- add sources.
[platform/framework/web/crosswalk.git] / src / chrome / test / automation / proxy_launcher.cc
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/test/automation/proxy_launcher.h"
6
7 #include <vector>
8
9 #include "base/environment.h"
10 #include "base/file_util.h"
11 #include "base/files/file_enumerator.h"
12 #include "base/process/kill.h"
13 #include "base/process/launch.h"
14 #include "base/strings/string_number_conversions.h"
15 #include "base/strings/string_split.h"
16 #include "base/strings/stringprintf.h"
17 #include "base/strings/utf_string_conversions.h"
18 #include "base/test/test_file_util.h"
19 #include "base/test/test_timeouts.h"
20 #include "chrome/app/chrome_command_ids.h"
21 #include "chrome/common/automation_constants.h"
22 #include "chrome/common/chrome_constants.h"
23 #include "chrome/common/chrome_switches.h"
24 #include "chrome/common/logging_chrome.h"
25 #include "chrome/common/url_constants.h"
26 #include "chrome/test/automation/automation_proxy.h"
27 #include "chrome/test/base/chrome_process_util.h"
28 #include "chrome/test/base/test_launcher_utils.h"
29 #include "chrome/test/base/test_switches.h"
30 #include "chrome/test/ui/ui_test.h"
31 #include "content/public/common/process_type.h"
32 #include "ipc/ipc_channel.h"
33 #include "ipc/ipc_descriptors.h"
34 #include "sql/connection.h"
35
36 #if defined(OS_POSIX)
37 #include <signal.h>
38 #include "base/posix/global_descriptors.h"
39 #endif
40
41 namespace {
42
43 // Passed as value of kTestType.
44 const char kUITestType[] = "ui";
45
46 // Copies the contents of the given source directory to the given dest
47 // directory. This is somewhat different than CopyDirectory in base which will
48 // copies "source/" to "dest/source/". This version will copy "source/*" to
49 // "dest/*", overwriting existing files as necessary.
50 //
51 // This also kicks the files out of the memory cache for the startup tests.
52 // TODO(brettw) bug 237904: This is the wrong place for this code. It means all
53 // startup tests other than the "cold" ones run more slowly than necessary.
54 bool CopyDirectoryContentsNoCache(const base::FilePath& source,
55                                   const base::FilePath& dest) {
56   base::FileEnumerator en(source, false,
57       base::FileEnumerator::FILES | base::FileEnumerator::DIRECTORIES);
58   for (base::FilePath cur = en.Next(); !cur.empty(); cur = en.Next()) {
59     base::FileEnumerator::FileInfo info = en.GetInfo();
60     if (info.IsDirectory()) {
61       if (!base::CopyDirectory(cur, dest, true))
62         return false;
63     } else {
64       if (!base::CopyFile(cur, dest.Append(cur.BaseName())))
65         return false;
66     }
67   }
68
69   // Kick out the profile files, this must happen after SetUp which creates the
70   // profile. It might be nicer to use EvictFileFromSystemCacheWrapper from
71   // UITest which will retry on failure.
72   base::FileEnumerator kickout(dest, true, base::FileEnumerator::FILES);
73   for (base::FilePath cur = kickout.Next(); !cur.empty(); cur = kickout.Next())
74     base::EvictFileFromSystemCacheWithRetry(cur);
75   return true;
76 }
77
78 // We want to have a current history database when we start the browser so
79 // things like the NTP will have thumbnails.  This method updates the dates
80 // in the history to be more recent.
81 void UpdateHistoryDates(const base::FilePath& user_data_dir) {
82   // Migrate the times in the segment_usage table to yesterday so we get
83   // actual thumbnails on the NTP.
84   sql::Connection db;
85   base::FilePath history =
86       user_data_dir.AppendASCII("Default").AppendASCII("History");
87   // Not all test profiles have a history file.
