fuite /fɥit/ French for "leak"
fuite
is a CLI tool for finding memory leaks in web apps.
npx fuite https://example.com
This will check for leaks and print output to stdout.
By default, fuite
will assume that the site is a client-rendered webapp, and it will search for internal links on the given page. Then for each link, it will:
- Click the link
- Press the browser back button
- Repeat to see if the scenario is leaking
For other scenarios, see scenarios.
fuite
launches Chrome using Puppeteer, loads a web page, and runs a scenario against it. It runs the scenario some number of iterations (7 by default) and looks for objects that leaked 7 times (or 14 times, or 28 times). This might sound like a strange approach, but it's useful for cutting through the noise in memory analysis.
fuite
looks for the following leaks:
- Objects (captured with Chrome heap snapshots)
- Event listeners
- DOM nodes (attached to the DOM – detached nodes will show under "Objects")
- Collections such as Arrays, Maps, Sets, and plain Objects
The default scenario clicks internal links because it's the most generic scenario that can be run against a wide variety of SPAs, and it will often catch leaks if client-side routing is used.
Usage: fuite [options] <url>
Arguments:
url URL to load in the browser and analyze
Options:
-o, --output <file> Write JSON output to a file
-i, --iterations <number> Number of iterations (default: 7)
-s, --scenario <scenario> Scenario file to run
-H, --heapsnapshot Save heapsnapshot files
-d, --debug Run in debug mode
-V, --version output the version number
-h, --help display help for command
fuite <url>
The URL to load. This should be whatever landing page you want to start at – you can use the setup
option in a custom scenario if you need to log in.
-o, --output <file>
fuite
generates a lot of data, but not all of it is shown in the CLI output. To dig deeper, use the --output
option to create a JSON file containing fuite
's anlaysis. This contains additional information such as the line of code that an event listener was declared on.
Anything that you see in the CLI, you can also find in the output JSON file.
-i, --iterations <number>
By default, fuite
runs 7 iterations. But you can change this number.
Why 7? Well, it's a nice, small, prime number. If you repeat an action 7 times and some object is leaking exactly 7 times, it's pretty unlikely to be unrelated. That said, on a very complex page, there may be enough noise that 7 is too small to cut through the noise – so you might try 13, 17, or 19 instead. Or 1 if you like to live dangerously.
--scenario <scenario>
The default scenario is to find all internal links on the page, click them, and press the back button. You can also define a scenario file that does whatever you want:
fuite --scenario ./myScenario.js https://example.com
// myScenario.js
export async function setup(page) {
// Setup code to run before each test
}
export async function createTests(page) {
// Code to run once on the page to determine which tests to run
}
export async function iteration(page, data) {
// Run a single iteration against a page – e.g., click a link and then go back
}
Your myScenario.js
can export several async function
s. Here's what they do:
The setup
function takes a Puppeteer page as input and returns undefined. It runs before each iteration
, or before createTests
. This is a good place to log in, if your webapp requires a login.
If this function is not defined, then no setup code will be run.
The createTests
function takes a Puppeteer page as input and returns an array of plain objects representing the tests to run, and the data to pass for each one. This is useful if you want to dynamically determine what tests to run against a page (for instance, which links to click).
If this function is not defined, then the default tests are [{}]
(a single test with empty data).
The iteration
function takes a Puppeteer page and iteration data as input and returns undefined. It runs for each iteration of the memory leak test. The iteration data is a plain object and comes from the createTests
function, so by default it is just an empty object: {}
.
Inside of an iteration
, you want to run the core test logic that you want to test for leaks. The idea is that, at the beginning of the iteration and at the end, the memory should be the same. So an iteration might do things like:
- Click a link, then go back
- Click to launch a modal dialog, then press the Esc key
- Hover to show a tooltip, then hover away to dismiss the tooltip
- Etc.
The iteration assumes that whatever page it starts at, it ends up at that same page. If you test a multi-page app in this way, then it's extremely unlikely you'll detect any leaks, since multi-page apps don't leak memory in the same way that SPAs do when navigating between routes.
-H, --heapsnapshot Save heapsnapshot files
By default, fuite
doesn't save any heap snapshot files that it captures (to avoid filling up your disk with large files). If you use the --heapsnapshot
flag, though, then the files will be saved in the /tmp
directory, and the CLI will output their location. That way, you can inspect them and load them into the Chrome DevTools memory tool yourself.
-d, --debug Run in debug mode
Debug mode lets you drill in to a complex scenario and debug it yourself using the Chrome DevTools. The best way to run it is:
NODE_OPTIONS=--inspect-brk fuite --debug <url>
Then navigate to chrome:inspect
in Chrome, click "Open dedicated DevTools for Node," and now you are debugging fuite
itself.
