net/http.Request.Header (field)
253 uses
net/http (current package)
client.go#L233: if req.Header == nil {
client.go#L235: req.Header = make(Header)
client.go#L238: if u := req.URL.User; u != nil && req.Header.Get("Authorization") == "" {
client.go#L242: req.Header = cloneOrMakeHeader(ireq.Header)
client.go#L243: req.Header.Set("Authorization", "Basic "+basicAuth(username, password))
client.go#L658: Header: make(Header),
client.go#L681: req.Header.Set("Referer", ref)
client.go#L747: ireqhdr = cloneOrMakeHeader(ireq.Header)
client.go#L750: if c.Jar != nil && ireq.Header.Get("Cookie") != "" {
client.go#L796: req.Header[k] = vv
client.go#L844: req.Header.Set("Content-Type", contentType)
fs.go#L392: im := r.Header.Get("If-Match")
fs.go#L422: ius := r.Header.Get("If-Unmodified-Since")
fs.go#L441: inm := r.Header.get("If-None-Match")
fs.go#L474: ims := r.Header.Get("If-Modified-Since")
fs.go#L495: ir := r.Header.get("If-Range")
fs.go#L578: rangeHeader = r.Header.get("Range")
h2_bundle.go#L5438: } else if err := http2checkValidHTTP2RequestHeaders(req.Header); err != nil {
h2_bundle.go#L5675: Header: rp.header,
h2_bundle.go#L7505: if v := req.Header.Get("Upgrade"); v != "" {
h2_bundle.go#L7506: return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
h2_bundle.go#L7508: if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
h2_bundle.go#L7511: if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !strings.EqualFold(vv[0], "close") && !strings.EqualFold(vv[0], "keep-alive")) {
h2_bundle.go#L7562: req.Header.Get("Accept-Encoding") == "" &&
h2_bundle.go#L7563: req.Header.Get("Range") == "" &&
h2_bundle.go#L8004: for k, vv := range req.Header {
h2_bundle.go#L8036: for k, vv := range req.Header {
h2_bundle.go#L9119: cs.req.Header["Expect"],
h2_bundle.go#L9175: return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")
request.go#L165: Header Header
request.go#L379: if r.Header != nil {
request.go#L380: r2.Header = r.Header.Clone()
request.go#L405: return r.Header.Get("User-Agent")
request.go#L410: return readCookies(r.Header, "")
request.go#L421: for _, c := range readCookies(r.Header, name) {
request.go#L435: if c := r.Header.Get("Cookie"); c != "" {
request.go#L436: r.Header.Set("Cookie", c+"; "+s)
request.go#L438: r.Header.Set("Cookie", s)
request.go#L451: return r.Header.Get("Referer")
request.go#L478: v := r.Header.Get("Content-Type")
request.go#L496: return r.Method == "PRI" && len(r.Header) == 0 && r.URL.Path == "*" && r.Proto == "HTTP/2.0"
request.go#L627: if r.Header.has("User-Agent") {
request.go#L628: userAgent = r.Header.Get("User-Agent")
request.go#L650: err = r.Header.writeSubset(w, reqWriteExcludeHeader, trace)
request.go#L883: Header: make(Header),
request.go#L938: auth := r.Header.Get("Authorization")
request.go#L975: r.Header.Set("Authorization", "Basic "+basicAuth(username, password))
request.go#L1078: req.Header = Header(mimeHeader)
request.go#L1089: req.Host = req.Header.get("Host")
request.go#L1092: delete(req.Header, "Host")
request.go#L1095: fixPragmaCacheControl(req.Header)
request.go#L1097: req.Close = shouldClose(req.ProtoMajor, req.ProtoMinor, req.Header, false)
request.go#L1192: ct := r.Header.Get("Content-Type")
request.go#L1384: return hasToken(r.Header.get("Expect"), "100-continue")