88   if (!base::PathExists(history))
89     return;
90
91   ASSERT_TRUE(db.Open(history));
92   base::Time yesterday = base::Time::Now() - base::TimeDelta::FromDays(1);
93   std::string yesterday_str = base::Int64ToString(yesterday.ToInternalValue());
94   std::string query = base::StringPrintf(
95       "UPDATE segment_usage "
96       "SET time_slot = %s "
97       "WHERE id IN (SELECT id FROM segment_usage WHERE time_slot > 0);",
98       yesterday_str.c_str());
99   ASSERT_TRUE(db.Execute(query.c_str()));
100   db.Close();
101   file_util::EvictFileFromSystemCache(history);
102 }
103
104 }  // namespace
105
106 // ProxyLauncher functions
107
108 #if defined(OS_WIN)
109 const char ProxyLauncher::kDefaultInterfaceId[] = "ChromeTestingInterface";
110 #elif defined(OS_POSIX)
111 const char ProxyLauncher::kDefaultInterfaceId[] =
112     "/var/tmp/ChromeTestingInterface";
113 #endif
114
115 ProxyLauncher::ProxyLauncher()
116     : process_(base::kNullProcessHandle),
117       process_id_(-1),
118       shutdown_type_(WINDOW_CLOSE),
119       no_sandbox_(CommandLine::ForCurrentProcess()->HasSwitch(
120                       switches::kNoSandbox)),
121       full_memory_dump_(CommandLine::ForCurrentProcess()->HasSwitch(
122                             switches::kFullMemoryCrashReport)),
123       show_error_dialogs_(CommandLine::ForCurrentProcess()->HasSwitch(
124                               switches::kEnableErrorDialogs)),
125       enable_dcheck_(CommandLine::ForCurrentProcess()->HasSwitch(
126                          switches::kEnableDCHECK)),
127       silent_dump_on_dcheck_(CommandLine::ForCurrentProcess()->HasSwitch(
128                                  switches::kSilentDumpOnDCHECK)),
129       disable_breakpad_(CommandLine::ForCurrentProcess()->HasSwitch(
130                             switches::kDisableBreakpad)),
131       js_flags_(CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
132                     switches::kJavaScriptFlags)),
133       log_level_(CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
134                      switches::kLoggingLevel)) {
135 }
136
137 ProxyLauncher::~ProxyLauncher() {}
138
139 bool ProxyLauncher::WaitForBrowserLaunch(bool wait_for_initial_loads) {
140   AutomationLaunchResult app_launched = automation_proxy_->WaitForAppLaunch();
141   EXPECT_EQ(AUTOMATION_SUCCESS, app_launched)
142       << "Error while awaiting automation ping from browser process";
143   if (app_launched != AUTOMATION_SUCCESS)
144     return false;
145
146   if (wait_for_initial_loads) {
147     if (!automation_proxy_->WaitForInitialLoads()) {
148       LOG(ERROR) << "WaitForInitialLoads failed.";
149       return false;
150     }
151   } else {
152 #if defined(OS_WIN)
153     // TODO(phajdan.jr): Get rid of this Sleep when logging_chrome_uitest
154     // stops "relying" on it.
155     base::PlatformThread::Sleep(TestTimeouts::action_timeout());
156 #endif
157   }
158
159   return true;
160 }
161
162 bool ProxyLauncher::LaunchBrowserAndServer(const LaunchState& state,
163                                            bool wait_for_initial_loads) {
164   // Set up IPC testing interface as a server.
165   automation_proxy_.reset(CreateAutomationProxy(
166       TestTimeouts::action_max_timeout()));
167
168   if (!LaunchBrowser(state))
169     return false;
170
171   if (!WaitForBrowserLaunch(wait_for_initial_loads))
172     return false;
173
174   return true;
175 }
176
177 bool ProxyLauncher::ConnectToRunningBrowser(bool wait_for_initial_loads) {
178   // Set up IPC testing interface as a client.
179   automation_proxy_.reset(CreateAutomationProxy(
180                               TestTimeouts::action_max_timeout()));
181
182   return WaitForBrowserLaunch(wait_for_initial_loads);
183 }
184
185 void ProxyLauncher::CloseBrowserAndServer() {
186   QuitBrowser();
187
188   // Suppress spammy failures that seem to be occurring when running
189   // the UI tests in single-process mode.
190   // TODO(jhughes): figure out why this is necessary at all, and fix it
191   AssertAppNotRunning(
192       base::StringPrintf(
193           "Unable to quit all browser processes. Original PID %d",
194           process_id_));
195
196   DisconnectFromRunningBrowser();
197 }
198
199 void ProxyLauncher::DisconnectFromRunningBrowser() {
200   automation_proxy_.reset();  // Shut down IPC testing interface.
