Added Solution for 2020 day 02

This commit is contained in:
Burnus 2023-04-03 17:04:47 +02:00
parent 62674b7f08
commit 79ad34fc6a
5 changed files with 1147 additions and 0 deletions

View file

@ -0,0 +1,8 @@
[package]
name = "day02_password_philosophy"
version = "0.1.0"
edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]

View file

@ -0,0 +1,49 @@
Your flight departs in a few days from the coastal airport; the easiest way down to the coast from here is via [toboggan](https://en.wikipedia.org/wiki/Toboggan).
The shopkeeper at the North Pole Toboggan Rental Shop is having a bad day. "Something's wrong with our computers; we can't log in!" You ask if you can take a look.
Their password database seems to be a little corrupted: some of the passwords wouldn't have been allowed by the Official Toboggan Corporate Policy that was in effect when they were chosen.
To try to debug the problem, they have created a list (your puzzle input) of *passwords* (according to the corrupted database) and *the corporate policy when that password was set*.
For example, suppose you have the following list:
```
1-3 a: abcde
1-3 b: cdefg
2-9 c: ccccccccc
```
Each line gives the password policy and then the password. The password policy indicates the lowest and highest number of times a given letter must appear for the password to be valid. For example, `1-3 a` means that the password must contain `a` at least `1` time and at most `3` times.
In the above example, `*2*` passwords are valid. The middle password, `cdefg`, is not; it contains no instances of `b`, but needs at least `1`. The first and third passwords are valid: they contain one `a` or nine `c`, both within the limits of their respective policies.
*How many passwords are valid* according to their policies?
Your puzzle answer was `517`.
\--- Part Two ---
----------
While it appears you validated the passwords correctly, they don't seem to be what the Official Toboggan Corporate Authentication System is expecting.
The shopkeeper suddenly realizes that he just accidentally explained the password policy rules from his old job at the sled rental place down the street! The Official Toboggan Corporate Policy actually works a little differently.
Each policy actually describes two *positions in the password*, where `1` means the first character, `2` means the second character, and so on. (Be careful; Toboggan Corporate Policies have no concept of "index zero"!) *Exactly one of these positions* must contain the given letter. Other occurrences of the letter are irrelevant for the purposes of policy enforcement.
Given the same example list from above:
* `1-3 a: *a*b*c*de` is *valid*: position `1` contains `a` and position `3` does not.
* `1-3 b: *c*d*e*fg` is *invalid*: neither position `1` nor position `3` contains `b`.
* `2-9 c: c*c*cccccc*c*` is *invalid*: both position `2` and position `9` contain `c`.
*How many passwords are valid* according to the new interpretation of the policies?
Your puzzle answer was `284`.
Both parts of this puzzle are complete! They provide two gold stars: \*\*
At this point, you should [return to your Advent calendar](/2020) and try another puzzle.
If you still want to see it, you can [get your puzzle input](2/input).

View file

@ -0,0 +1,87 @@
use core::fmt::Display;
use std::num::ParseIntError;
#[derive(Debug, PartialEq, Eq)]
pub enum ParseError {
ParseIntError(std::num::ParseIntError),
LineMalformed(String),
}
impl From<ParseIntError> for ParseError {
fn from(value: ParseIntError) -> Self {
Self::ParseIntError(value)
}
}
impl Display for ParseError {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
match self {
Self::ParseIntError(e) => write!(f, "Unable to parse into integer: {e}"),
Self::LineMalformed(v) => write!(f, "Line is malformed: {v}"),
}
}
}
struct Entry {
left: usize,
right: usize,
letter: char,
password: String,
}
impl TryFrom<&str> for Entry {
type Error = ParseError;
fn try_from(value: &str) -> Result<Self, Self::Error> {
let components: Vec<_> = value.split(&['-', ' ']).collect();
if components.len() != 4 {
return Err(ParseError::LineMalformed(value.to_string()));
}
Ok(Self {
left: components[0].parse()?,
right: components[1].parse()?,
letter: components[2].chars().next().unwrap(),
password: components[3].to_string(),
})
}
}
impl Entry {
fn is_valid_1(&self) -> bool {
(self.left..=self.right).contains(&self.password.chars().filter(|&c| c == self.letter).count())
}
fn is_valid_2(&self) -> bool {
(self.password.chars().nth(self.left-1) == Some(self.letter)) ^ (self.password.chars().nth(self.right-1) == Some(self.letter))
}
}
pub fn run(input: &str) -> Result<(usize, usize), ParseError> {
let entries: Vec<_> = input.lines().map(Entry::try_from).collect::<Result<Vec<_>, _>>()?;
let first = entries.iter().filter(|e| e.is_valid_1()).count();
let second = entries.iter().filter(|e| e.is_valid_2()).count();
Ok((first, second))
}
#[cfg(test)]
mod tests {
use super::*;
use std::fs::read_to_string;
fn read_file(name: &str) -> String {
read_to_string(name).expect(&format!("Unable to read file: {name}")[..]).trim().to_string()
}
#[test]
fn test_sample() {
let sample_input = read_file("tests/sample_input");
assert_eq!(run(&sample_input), Ok((2, 1)));
}
#[test]
fn test_challenge() {
let challenge_input = read_file("tests/challenge_input");
assert_eq!(run(&challenge_input), Ok((517, 0)));
}
}

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,3 @@
1-3 a: abcde
1-3 b: cdefg
2-9 c: ccccccccc