Skip to main content

HTTP request visualizer with detailed timing breakdown (DNS → TCP → TLS → HTTP)

Project description

httptap

Releases CI & Analysis Project Info
PyPI
Python Versions
CI
CodeQL
Coverage
Build Tool
Lint
License

httptap is a rich-powered CLI that dissects an HTTP request into every meaningful phase-DNS, TCP connect, TLS handshake, server wait, and body transfer and renders the results as a timeline table, compact summary, or machine-friendly metrics. It is designed for interactive troubleshooting, regression analysis, and recording of performance baselines.


Highlights

  • Phase-by-phase timing – precise measurements built from httpcore trace hooks (with sane fallbacks when metal-level data is unavailable).
  • IPv4/IPv6 aware – the resolver and TLS inspector report both the address and its family.
  • TLS insights – certificate CN, expiry countdown, cipher suite, and protocol version are captured automatically.
  • Multiple output modes – rich waterfall view, compact single-line summaries, or --metrics-only for scripting.
  • JSON export – persist full step data (including redirect chains) for later processing.
  • Extensible – clean Protocol interfaces for DNS, TLS, timing, visualization, and export so you can plug in custom behavior.

📣 Exclusive for httptap users: Save 50% on GitKraken Pro. Bundle GitKraken Client, GitLens for VS Code, and powerful CLI tools to accelerate every repo workflow.


Requirements

  • Python 3.10-3.14 (CPython)
  • macOS, Linux, or Windows (tested on CPython)
  • No system dependencies beyond standard networking
  • Code must follow the Google Python Style Guide (docstrings, formatting). See Google Python Style Guide

Installation

Using uv

uv pip install httptap

From source

git clone https://github.com/ozeranskii/httptap.git
cd httptap
uv pip install .

Quick Start

Currently httptap issues a GET request and streams the entire response body. Other HTTP methods and payloads are not supported yet; this keeps the interface simple and avoids exposing sensitive request data in output. If you need to profile POST/PUT workloads, you can wrap httptap and override the request executor to plug in custom behavior.

Run a single request and display a rich waterfall:

httptap https://httpbin.io

Add custom headers (repeat -H for multiple values):

httptap \
  -H "Accept: application/json" \
  -H "Authorization: Bearer super-secret" \
  https://httpbin.io/bearer

Follow redirect chains and dump metrics to JSON:

httptap --follow --json out/report.json https://httpbin.io/redirect/2

Collect compact (single-line) timings suitable for logs:

httptap --compact https://httpbin.io/get

Expose raw metrics for scripts:

httptap --metrics-only https://httpbin.io/get | tee timings.log

Programmatic users can inject a custom executor for advanced scenarios. The default analyzer accepts either a modern RequestExecutor implementation or a legacy callable wrapped with CallableRequestExecutor, so new request flags remain backward compatible.

Bypass TLS verification when troubleshooting self-signed endpoints:

httptap --ignore-ssl https://self-signed.badssl.com

The flag disables certificate validation and relaxes many handshake constraints so that legacy endpoints (expired/self-signed/hostname mismatches, weak hashes, older TLS versions) still complete. Some algorithms removed from modern OpenSSL builds (for example RC4 or 3DES) may remain unavailable. Use this mode only on trusted networks.

Route traffic through an HTTP/SOCKS proxy (explicit override takes precedence over env vars HTTP_PROXY, HTTPS_PROXY, NO_PROXY):

httptap --proxy socks5h://proxy.local:1080 https://example.com

The output and JSON export include the proxy URI so you can confirm what path was used.


Releasing

Prerequisites

  • GitHub Environment pypi must be configured in repository settings
  • PyPI Trusted Publishing configured for ozeranskii/httptap

Steps

  1. Trigger the Release workflow from GitHub Actions:
    • Provide exact version (e.g., 0.3.0), OR
    • Select bump type: patch, minor, or major
  2. The workflow will:
    • Update version in pyproject.toml using uv version
    • Generate changelog with git-cliff and update CHANGELOG.md
    • Commit changes and create a git tag
    • Run full test suite on the tagged version
    • Build wheel and source distribution
    • Publish to PyPI via Trusted Publishing (OIDC)
    • Create GitHub Release with generated notes