201 }
202
203 bool ProxyLauncher::LaunchBrowser(const LaunchState& state) {
204   if (state.clear_profile || !temp_profile_dir_.IsValid()) {
205     if (temp_profile_dir_.IsValid() && !temp_profile_dir_.Delete()) {
206       LOG(ERROR) << "Failed to delete temporary directory.";
207       return false;
208     }
209
210     if (!temp_profile_dir_.CreateUniqueTempDir()) {
211       LOG(ERROR) << "Failed to create temporary directory.";
212       return false;
213     }
214
215     if (!test_launcher_utils::OverrideUserDataDir(user_data_dir())) {
216       LOG(ERROR) << "Failed to override user data directory.";
217       return false;
218     }
219   }
220
221   if (!state.template_user_data.empty()) {
222     // Recursively copy the template directory to the user_data_dir.
223     if (!CopyDirectoryContentsNoCache(state.template_user_data,
224                                       user_data_dir())) {
225       LOG(ERROR) << "Failed to copy user data directory template.";
226       return false;
227     }
228
229     // Update the history file to include recent dates.
230     UpdateHistoryDates(user_data_dir());
231   }
232
233   // Optionally do any final setup of the test environment.
234   if (!state.setup_profile_callback.is_null())
235     state.setup_profile_callback.Run();
236
237   if (!LaunchBrowserHelper(state, true, false, &process_)) {
238     LOG(ERROR) << "LaunchBrowserHelper failed.";
239     return false;
240   }
241   process_id_ = base::GetProcId(process_);
242
243   return true;
244 }
245
246 void ProxyLauncher::QuitBrowser() {
247   // If we have already finished waiting for the browser to exit
248   // (or it hasn't launched at all), there's nothing to do here.
249   if (process_ == base::kNullProcessHandle || !automation_proxy_.get())
250     return;
251
252   if (SESSION_ENDING == shutdown_type_) {
253     TerminateBrowser();
254     return;
255   }
256
257   base::TimeTicks quit_start = base::TimeTicks::Now();
258
259   if (WINDOW_CLOSE == shutdown_type_) {
260     int window_count = 0;
261     EXPECT_TRUE(automation()->GetBrowserWindowCount(&window_count));
262
263     // Synchronously close all but the last browser window. Closing them
264     // one-by-one may help with stability.
265     while (window_count > 1) {
266       scoped_refptr<BrowserProxy> browser_proxy =
267           automation()->GetBrowserWindow(0);
268       EXPECT_TRUE(browser_proxy.get());
269       if (browser_proxy.get()) {
270         EXPECT_TRUE(browser_proxy->RunCommand(IDC_CLOSE_WINDOW));
271         EXPECT_TRUE(automation()->GetBrowserWindowCount(&window_count));
272       } else {
273         break;
274       }
275     }
276
277     // Close the last window asynchronously, because the browser may
278     // shutdown faster than it will be able to send a synchronous response
279     // to our message.
280     scoped_refptr<BrowserProxy> browser_proxy =
281         automation()->GetBrowserWindow(0);
282     EXPECT_TRUE(browser_proxy.get());
283     if (browser_proxy.get()) {
284       EXPECT_TRUE(browser_proxy->is_valid());
285       EXPECT_TRUE(browser_proxy->ApplyAccelerator(IDC_CLOSE_WINDOW));
286       browser_proxy = NULL;
287     }
288   } else if (USER_QUIT == shutdown_type_) {
289     scoped_refptr<BrowserProxy> browser_proxy =
290         automation()->GetBrowserWindow(0);
291     EXPECT_TRUE(browser_proxy.get());
292     if (browser_proxy.get()) {
293       EXPECT_TRUE(browser_proxy->RunCommandAsync(IDC_EXIT));
294     }
295   } else {
296     NOTREACHED() << "Invalid shutdown type " << shutdown_type_;
297   }
298
299   ChromeProcessList processes = GetRunningChromeProcesses(process_id_);
300
301   // Now, drop the automation IPC channel so that the automation provider in
302   // the browser notices and drops its reference to the browser process.
303   if (automation_proxy_.get())
304     automation_proxy_->Disconnect();
305
306   // Wait for the browser process to quit. It should quit once all tabs have
307   // been closed.
308   int exit_code = -1;
309   EXPECT_TRUE(WaitForBrowserProcessToQuit(
310                   TestTimeouts::action_max_timeout(), &exit_code));
311   EXPECT_EQ(0, exit_code);  // Expect a clean shutdown.
312
313   browser_quit_time_ = base::TimeTicks::Now() - quit_start;
314
315   // Ensure no child processes are left dangling.