request.go#L1391: return hasToken(r.Header.get("Connection"), "keep-alive")
request.go#L1398: return hasToken(r.Header.get("Connection"), "close")
request.go#L1417: if r.Header.has("Idempotency-Key") || r.Header.has("X-Idempotency-Key") {
request.go#L1454: return hasToken(r.Header.Get("Connection"), "upgrade") &&
request.go#L1455: strings.EqualFold(r.Header.Get("Upgrade"), "websocket")
server.go#L1001: hosts, haveHost := req.Header["Host"]
server.go#L1012: for k, vv := range req.Header {
server.go#L1022: delete(req.Header, "Host")
server.go#L1932: } else if req.Header.get("Expect") != "" {
transfer.go#L88: t.Header = rr.Header
transfer.go#L499: t.Header = rr.Header
transport.go#L511: if req.Header == nil {
transport.go#L518: for k, vv := range req.Header {
transport.go#L1669: Header: hdr,
transport.go#L2545: req.Header.Get("Accept-Encoding") == "" &&
transport.go#L2546: req.Header.Get("Range") == "" &&
transport.go#L2571: !isProtocolSwitchHeader(req.Header) {
net/http/httputil
dump.go#L265: err = req.Header.WriteSubset(&b, reqWriteExcludeHeaderDump)
reverseproxy.go#L153: if _, ok := req.Header["User-Agent"]; !ok {
reverseproxy.go#L155: req.Header.Set("User-Agent", "")
reverseproxy.go#L237: if outreq.Header == nil {
reverseproxy.go#L238: outreq.Header = make(http.Header) // Issue 33142: historical behavior was to always allocate
reverseproxy.go#L244: reqUpType := upgradeType(outreq.Header)
reverseproxy.go#L245: removeConnectionHeaders(outreq.Header)
reverseproxy.go#L251: hv := outreq.Header.Get(h)
reverseproxy.go#L264: outreq.Header.Del(h)
reverseproxy.go#L270: outreq.Header.Set("Connection", "Upgrade")
reverseproxy.go#L271: outreq.Header.Set("Upgrade", reqUpType)
reverseproxy.go#L278: prior, ok := outreq.Header["X-Forwarded-For"]
reverseproxy.go#L284: outreq.Header.Set("X-Forwarded-For", clientIP)
reverseproxy.go#L545: reqUpType := upgradeType(req.Header)
cloud.google.com/go/compute/metadata
metadata.go#L132: req.Header.Set("User-Agent", userAgent)
metadata.go#L305: req.Header.Set("Metadata-Flavor", "Google")
metadata.go#L306: req.Header.Set("User-Agent", userAgent)
cloud.google.com/go/logging
logging.go#L879: traceHeader := e.HTTPRequest.Request.Header.Get("X-Cloud-Trace-Context")
cloud.google.com/go/storage
reader.go#L124: req.Header.Set("X-Goog-User-Project", o.userProject)
reader.go#L127: req.Header.Set("Accept-Encoding", "gzip")
reader.go#L129: if err := setEncryptionHeaders(req.Header, o.encryptionKey, false); err != nil {
reader.go#L140: req.Header.Set("Range", fmt.Sprintf("bytes=%d", start))
reader.go#L142: req.Header.Set("Range", fmt.Sprintf("bytes=%d-", start))
reader.go#L145: req.Header.Set("Range", fmt.Sprintf("bytes=%d-%d", start, offset+length-1))
github.com/aws/aws-sdk-go/aws/corehandlers
handlers.go#L34: if slength := r.HTTPRequest.Header.Get("Content-Length"); slength != "" {
handlers.go#L49: r.HTTPRequest.Header.Set("Content-Length", fmt.Sprintf("%d", length))
handlers.go#L52: r.HTTPRequest.Header.Del("Content-Length")
github.com/aws/aws-sdk-go/aws/credentials/endpointcreds
provider.go#L166: req.HTTPRequest.Header.Set("Accept", "application/json")
provider.go#L168: req.HTTPRequest.Header.Set("Authorization", authToken)
github.com/aws/aws-sdk-go/aws/csm
reporter.go#L62: UserAgent: aws.String(r.HTTPRequest.Header.Get("User-Agent")),
