
leak-finder-for-javascript - issue #16
"uncaptured python exception" when test-page is hosted in an iframe
What steps will reproduce the problem? 1.Create an html page that hosts the test-page provided in the docs in an iframe: <!DOCTYPE html> <html> <head> <title>Host the page with the memory leak</title> </head> <body> <h1>Host the page with the memory leak</h1> <iframe src="test-page.html" width="400" height="400"/> </body> </html> 2. Run the memory leak finder with the given instructions
Expect: To see a leak detected report.
Actual: $ python jsleakcheck.py -d closure-disposable -v INFO:root:Using leak definition closure-disposable DEBUG:root:[ { "description": "", "devtoolsFrontendUrl": "/devtools/devtools.html?ws=localhost:9222/devtools/pa ge/C5762B8C-5279-4604-9821-DE5DCF4DFAAB", "id": "C5762B8C-5279-4604-9821-DE5DCF4DFAAB", "title": "Host the page with the memory leak", "type": "page", "url": "file:///C:/.../depot_tools/leak-finder/doc/host-page.htm l", "webSocketDebuggerUrl": "ws://localhost:9222/devtools/page/C5762B8C-5279-4604 -9821-DE5DCF4DFAAB" } ]
DEBUG:root:{"description": "", "title": "Host the page with the memory leak", "u rl": "file:///.../depot_tools/leak-finder/doc/host-page.html", " webSocketDebuggerUrl": "ws://localhost:9222/devtools/page/C5762B8C-5279-4604-982 1-DE5DCF4DFAAB", "type": "page", "id": "C5762B8C-5279-4604-9821-DE5DCF4DFAAB", " devtoolsFrontendUrl": "/devtools/devtools.html?ws=localhost:9222/devtools/page/C 5762B8C-5279-4604-9821-DE5DCF4DFAAB"} INFO:root:Reading suppressions from "closure-disposable-suppressions.txt" INFO:root:Taking heap snapshot INFO:root:Analyzing heap snapshot INFO:root:Retrieving creating stack traces for leaking objects error: uncaptured python exception, closing channel <remote_inspector_client._De vToolsSocketClient at 0x30237c8> (<type 'exceptions.KeyError'>:'value' [C:\Pytho n27\Lib\asyncore.py|read|83] [C:\Python27\Lib\asyncore.py|handle_read_event|442] [../../pyautolib/remote_inspector_client.py|handle_read|220] [../../pyautolib/r emote_inspector_client.py|NotifyReply|344] [../../pyautolib/remote_inspector_cli ent.py|HandleReply|931])
OS: Windows SHA:3a6c8723
Status: New
Labels:
Type-Defect
Priority-Medium