316   TerminateAllChromeProcesses(processes);
317 }
318
319 void ProxyLauncher::TerminateBrowser() {
320   // If we have already finished waiting for the browser to exit
321   // (or it hasn't launched at all), there's nothing to do here.
322   if (process_ == base::kNullProcessHandle || !automation_proxy_.get())
323     return;
324
325   base::TimeTicks quit_start = base::TimeTicks::Now();
326
327 #if defined(OS_WIN) && !defined(USE_AURA)
328   scoped_refptr<BrowserProxy> browser(automation()->GetBrowserWindow(0));
329   ASSERT_TRUE(browser.get());
330   ASSERT_TRUE(browser->TerminateSession());
331 #endif  // defined(OS_WIN)
332
333   ChromeProcessList processes = GetRunningChromeProcesses(process_id_);
334
335   // Now, drop the automation IPC channel so that the automation provider in
336   // the browser notices and drops its reference to the browser process.
337   if (automation_proxy_.get())
338     automation_proxy_->Disconnect();
339
340 #if defined(OS_POSIX)
341   EXPECT_EQ(kill(process_, SIGTERM), 0);
342 #endif  // OS_POSIX
343
344   int exit_code = -1;
345   EXPECT_TRUE(WaitForBrowserProcessToQuit(
346                   TestTimeouts::action_max_timeout(), &exit_code));
347   EXPECT_EQ(0, exit_code);  // Expect a clean shutdown.
348
349   browser_quit_time_ = base::TimeTicks::Now() - quit_start;
350
351   // Ensure no child processes are left dangling.
352   TerminateAllChromeProcesses(processes);
353 }
354
355 void ProxyLauncher::AssertAppNotRunning(const std::string& error_message) {
356   std::string final_error_message(error_message);
357
358   ChromeProcessList processes = GetRunningChromeProcesses(process_id_);
359   if (!processes.empty()) {
360     final_error_message += " Leftover PIDs: [";
361     for (ChromeProcessList::const_iterator it = processes.begin();
362          it != processes.end(); ++it) {
363       final_error_message += base::StringPrintf(" %d", *it);
364     }
365     final_error_message += " ]";
366   }
367   ASSERT_TRUE(processes.empty()) << final_error_message;
368 }
369
370 bool ProxyLauncher::WaitForBrowserProcessToQuit(
371     base::TimeDelta timeout,
372     int* exit_code) {
373 #ifdef WAIT_FOR_DEBUGGER_ON_OPEN
374   timeout = base::TimeDelta::FromSeconds(500);
375 #endif
376   bool success = false;
377
378   // Only wait for exit if the "browser, please terminate" message had a
379   // chance of making it through.
380   if (!automation_proxy_->channel_disconnected_on_failure())
381     success = base::WaitForExitCodeWithTimeout(process_, exit_code, timeout);
382
383   base::CloseProcessHandle(process_);
384   process_ = base::kNullProcessHandle;
385   process_id_ = -1;
386
387   return success;
388 }
389
390 void ProxyLauncher::PrepareTestCommandline(CommandLine* command_line,
391                                            bool include_testing_id) {
392   // Add any explicit command line flags passed to the process.
393   CommandLine::StringType extra_chrome_flags =
394       CommandLine::ForCurrentProcess()->GetSwitchValueNative(
395           switches::kExtraChromeFlags);
396   if (!extra_chrome_flags.empty()) {
397     // Split by spaces and append to command line.
398     std::vector<CommandLine::StringType> flags;
399     base::SplitStringAlongWhitespace(extra_chrome_flags, &flags);
400     for (size_t i = 0; i < flags.size(); ++i)
401       command_line->AppendArgNative(flags[i]);
402   }
403
404   // Also look for extra flags in environment.
405   scoped_ptr<base::Environment> env(base::Environment::Create());
406   std::string extra_from_env;
407   if (env->GetVar("EXTRA_CHROME_FLAGS", &extra_from_env)) {
408     std::vector<std::string> flags;
409     base::SplitStringAlongWhitespace(extra_from_env, &flags);
410     for (size_t i = 0; i < flags.size(); ++i)
411       command_line->AppendArg(flags[i]);
412   }
413
414   // No default browser check, it would create an info-bar (if we are not the
415   // default browser) that could conflicts with some tests expectations.
416   command_line->AppendSwitch(switches::kNoDefaultBrowserCheck);
417
418   // This is a UI test.
419   command_line->AppendSwitchASCII(switches::kTestType, kUITestType);
420
421   // Tell the browser to use a temporary directory just for this test
422   // if it is not already set.