reporter.go#L116: UserAgent: aws.String(r.HTTPRequest.Header.Get("User-Agent")),
github.com/aws/aws-sdk-go/aws/ec2metadata
api.go#L37: req.HTTPRequest.Header.Set(ttlHeader, ttl)
token_provider.go#L45: r.HTTPRequest.Header.Set(tokenHeader, ec2Token.token)
token_provider.go#L81: r.HTTPRequest.Header.Set(tokenHeader, ec2Token.token)
github.com/aws/aws-sdk-go/aws/request
handlers.go#L341: r.HTTPRequest.Header[k] = []string{v}
http_request.go#L16: req.Header = http.Header{}
http_request.go#L17: for k, v := range r.Header {
http_request.go#L19: req.Header.Add(k, vv)
request.go#L620: curUA := r.HTTPRequest.Header.Get("User-Agent")
request.go#L624: r.HTTPRequest.Header.Set("User-Agent", s)
github.com/aws/aws-sdk-go/aws/signer/v4
v4.go#L406: ctx.Request.Header.Set("X-Amz-Security-Token", ctx.credValues.SessionToken)
v4.go#L521: unsignedHeaders := ctx.Request.Header
v4.go#L545: ctx.Request.Header.Set(authorizationHeader, strings.Join(parts, ", "))
v4.go#L556: if auth := r.Header.Get(authorizationHeader); len(auth) != 0 {
v4.go#L582: ctx.Request.Header.Set("X-Amz-Date", formatTime(ctx.Time))
v4.go#L688: hash := ctx.Request.Header.Get("X-Amz-Content-Sha256")
v4.go#L713: ctx.Request.Header.Set("X-Amz-Content-Sha256", hash)
v4.go#L726: if ctx.Request.Header.Get("Authorization") != "" {
github.com/aws/aws-sdk-go/private/protocol/query
build.go#L30: r.HTTPRequest.Header.Set("Content-Type", "application/x-www-form-urlencoded; charset=utf-8")
github.com/aws/aws-sdk-go/private/protocol/rest
build.go#L110: err = buildHeaderMap(&r.HTTPRequest.Header, m, field.Tag)
build.go#L112: err = buildHeader(&r.HTTPRequest.Header, m, name, field.Tag)
github.com/evanw/esbuild/pkg/api
serve_other.go#L242: if begin, end, ok := parseRangeHeader(req.Header.Get("Range"), len(fileContents)); ok && begin < end {
github.com/go-git/go-git/v5/plumbing/transport/http
common.go#L20: req.Header.Add("User-Agent", "git/1.0")
common.go#L21: req.Header.Add("Host", host) // host:port
common.go#L24: req.Header.Add("Accept", "*/*")
common.go#L28: req.Header.Add("Accept", fmt.Sprintf("application/x-%s-result", requestType))
common.go#L29: req.Header.Add("Content-Type", fmt.Sprintf("application/x-%s-request", requestType))
common.go#L30: req.Header.Add("Content-Length", strconv.Itoa(content.Len()))
common.go#L233: r.Header.Add("Authorization", fmt.Sprintf("Bearer %s", a.Token))
github.com/prometheus/client_golang/prometheus/promhttp
http.go#L147: contentType := expfmt.Negotiate(req.Header)
http.go#L152: if !opts.DisableCompression && gzipAccepted(req.Header) {
instrument_server.go#L306: for name, values := range r.Header {
go.opencensus.io/plugin/ochttp
trace.go#L76: for k, v := range req.Header {
trace.go#L79: req.Header = header
go.opencensus.io/plugin/ochttp/propagation/b3
b3.go#L49: tid, ok := ParseTraceID(req.Header.Get(TraceIDHeader))
b3.go#L53: sid, ok := ParseSpanID(req.Header.Get(SpanIDHeader))
b3.go#L57: sampled, _ := ParseSampled(req.Header.Get(SampledHeader))
b3.go#L113: req.Header.Set(TraceIDHeader, hex.EncodeToString(sc.TraceID[:]))
b3.go#L114: req.Header.Set(SpanIDHeader, hex.EncodeToString(sc.SpanID[:]))
b3.go#L122: req.Header.Set(SampledHeader, sampled)
golang.org/x/net/context/ctxhttp
ctxhttp.go#L64: req.Header.Set("Content-Type", bodyType)
