Revert "Revert "AU: do not copy filesystem during full updates""

This reverts commit d1cd325c3135d88498483da811b594ba6b91ce42

The problem that caused all autotests to fail with the original CL has now been rectified; lab devservers were updated to send the correct delta flag in their omaha response.

Change-Id: I664afb33f72856572baaa658cbd473c07271af36
Reviewed-on: https://gerrit.chromium.org/gerrit/56600
Reviewed-by: Gilad Arnold <[email protected]>
Tested-by: Gilad Arnold <[email protected]>
Commit-Queue: Gilad Arnold <[email protected]>
diff --git a/delta_performer.cc b/delta_performer.cc
index 360272f..5615801 100644
--- a/delta_performer.cc
+++ b/delta_performer.cc
@@ -383,6 +383,11 @@
     if (result == kMetadataParseInsufficientData) {
       return true;
     }
+
+    // Checks the integrity of the payload manifest.
+    if ((*error = ValidateManifest()) != kErrorCodeSuccess)
+      return false;
+
     // Remove protobuf and header info from buffer_, so buffer_ contains
     // just data blobs
     DiscardBufferHeadBytes(manifest_metadata_size_);
@@ -831,6 +836,30 @@
   return kErrorCodeSuccess;
 }
 
+ErrorCode DeltaPerformer::ValidateManifest() {
+  // Ensure that a full update does not contain old partition hashes, which is
+  // indicative of a delta.
+  //
+  // TODO(garnold) in general, the presence of an old partition hash should be
+  // the sole indicator for a delta update, as we would generally like update
+  // payloads to be self contained and not assume an Omaha response to tell us
+  // that. However, since this requires some massive reengineering of the update
+  // flow (making filesystem copying happen conditionally only *after*
+  // downloading and parsing of the update manifest) we'll put it off for now.
+  // See chromium-os:7597 for further discussion.
+  if (install_plan_->is_full_update &&
+      (manifest_.has_old_kernel_info() || manifest_.has_old_rootfs_info())) {
+    LOG(ERROR) << "Purported full payload contains old partition "
+                  "hash(es), aborting update";
+    return kErrorCodePayloadMismatchedType;
+  }
+
+  // TODO(garnold) we should be adding more and more manifest checks, such as
+  // partition boundaries etc (see chromium-os:37661).
+
+  return kErrorCodeSuccess;
+}
+
 ErrorCode DeltaPerformer::ValidateOperationHash(
     const DeltaArchiveManifest_InstallOperation& operation) {
 
diff --git a/delta_performer.h b/delta_performer.h
index 1f8f5cb..33e39d7 100644
--- a/delta_performer.h
+++ b/delta_performer.h
@@ -193,6 +193,10 @@
   bool CanPerformInstallOperation(
       const DeltaArchiveManifest_InstallOperation& operation);
 
+  // Checks the integrity of the payload manifest. Returns true upon success,
+  // false otherwise.
+  ErrorCode ValidateManifest();
+
   // Validates that the hash of the blobs corresponding to the given |operation|
   // matches what's specified in the manifest in the payload.
   // Returns kErrorCodeSuccess on match or a suitable error code otherwise.
diff --git a/download_action_unittest.cc b/download_action_unittest.cc
index 3911d55..e937d71 100644
--- a/download_action_unittest.cc
+++ b/download_action_unittest.cc
@@ -131,6 +131,7 @@
       OmahaHashCalculator::OmahaHashOfBytes(&data[1], data.size() - 1);
   uint64_t size = data.size();
   InstallPlan install_plan(false,
+                           false,
                            "",
                            size,
                            hash,
@@ -252,7 +253,8 @@
 
     // takes ownership of passed in HttpFetcher
     ObjectFeederAction<InstallPlan> feeder_action;
-    InstallPlan install_plan(false, "", 0, "", 0, "", temp_file.GetPath(), "");
+    InstallPlan install_plan(false, false, "", 0, "", 0, "",
+                             temp_file.GetPath(), "");
     feeder_action.set_obj(install_plan);
     PrefsMock prefs;
     DownloadAction download_action(&prefs, NULL,
@@ -354,6 +356,7 @@
 