This will launch Chrome in non-headless mode, and it will also automatically pause before running iterations and afterwards. That way, you can open up the Chrome DevTools and analyze the scenario yourself, take your own heap snapshots, etc.
fuite
can also be used via a JavaScript API, which works similarly to the CLI:
import { findLeaks } from 'fuite'
const results = findLeaks('https://example.com', {
scenario: scenarioObject,
heapsnapshot: false,
debug: false
})
for await (const result of results) {
console.log(result)
}
Note that findLeaks
returns an async iterable.
This returns the same output you would get using --output <filename>
in the CLI – a plain object describing the leak. The format of the object is not fully specified yet, but a basic shape can be found in the TypeScript types.
You can also pass in an AbortSignal
to cancel the test on-demand:
const controller = new AbortController();
const { signal } = controller;
findLeaks('https://example.com', { signal });
// Later
controller.abort();
If you're writing your own custom scenario, you can also extend the default scenario. For instance, if you want the default scenario, but to be able to log in with a username and password:
import { defaultScenario, findLeaks } from 'fuite'
const myScenario = {
...defaultScenario,
async setup(page) {
await page.type('#username', 'myusername')
await page.type('#password', 'mypassword')
await page.click('#submit')
}
}
await findLeaks('https://example.com', {
scenario: myScenario
})
fuite
focuses on the main frame of a page. If you have memory leaks in cross-origin iframes or web workers, then the tool will not find those.
Similarly, fuite
measures the JavaScript heap size of the page, corresponding to what you see in the Chrome DevTool's Memory tab. It ignores the size of native browser objects.
fuite
works best when your source code is unminified. Otherwise the class names will show as the minified versions, which can be hard to debug.
fuite
may use a lot of memory itself to analyze large heap snapshot files. If you find that Node.js is running out of memory, you can run something like:
NODE_OPTIONS=--max-old-space-size=8000 npx fuite <url>
The above command will provide 8GB of memory to fuite
.
The results seem wrong or inconsistent.
Try running with --iterations 13
or --iterations 17
. The default of 7 iterations is decent, but it might report some false positives.
It says I'm leaking 1kB. Do I really need to fix this?
Not every memory leak is a serious problem. If you're only leaking a few kBs on every interaction, then the user will probably never notice, and you'll certainly never hit an Out Of Memory error in the browser. Your ceiling for "acceptable leaks" will differ, though, depending on your use case. E.g., if you're building for embedded devices, then you probably want to keep your memory usage much lower.
It says my page's memory grew, but it also said it didn't detect any leaks. Why?
Web pages can grow memory for lots of reasons. For instance, the browser's JavaScript engine may JIT certain functions, taking up additional memory. Or the browser may decide to use certain internal data structures to prioritize CPU over memory usage.
The web developer generally doesn't have control over such things, so fuite
tries to distinguish between browser-internal memory and JavaScript objects that the page owns. fuite
will only say "leak detected" if it can actually give some actionable advice to the web developer.
How do I debug leaking event listeners?
Use the --output
command to output a JSON file, which will contain a list of event listeners and the line of code they were declared on. Otherwise, you can use the Chrome DevTools to analyze event listeners:
- Open the DevTools
- Open the Elements panel
- Open Event Listeners
- Alternatively, run
getEventListeners(node)
in the DevTools console
How do I debug leaking collections?
Figuring out why an Array or Object is continually growing may be tricky. First, run fuite
in debug mode:
NODE_OPTIONS=--inspect-brk fuite https://example.com --debug
Then open chrome:inspect
in Chrome and click "Open dedicated DevTools for Node." Then, when the breakpoint is hit, open the DevTools in Chrome and click the "Play" button to let the scenario keep running.
Eventually fuite
will give you a breakpoint in the Chrome DevTools itself, where you have access to the leaking collection (Array, Map, etc.) and can inspect it.
One technique is to override the object's methods to check whenever it's called:
for (const prop of ['push', 'concat', 'unshift', 'splice']) {
const original = array[prop]
array[prop] = function () {
debugger
return array[prop].apply(this, arguments)
}
}
Note that not every leaking collection is a serious memory leak: for instance, your router may keep some metadata about past routes in an ever-growing stack. Or your analytics library may store some timings in an array that continually grows. These are generally not a concern unless the objects are huge, or contain closures that reference lots of memory.
Why not support multiple browsers?
Currently fuite
requires Chromium-specific tools such as heap snapshots, getEventListeners
, queryObjects
, and other things that are only available with Chromium and the Chrome DevTools Protocol (CDP). Potentially, such things could be accessible in a cross-browser way, but today it just isn't possible.
That said, if something is leaking in Chrome, it's likely leaking in Safari and Firefox too.