golang.org/x/net/http2
server.go#L1883: } else if err := checkValidHTTP2RequestHeaders(req.Header); err != nil {
server.go#L2120: Header: rp.header,
transport.go#L1002: if v := req.Header.Get("Upgrade"); v != "" {
transport.go#L1003: return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
transport.go#L1005: if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
transport.go#L1008: if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !strings.EqualFold(vv[0], "close") && !strings.EqualFold(vv[0], "keep-alive")) {
transport.go#L1059: req.Header.Get("Accept-Encoding") == "" &&
transport.go#L1060: req.Header.Get("Range") == "" &&
transport.go#L1501: for k, vv := range req.Header {
transport.go#L1533: for k, vv := range req.Header {
transport.go#L2615: cs.req.Header["Expect"],
transport.go#L2671: return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")
golang.org/x/oauth2
token.go#L80: r.Header.Set("Authorization", t.Type()+" "+t.AccessToken)
transport.go#L84: r2.Header = make(http.Header, len(r.Header))
transport.go#L85: for k, s := range r.Header {
transport.go#L86: r2.Header[k] = append([]string(nil), s...)
golang.org/x/oauth2/internal
token.go#L173: req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
golang.org/x/pkgsite/cmd/prober
main.go#L344: req.Header.Set(config.BypassCacheAuthHeader, authValue)
main.go#L346: req.Header.Set(config.BypassQuotaAuthHeader, authValue)
golang.org/x/pkgsite/internal/auth
auth.go#L54: return req.Header.Get("Authorization"), nil
golang.org/x/pkgsite/internal/config
config.go#L577: req.Header.Set("Metadata-Flavor", "Google")
golang.org/x/pkgsite/internal/frontend
playground.go#L35: req.Header.Add("X-Forwarded-Host", req.Host)
playground.go#L36: req.Header.Add("X-Origin-Host", pgURL.Host)
server.go#L190: userAgent := r.Header.Get("User-Agent")
golang.org/x/pkgsite/internal/middleware
caching.go#L129: authVal := r.Header.Get(config.BypassCacheAuthHeader)
experiment.go#L121: ip := ipKey(r.Header.Get("X-Forwarded-For"))
iapheader.go#L25: token := r.Header.Get("X-Goog-IAP-JWT-Assertion")
quota.go#L80: authVal := r.Header.Get(config.BypassQuotaAuthHeader)
quota.go#L89: header := r.Header.Get("X-Godoc-Forwarded-For")
quota.go#L91: header = r.Header.Get("X-Forwarded-For")
requestlog.go#L61: traceID := r.Header.Get("X-Cloud-Trace-Context")
requestlog.go#L91: "isRobot": isRobot(r.Header.Get("User-Agent")),
golang.org/x/pkgsite/internal/proxy
client.go#L256: req.Header.Set(disableFetchHeader, "true")
server.go#L45: if uncached && r.Header.Get(disableFetchHeader) == "true" {
google.golang.org/api/internal/gensupport
resumable.go#L90: req.Header.Set("Content-Range", contentRange)
resumable.go#L91: req.Header.Set("Content-Type", rx.MediaType)
resumable.go#L92: req.Header.Set("User-Agent", rx.UserAgent)
resumable.go#L101: req.Header.Set("X-GUploader-No-308", "yes")
send.go#L39: if _, ok := req.Header["Accept-Encoding"]; ok {
send.go#L89: if _, ok := req.Header["Accept-Encoding"]; ok {
google.golang.org/api/internal/impersonate
impersonate.go#L101: req.Header.Set("Content-Type", "application/json")
google.golang.org/api/storage/v1
storage-gen.go#L2461: req.Header = reqHeaders
storage-gen.go#L2612: req.Header = reqHeaders
storage-gen.go#L2781: req.Header = reqHeaders
storage-gen.go#L2952: req.Header = reqHeaders