   // takes ownership of passed in HttpFetcher
   InstallPlan install_plan(false,
+                           false,
                            "",
                            1,
                            OmahaHashCalculator::OmahaHashOfString("x"),
@@ -395,7 +398,7 @@
   DirectFileWriter writer;
 
   // takes ownership of passed in HttpFetcher
-  InstallPlan install_plan(false, "", 0, "", 0, "", path, "");
+  InstallPlan install_plan(false, false, "", 0, "", 0, "", path, "");
   ObjectFeederAction<InstallPlan> feeder_action;
   feeder_action.set_obj(install_plan);
   PrefsMock prefs;
diff --git a/error_code.h b/error_code.h
index db023f7..aab0917 100644
--- a/error_code.h
+++ b/error_code.h
@@ -15,7 +15,7 @@
   kErrorCodeOmahaResponseHandlerError = 3,
   kErrorCodeFilesystemCopierError = 4,
   kErrorCodePostinstallRunnerError = 5,
-  kErrorCodeSetBootableFlagError = 6,  // TODO(petkov): Unused. Recycle?
+  kErrorCodePayloadMismatchedType = 6,
   kErrorCodeInstallDeviceOpenError = 7,
   kErrorCodeKernelDeviceOpenError = 8,
   kErrorCodeDownloadTransferError = 9,
diff --git a/filesystem_copier_action.cc b/filesystem_copier_action.cc
index 7024b67..3e5160e 100644
--- a/filesystem_copier_action.cc
+++ b/filesystem_copier_action.cc
@@ -69,8 +69,11 @@
     return;
   }
   install_plan_ = GetInputObject();
-  if (!verify_hash_ && install_plan_.is_resume) {
+  if (!verify_hash_ &&
+      (install_plan_.is_resume || install_plan_.is_full_update)) {
     // No copy or hash verification needed. Done!
+    LOG(INFO) << "filesystem copying skipped: "
+              << (install_plan_.is_resume ? "resumed" : "full") << " update";
     if (HasOutputPipe())
       SetOutputObject(install_plan_);
     abort_action_completer.set_code(kErrorCodeSuccess);
diff --git a/filesystem_copier_action_unittest.cc b/filesystem_copier_action_unittest.cc
index 3ffed88..0db1640 100644
--- a/filesystem_copier_action_unittest.cc
+++ b/filesystem_copier_action_unittest.cc
@@ -311,7 +311,7 @@
 
   ObjectFeederAction<InstallPlan> feeder_action;
   const char* kUrl = "http://some/url";
-  InstallPlan install_plan(true, kUrl, 0, "", 0, "", "", "");
+  InstallPlan install_plan(false, true, kUrl, 0, "", 0, "", "", "");
   feeder_action.set_obj(install_plan);
   FilesystemCopierAction copier_action(false, false);
   ObjectCollectorAction<InstallPlan> collector_action;
@@ -337,6 +337,7 @@
 
   ObjectFeederAction<InstallPlan> feeder_action;
   InstallPlan install_plan(false,
+                           false,
                            "",
                            0,
                            "",
diff --git a/install_plan.cc b/install_plan.cc
index 59bd5da..a17cb52 100644
--- a/install_plan.cc
+++ b/install_plan.cc
@@ -13,6 +13,7 @@
 namespace chromeos_update_engine {
 
 InstallPlan::InstallPlan(bool is_resume,
+                         bool is_full_update,
                          const string& url,
                          uint64_t payload_size,
                          const string& payload_hash,
@@ -21,6 +22,7 @@
                          const string& install_path,
                          const string& kernel_install_path)
     : is_resume(is_resume),
+      is_full_update(is_full_update),
       download_url(url),
       payload_size(payload_size),
       payload_hash(payload_hash),
@@ -34,6 +36,7 @@
       powerwash_required(false) {}
 