423   if (command_line->GetSwitchValuePath(switches::kUserDataDir).empty()) {
424     command_line->AppendSwitchPath(switches::kUserDataDir, user_data_dir());
425   }
426
427   if (include_testing_id)
428     command_line->AppendSwitchASCII(switches::kTestingChannelID,
429                                     PrefixedChannelID());
430
431   if (!show_error_dialogs_)
432     command_line->AppendSwitch(switches::kNoErrorDialogs);
433   if (no_sandbox_)
434     command_line->AppendSwitch(switches::kNoSandbox);
435   if (full_memory_dump_)
436     command_line->AppendSwitch(switches::kFullMemoryCrashReport);
437   if (enable_dcheck_)
438     command_line->AppendSwitch(switches::kEnableDCHECK);
439   if (silent_dump_on_dcheck_)
440     command_line->AppendSwitch(switches::kSilentDumpOnDCHECK);
441   if (disable_breakpad_)
442     command_line->AppendSwitch(switches::kDisableBreakpad);
443
444   if (!js_flags_.empty())
445     command_line->AppendSwitchASCII(switches::kJavaScriptFlags, js_flags_);
446   if (!log_level_.empty())
447     command_line->AppendSwitchASCII(switches::kLoggingLevel, log_level_);
448
449   command_line->AppendSwitch(switches::kMetricsRecordingOnly);
450
451   if (!CommandLine::ForCurrentProcess()->HasSwitch(
452           switches::kEnableErrorDialogs))
453     command_line->AppendSwitch(switches::kEnableLogging);
454
455 #ifdef WAIT_FOR_DEBUGGER_ON_OPEN
456   command_line->AppendSwitch(switches::kDebugOnStart);
457 #endif
458
459   // Force the app to always exit when the last browser window is closed.
460   command_line->AppendSwitch(switches::kDisableZeroBrowsersOpenForTests);
461
462   // Allow file:// access on ChromeOS.
463   command_line->AppendSwitch(switches::kAllowFileAccess);
464
465   // The tests assume that file:// URIs can freely access other file:// URIs.
466   command_line->AppendSwitch(switches::kAllowFileAccessFromFiles);
467 }
468
469 bool ProxyLauncher::LaunchBrowserHelper(const LaunchState& state,
470                                         bool main_launch,
471                                         bool wait,
472                                         base::ProcessHandle* process) {
473   CommandLine command_line(state.command);
474
475   // Add command line arguments that should be applied to all UI tests.
476   PrepareTestCommandline(&command_line, state.include_testing_id);
477
478   // Sometimes one needs to run the browser under a special environment
479   // (e.g. valgrind) without also running the test harness (e.g. python)
480   // under the special environment.  Provide a way to wrap the browser
481   // commandline with a special prefix to invoke the special environment.
482   const char* browser_wrapper = getenv("BROWSER_WRAPPER");
483   if (browser_wrapper) {
484 #if defined(OS_WIN)
485     command_line.PrependWrapper(ASCIIToWide(browser_wrapper));
486 #elif defined(OS_POSIX)
487     command_line.PrependWrapper(browser_wrapper);
488 #endif
489     VLOG(1) << "BROWSER_WRAPPER was set, prefixing command_line with "
490             << browser_wrapper;
491   }
492
493   if (main_launch)
494     browser_launch_time_ = base::TimeTicks::Now();
495
496   base::LaunchOptions options;
497   options.wait = wait;
498
499 #if defined(OS_WIN)
500   options.start_hidden = !state.show_window;
501 #elif defined(OS_POSIX)
502   int ipcfd = -1;
503   file_util::ScopedFD ipcfd_closer(&ipcfd);
504   base::FileHandleMappingVector fds;
505   if (main_launch && automation_proxy_.get()) {
506     ipcfd = automation_proxy_->channel()->TakeClientFileDescriptor();
507     fds.push_back(std::make_pair(ipcfd,
508         kPrimaryIPCChannel + base::GlobalDescriptors::kBaseDescriptor));
509     options.fds_to_remap = &fds;
510   }
511 #endif
512
513   return base::LaunchProcess(command_line, options, process);
514 }
515
516 AutomationProxy* ProxyLauncher::automation() const {
517   EXPECT_TRUE(automation_proxy_.get());
518   return automation_proxy_.get();
519 }
520
521 base::FilePath ProxyLauncher::user_data_dir() const {
522   EXPECT_TRUE(temp_profile_dir_.IsValid());
523   return temp_profile_dir_.path();