Sample Output

sample-output.png

The redirect summary includes a total row: sample-follow-redirects-output.png


JSON Export Structure

{
  "initial_url": "https://httpbin.io/redirect/2",
  "total_steps": 3,
  "steps": [
    {
      "url": "https://httpbin.io/redirect/2",
      "step_number": 1,
      "timing": {
        "dns_ms": 8.947208058089018,
        "connect_ms": 96.97712492197752,
        "tls_ms": 194.56583401188254,
        "ttfb_ms": 445.9513339679688,
        "total_ms": 447.3437919514254,
        "wait_ms": 145.46116697601974,
        "xfer_ms": 1.392457983456552,
        "is_estimated": false
      },
      "network": {
        "ip": "44.211.11.205",
        "ip_family": "IPv4",
        "tls_version": "TLSv1.2",
        "tls_cipher": "ECDHE-RSA-AES128-GCM-SHA256",
        "cert_cn": "httpbin.io",
        "cert_days_left": 143
      },
      "response": {
        "status": 302,
        "bytes": 0,
        "content_type": null,
        "server": null,
        "date": "2025-10-23T19:20:36+00:00",
        "location": "/relative-redirect/1",
        "headers": {
          "access-control-allow-credentials": "true",
          "access-control-allow-origin": "*",
          "location": "/relative-redirect/1",
          "date": "Thu, 23 Oct 2025 19:20:36 GMT",
          "content-length": "0"
        }
      },
      "error": null,
      "note": null
    },
    {
      "url": "https://httpbin.io/relative-redirect/1",
      "step_number": 2,
      "timing": {
        "dns_ms": 2.6895420160144567,
        "connect_ms": 97.51500003039837,
        "tls_ms": 193.99016606621444,
        "ttfb_ms": 400.2034160075709,
        "total_ms": 400.60841606464237,
        "wait_ms": 106.00870789494365,
        "xfer_ms": 0.4050000570714474,
        "is_estimated": false
      },
      "network": {
        "ip": "44.211.11.205",
        "ip_family": "IPv4",
        "tls_version": "TLSv1.2",
        "tls_cipher": "ECDHE-RSA-AES128-GCM-SHA256",
        "cert_cn": "httpbin.io",
        "cert_days_left": 143
      },
      "response": {
        "status": 302,
        "bytes": 0,
        "content_type": null,
        "server": null,
        "date": "2025-10-23T19:20:36+00:00",
        "location": "/get",
        "headers": {
          "access-control-allow-credentials": "true",
          "access-control-allow-origin": "*",
          "location": "/get",
          "date": "Thu, 23 Oct 2025 19:20:36 GMT",
          "content-length": "0"
        }
      },
      "error": null,
      "note": null
    },
    {
      "url": "https://httpbin.io/get",
      "step_number": 3,
      "timing": {
        "dns_ms": 2.643457963131368,
        "connect_ms": 97.36416593659669,
        "tls_ms": 197.3062080796808,
        "ttfb_ms": 403.2038329169154,
        "total_ms": 403.9644579170272,
        "wait_ms": 105.89000093750656,
        "xfer_ms": 0.7606250001117587,
        "is_estimated": false
      },
      "network": {
        "ip": "52.70.33.41",
        "ip_family": "IPv4",
        "tls_version": "TLSv1.2",
        "tls_cipher": "ECDHE-RSA-AES128-GCM-SHA256",
        "cert_cn": "httpbin.io",
        "cert_days_left": 143
      },
      "response": {
        "status": 200,
        "bytes": 389,
        "content_type": "application/json; charset=utf-8",
        "server": null,
        "date": "2025-10-23T19:20:37+00:00",
        "location": null,
        "headers": {
          "access-control-allow-credentials": "true",
          "access-control-allow-origin": "*",
          "content-type": "application/json; charset=utf-8",
          "date": "Thu, 23 Oct 2025 19:20:37 GMT",
          "content-length": "389"
        }
      },
      "error": null,
      "note": null
    }
  ],
  "summary": {
    "total_time_ms": 1251.916665933095,
    "final_status": 200,
    "final_url": "https://httpbin.io/get",
    "final_bytes": 389,
    "errors": 0
  }
}

Metrics-only scripting

httptap --metrics-only https://httpbin.io/get
Step 1: dns=30.1 connect=97.3 tls=199.0 ttfb=472.2 total=476.0 status=200 bytes=389 ip=44.211.11.205 family=IPv4
tls_version=TLSv1.2

Advanced Usage

Custom Implementations

Swap in your own resolver or TLS inspector (anything satisfying the Protocol from httptap.interfaces):

from httptap import HTTPTapAnalyzer, SystemDNSResolver


class HardcodedDNS(SystemDNSResolver):
    def resolve(self, host, port, timeout):
        return "93.184.216.34", "IPv4", 0.1


analyzer = HTTPTapAnalyzer(dns_resolver=HardcodedDNS())
steps = analyzer.analyze_url("https://httpbin.io")

Development

git clone https://github.com/ozeranskii/httptap.git
cd httptap
uv sync
uv run pytest
uv run ruff check
uv run ruff format .

Tests expect outbound network access; you can mock SystemDNSResolver / SocketTLSInspector when running offline.


Contributing

  1. Fork and clone the repo.
  2. Create a feature branch.
  3. Run pytest and ruff before committing.
  4. Submit a pull request with a clear description and any relevant screenshots or benchmarks.

We welcome bug reports, feature proposals, doc improvements, and creative new visualizations or exporters.


License

Apache License 2.0 © httptap contributors. See LICENSE for details.


Acknowledgements

  • Built on the shoulders of fantastic libraries: httpx, httpcore, and Rich.
  • Inspired by the tooling ecosystem around web performance (e.g., DevTools waterfalls, curl --trace).
  • Special thanks to everyone who opens issues, shares ideas, or contributes patches.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

httptap-0.2.0.tar.gz (35.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

httptap-0.2.0-py3-none-any.whl (43.8 kB view details)

Uploaded Python 3

File details

Details for the file httptap-0.2.0.tar.gz.

File metadata

  • Download URL: httptap-0.2.0.tar.gz
  • Upload date:
  • Size: 35.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for httptap-0.2.0.tar.gz
Algorithm Hash digest
SHA256 50a029b1fe4d67cd42e39f92e955b87b2377c0149409390e44c891f716c99394
MD5 d95679b958a425d7f0809f4b47c14e47
BLAKE2b-256 302cbb8ab02dcc3e37228db762d513851866ab28d8fc6787a8b7744340a7faea

See more details on using hashes here.

Provenance

The following attestation bundles were made for httptap-0.2.0.tar.gz:

Publisher: release.yml on ozeranskii/httptap

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file httptap-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: httptap-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 43.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for httptap-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 d43345b012b80d60d03fdebf8313dd532e653c7f3a0161a7a0af53cda1983f83
MD5 8fcd017b3cf5509d5a0a1a3350a3e452
BLAKE2b-256 c45f4b5a68935940f7a64dff5e5ef41ccb11c2efe3940f1984e26ff6cbc57156

See more details on using hashes here.

Provenance

The following attestation bundles were made for httptap-0.2.0-py3-none-any.whl:

Publisher: release.yml on ozeranskii/httptap

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page