 InstallPlan::InstallPlan() : is_resume(false),
+                             is_full_update(false),  // play it safe.
                              payload_size(0),
                              metadata_size(0),
                              kernel_size(0),
@@ -44,6 +47,7 @@
 
 bool InstallPlan::operator==(const InstallPlan& that) const {
   return ((is_resume == that.is_resume) &&
+          (is_full_update == that.is_full_update) &&
           (download_url == that.download_url) &&
           (payload_size == that.payload_size) &&
           (payload_hash == that.payload_hash) &&
@@ -59,7 +63,8 @@
 
 void InstallPlan::Dump() const {
   LOG(INFO) << "InstallPlan: "
-            << (is_resume ? ", resume" : ", new_update")
+            << (is_resume ? "resume" : "new_update")
+            << ", payload type: " << (is_full_update ? "full" : "delta")
             << ", url: " << download_url
             << ", payload size: " << payload_size
             << ", payload hash: " << payload_hash
diff --git a/install_plan.h b/install_plan.h
index fc33f25..d6ff9e0 100644
--- a/install_plan.h
+++ b/install_plan.h
@@ -16,6 +16,7 @@
 
 struct InstallPlan {
   InstallPlan(bool is_resume,
+              bool is_full_update,
               const std::string& url,
               uint64_t payload_size,
               const std::string& payload_hash,
@@ -34,6 +35,7 @@
   void Dump() const;
 
   bool is_resume;
+  bool is_full_update;
   std::string download_url;  // url to download from
 
   uint64_t payload_size;                 // size of the payload
diff --git a/omaha_response_handler_action.cc b/omaha_response_handler_action.cc
index c85711b..c876d94 100644
--- a/omaha_response_handler_action.cc
+++ b/omaha_response_handler_action.cc
@@ -70,6 +70,7 @@
         kPrefsUpdateCheckResponseHash, response.hash))
         << "Unable to save the update check response hash.";
   }
+  install_plan_.is_full_update = !response.is_delta_payload;
 
   TEST_AND_RETURN(GetInstallDev(
       (!boot_device_.empty() ? boot_device_ : utils::BootDevice()),
diff --git a/payload_state.cc b/payload_state.cc
index 3de9e04..0636f56 100644
--- a/payload_state.cc
+++ b/payload_state.cc
@@ -189,6 +189,7 @@
     case kErrorCodeDownloadInvalidMetadataSignature:
     case kErrorCodeDownloadOperationHashMissingError:
     case kErrorCodeDownloadMetadataSignatureMissingError:
+    case kErrorCodePayloadMismatchedType:
       IncrementUrlIndex();
       break;
 
@@ -239,7 +240,6 @@
       break;
 
     case kErrorCodeSuccess:                            // success code
-    case kErrorCodeSetBootableFlagError:               // unused
     case kErrorCodeUmaReportedMax:                     // not an error code
     case kErrorCodeOmahaRequestHTTPResponseBase:       // aggregated already
     case kErrorCodeDevModeFlag:                       // not an error code
diff --git a/utils.cc b/utils.cc
index be98a71..a6d8d91 100644
--- a/utils.cc
+++ b/utils.cc
@@ -848,8 +848,8 @@
       return "kErrorCodeFilesystemCopierError";
     case kErrorCodePostinstallRunnerError:
       return "kErrorCodePostinstallRunnerError";
-    case kErrorCodeSetBootableFlagError:
-      return "kErrorCodeSetBootableFlagError";
+    case kErrorCodePayloadMismatchedType:
+      return "kErrorCodePayloadMismatchedType";
     case kErrorCodeInstallDeviceOpenError:
       return "kErrorCodeInstallDeviceOpenError";
     case kErrorCodeKernelDeviceOpenError: