gensupport
		resumable.go#L90: 	req.Header.Set("Content-Range", contentRange)
		resumable.go#L91: 	req.Header.Set("Content-Type", rx.MediaType)
		resumable.go#L92: 	req.Header.Set("User-Agent", rx.UserAgent)
		resumable.go#L101: 	req.Header.Set("X-GUploader-No-308", "yes")
		send.go#L39: 	if _, ok := req.Header["Accept-Encoding"]; ok {
		send.go#L89: 	if _, ok := req.Header["Accept-Encoding"]; ok {

	google.golang.org/api/internal/impersonate
		impersonate.go#L101: 	req.Header.Set("Content-Type", "application/json")

	google.golang.org/api/storage/v1
		storage-gen.go#L2461: 	req.Header = reqHeaders
		storage-gen.go#L2612: 	req.Header = reqHeaders
		storage-gen.go#L2781: 	req.Header = reqHeaders
		storage-gen.go#L2952: 	req.Header = reqHeaders
		storage-gen.go#L3115: 	req.Header = reqHeaders
		storage-gen.go#L3289: 	req.Header = reqHeaders
		storage-gen.go#L3470: 	req.Header = reqHeaders
		storage-gen.go#L3652: 	req.Header = reqHeaders
		storage-gen.go#L3858: 	req.Header = reqHeaders
		storage-gen.go#L4077: 	req.Header = reqHeaders
		storage-gen.go#L4332: 	req.Header = reqHeaders
		storage-gen.go#L4539: 	req.Header = reqHeaders
		storage-gen.go#L4779: 	req.Header = reqHeaders
		storage-gen.go#L5008: 	req.Header = reqHeaders
		storage-gen.go#L5181: 	req.Header = reqHeaders
		storage-gen.go#L5423: 	req.Header = reqHeaders
		storage-gen.go#L5635: 	req.Header = reqHeaders
		storage-gen.go#L5747: 	req.Header = reqHeaders
		storage-gen.go#L5898: 	req.Header = reqHeaders
		storage-gen.go#L6068: 	req.Header = reqHeaders
		storage-gen.go#L6256: 	req.Header = reqHeaders
		storage-gen.go#L6431: 	req.Header = reqHeaders
		storage-gen.go#L6605: 	req.Header = reqHeaders
		storage-gen.go#L6772: 	req.Header = reqHeaders
		storage-gen.go#L6923: 	req.Header = reqHeaders
		storage-gen.go#L7095: 	req.Header = reqHeaders
		storage-gen.go#L7268: 	req.Header = reqHeaders
		storage-gen.go#L7438: 	req.Header = reqHeaders
		storage-gen.go#L7613: 	req.Header = reqHeaders
		storage-gen.go#L7806: 	req.Header = reqHeaders
		storage-gen.go#L8001: 	req.Header = reqHeaders
		storage-gen.go#L8188: 	req.Header = reqHeaders
		storage-gen.go#L8386: 	req.Header = reqHeaders
		storage-gen.go#L8621: 	req.Header = reqHeaders
		storage-gen.go#L8964: 	req.Header = reqHeaders
		storage-gen.go#L9287: 	req.Header = reqHeaders
		storage-gen.go#L9523: 	req.Header = reqHeaders
		storage-gen.go#L9773: 	req.Header = reqHeaders
		storage-gen.go#L10102: 	req.Header = reqHeaders
		storage-gen.go#L10463: 	req.Header = reqHeaders
		storage-gen.go#L10782: 	req.Header = reqHeaders
		storage-gen.go#L11174: 	req.Header = reqHeaders
		storage-gen.go#L11477: 	req.Header = reqHeaders
		storage-gen.go#L11675: 	req.Header = reqHeaders
		storage-gen.go#L11938: 	req.Header = reqHeaders
		storage-gen.go#L12256: 	req.Header = reqHeaders
		storage-gen.go#L12467: 	req.Header = reqHeaders
		storage-gen.go#L12617: 	req.Header = reqHeaders
		storage-gen.go#L12755: 	req.Header = reqHeaders
		storage-gen.go#L12955: 	req.Header = reqHeaders
		storage-gen.go#L13152: 	req.Header = reqHeaders
		storage-gen.go#L13327: 	req.Header = reqHeaders

	google.golang.org/api/transport/http
		dial.go#L142: 	newReq.Header = make(http.Header)
		dial.go#L143: 	for k, vv := range req.Header {
		dial.go#L144: 		newReq.Header[k] = vv
		dial.go#L148: 		newReq.Header.Set("User-Agent", t.userAgent)
		dial.go#L153: 		newReq.Header.Set("X-Goog-User-Project", t.quotaProject)
		dial.go#L156: 		newReq.Header.Set("X-Goog-Request-Reason", t.requestReason)

	google.golang.org/api/transport/http/internal/propagation
		http.go#L36: 	h := req.Header.Get(httpHeader)
		http.go#L85: 	req.Header.Set(httpHeader, header)

	google.golang.org/grpc
		proxy.go#L89: 		Header: map[string][]string{"User-Agent": {grpcUA}},
		proxy.go#L94: 		req.Header.Add(proxyAuthHeaderKey, "Basic "+basicAuth(u, p))

	google.golang.org/grpc/internal/transport
		handler_server.go#L59: 	contentType := r.Header.Get("Content-Type")
		handler_server.go#L79: 	if v := r.Header.Get("grpc-timeout"); v != "" {
		handler_server.go#L92: 	for k, vv := range r.Header {
		handler_server.go#L362: 		recvCompress:   req.Header.Get("grpc-encoding"),