524 }
525
526 base::ProcessHandle ProxyLauncher::process() const {
527   return process_;
528 }
529
530 base::ProcessId ProxyLauncher::process_id() const {
531   return process_id_;
532 }
533
534 base::TimeTicks ProxyLauncher::browser_launch_time() const {
535   return browser_launch_time_;
536 }
537
538 base::TimeDelta ProxyLauncher::browser_quit_time() const {
539   return browser_quit_time_;
540 }
541
542 // NamedProxyLauncher functions
543
544 NamedProxyLauncher::NamedProxyLauncher(const std::string& channel_id,
545                                        bool launch_browser,
546                                        bool disconnect_on_failure)
547     : channel_id_(channel_id),
548       launch_browser_(launch_browser),
549       disconnect_on_failure_(disconnect_on_failure) {
550 }
551
552 AutomationProxy* NamedProxyLauncher::CreateAutomationProxy(
553     base::TimeDelta execution_timeout) {
554   AutomationProxy* proxy = new AutomationProxy(execution_timeout,
555                                                disconnect_on_failure_);
556   proxy->InitializeChannel(channel_id_, true);
557   return proxy;
558 }
559
560 bool NamedProxyLauncher::InitializeConnection(const LaunchState& state,
561                                               bool wait_for_initial_loads) {
562   if (launch_browser_) {
563 #if defined(OS_POSIX)
564     // Because we are waiting on the existence of the testing file below,
565     // make sure there isn't one already there before browser launch.
566     if (!base::DeleteFile(base::FilePath(channel_id_), false)) {
567       LOG(ERROR) << "Failed to delete " << channel_id_;
568       return false;
569     }
570 #endif
571
572     if (!LaunchBrowser(state)) {
573       LOG(ERROR) << "Failed to LaunchBrowser";
574       return false;
575     }
576   }
577
578   // Wait for browser to be ready for connections.
579   bool channel_initialized = false;
580   base::TimeDelta sleep_time = base::TimeDelta::FromMilliseconds(
581       automation::kSleepTime);
582   for (base::TimeDelta wait_time = base::TimeDelta();
583        wait_time < TestTimeouts::action_max_timeout();
584        wait_time += sleep_time) {
585     channel_initialized = IPC::Channel::IsNamedServerInitialized(channel_id_);
586     if (channel_initialized)
587       break;
588     base::PlatformThread::Sleep(sleep_time);
589   }
590   if (!channel_initialized) {
591     LOG(ERROR) << "Failed to wait for testing channel presence.";
592     return false;
593   }
594
595   if (!ConnectToRunningBrowser(wait_for_initial_loads)) {
596     LOG(ERROR) << "Failed to ConnectToRunningBrowser";
597     return false;
598   }
599   return true;
600 }
601
602 void NamedProxyLauncher::TerminateConnection() {
603   if (launch_browser_)
604     CloseBrowserAndServer();
605   else
606     DisconnectFromRunningBrowser();
607 }
608
609 std::string NamedProxyLauncher::PrefixedChannelID() const {
610   std::string channel_id;
611   channel_id.append(automation::kNamedInterfacePrefix).append(channel_id_);
612   return channel_id;
613 }
614
615 // AnonymousProxyLauncher functions
616
617 AnonymousProxyLauncher::AnonymousProxyLauncher(bool disconnect_on_failure)
618     : disconnect_on_failure_(disconnect_on_failure) {
619   channel_id_ = AutomationProxy::GenerateChannelID();
620 }
621
622 AutomationProxy* AnonymousProxyLauncher::CreateAutomationProxy(
623     base::TimeDelta execution_timeout) {
624   AutomationProxy* proxy = new AutomationProxy(execution_timeout,
625                                                disconnect_on_failure_);
626   proxy->InitializeChannel(channel_id_, false);
627   return proxy;
628 }
629
630 bool AnonymousProxyLauncher::InitializeConnection(const LaunchState& state,
631                                                   bool wait_for_initial_loads) {
632   return LaunchBrowserAndServer(state, wait_for_initial_loads);
633 }
634
635 void AnonymousProxyLauncher::TerminateConnection() {
636   CloseBrowserAndServer();
637 }
638
639 std::string AnonymousProxyLauncher::PrefixedChannelID() const {
640   return channel_id_;
641 }