.. status: .. image:: https://img.shields.io/pypi/v/HTTPolice.svg :target: https://pypi.org/project/HTTPolice/ .. image:: https://img.shields.io/pypi/pyversions/HTTPolice.svg? :target: https://pypi.org/project/HTTPolice/ .. image:: https://readthedocs.org/projects/httpolice/badge/?version=stable :target: https://httpolice.readthedocs.io/ .. image:: https://travis-ci.org/vfaronov/httpolice.svg?branch=master :target: https://travis-ci.org/vfaronov/httpolice
HTTPolice is a validator or “linter” for HTTP requests and responses. It can spot bad header syntax, inappropriate status codes, and other potential problems in your HTTP server or client.
As a command-line tool, it can read
HAR files__ or raw HTTP/1.x TCP streams.
integrate with mitmproxy__ for TLS-encrypted and HTTP/2 traffic.
Or you can use it as a Python (3.4+) library.
There is a
Django integration__ package and a third-party
__ https://en.wikipedia.org/wiki/.har __ https://github.com/vfaronov/mitmproxy-httpolice __ https://github.com/vfaronov/django-httpolice __ https://chrome.google.com/webstore/detail/httpolice-devtool/hnlnhebgfcfemjaphgbeokdnfpgbnhgn
Start with the
user manual__ is available.
list of all problems__ HTTPolice can detect.
HTTPolice was partly inspired by
REDbot__, another QA tool for the Web.
But the approach is different: instead of actively testing your server,
HTTPolice just analyzes anything you feed into it.
Thus, it can be used on requests and responses captured
from a real process or test suite.
HTTPolice is hosted
and released under the MIT license (see
If you want to hack on HTTPolice, check out
BrowserStack__ kindly provide a free subscription for testing HTTPolice.