storage-gen.go#L3115: req.Header = reqHeaders
storage-gen.go#L3289: req.Header = reqHeaders
storage-gen.go#L3470: req.Header = reqHeaders
storage-gen.go#L3652: req.Header = reqHeaders
storage-gen.go#L3858: req.Header = reqHeaders
storage-gen.go#L4077: req.Header = reqHeaders
storage-gen.go#L4332: req.Header = reqHeaders
storage-gen.go#L4539: req.Header = reqHeaders
storage-gen.go#L4779: req.Header = reqHeaders
storage-gen.go#L5008: req.Header = reqHeaders
storage-gen.go#L5181: req.Header = reqHeaders
storage-gen.go#L5423: req.Header = reqHeaders
storage-gen.go#L5635: req.Header = reqHeaders
storage-gen.go#L5747: req.Header = reqHeaders
storage-gen.go#L5898: req.Header = reqHeaders
storage-gen.go#L6068: req.Header = reqHeaders
storage-gen.go#L6256: req.Header = reqHeaders
storage-gen.go#L6431: req.Header = reqHeaders
storage-gen.go#L6605: req.Header = reqHeaders
storage-gen.go#L6772: req.Header = reqHeaders
storage-gen.go#L6923: req.Header = reqHeaders
storage-gen.go#L7095: req.Header = reqHeaders
storage-gen.go#L7268: req.Header = reqHeaders
storage-gen.go#L7438: req.Header = reqHeaders
storage-gen.go#L7613: req.Header = reqHeaders
storage-gen.go#L7806: req.Header = reqHeaders
storage-gen.go#L8001: req.Header = reqHeaders
storage-gen.go#L8188: req.Header = reqHeaders
storage-gen.go#L8386: req.Header = reqHeaders
storage-gen.go#L8621: req.Header = reqHeaders
storage-gen.go#L8964: req.Header = reqHeaders
storage-gen.go#L9287: req.Header = reqHeaders
storage-gen.go#L9523: req.Header = reqHeaders
storage-gen.go#L9773: req.Header = reqHeaders
storage-gen.go#L10102: req.Header = reqHeaders
storage-gen.go#L10463: req.Header = reqHeaders
storage-gen.go#L10782: req.Header = reqHeaders
storage-gen.go#L11174: req.Header = reqHeaders
storage-gen.go#L11477: req.Header = reqHeaders
storage-gen.go#L11675: req.Header = reqHeaders
storage-gen.go#L11938: req.Header = reqHeaders
storage-gen.go#L12256: req.Header = reqHeaders
storage-gen.go#L12467: req.Header = reqHeaders
storage-gen.go#L12617: req.Header = reqHeaders
storage-gen.go#L12755: req.Header = reqHeaders
storage-gen.go#L12955: req.Header = reqHeaders
storage-gen.go#L13152: req.Header = reqHeaders
storage-gen.go#L13327: req.Header = reqHeaders
google.golang.org/api/transport/http
dial.go#L142: newReq.Header = make(http.Header)
dial.go#L143: for k, vv := range req.Header {
dial.go#L144: newReq.Header[k] = vv
dial.go#L148: newReq.Header.Set("User-Agent", t.userAgent)
dial.go#L153: newReq.Header.Set("X-Goog-User-Project", t.quotaProject)
dial.go#L156: newReq.Header.Set("X-Goog-Request-Reason", t.requestReason)
google.golang.org/api/transport/http/internal/propagation
http.go#L36: h := req.Header.Get(httpHeader)
http.go#L85: req.Header.Set(httpHeader, header)
google.golang.org/grpc
proxy.go#L89: Header: map[string][]string{"User-Agent": {grpcUA}},
proxy.go#L94: req.Header.Add(proxyAuthHeaderKey, "Basic "+basicAuth(u, p))
google.golang.org/grpc/internal/transport
handler_server.go#L59: contentType := r.Header.Get("Content-Type")
handler_server.go#L79: if v := r.Header.Get("grpc-timeout"); v != "" {
handler_server.go#L92: for k, vv := range r.Header {
handler_server.go#L362: recvCompress: req.Header.Get("grpc-encoding"),
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |