Assignment 2: a file archiver

Contents

Aims

  • building a concrete understanding of file system objects;
  • practising C, including byte-level operations and robust error handling;
  • understanding file operations, including input-output operations on binary data

The Task

A file archive is a single file which can contain the contents, names and other metadata of multiple files. These can make backup and transport of files more convenient, and can often make compression more efficient. We often refer to tools that can create or manipulate these as file archivers.

There are a vast number of archive formats: on *nix-like systems, tar(5) is common; whereas on Windows, Zip is common. Wikipedia's list of archive formats is a marvellous rabbit-hole to explore.

In this assignment, you will be implementing rain, a file archiver for the drop format.

The drop format is made up of one or more droplets; where a droplet records one file system object; This format is described in more detail below.

A complete implementation of rain can

  • list the path names of each object in a drop (subset 0);

  • list the permissions of each object in a drop (subset 0);

  • list the size (number of bytes) of files in a drop (subset 0);

  • check the droplet magic number (subset 0);

  • extract files from a drop (subset 1);

  • check a drop for integrity, by checking droplet hashes; (subset 1);

  • set the file permissions of files extracted from a drop (subset 1);

  • create a drop from a list of files (subset 2);

  • list, extract, and create drops that include directories (subset 3); and

  • extract, and create drops in 7-bit and 6-bit formats (subset 3).

Getting Started

Create a new directory for this assignment, change to this directory, and fetch the provided code by running

mkdir -m 700 rain
cd rain
1521 fetch rain

If you're not working at CSE, you can download the provided files as a zip file or a tar file.

This will give you the following files:

rain.c
is the only file you need to change: it contains partial definitions of four functions, list_drop, check_drop, extract_drop, and create_drop, to which you need to add code to complete the assignment. You can also add your own functions to this file.
rain_main.c
contains a main, which has code to parse the command line arguments, and which then calls one of list_drop, extract_drop, create_drop, or check_drop, depending on the command line arguments given to rain. Do not change this file.
rain.h
contains shared function declarations and some useful constant definitions. Do not change this file.
rain_hash.c
contains the droplet_hash function; you should call this function to calculate hashes for subset 1. Do not change this file.
rain_6_bit.c
contains the droplet_to_6_bit and droplet_from_6_bit functions. You should call these to implement the 6-bit format for subset 3. Do not change this file.
rain.mk
contains a Makefile fragment for rain.

You can run make(1) to compile the provided code; and you should be able to run the result.

make
dcc    -c -o rain.o rain.c
dcc    -c -o rain_main.o rain_main.c
dcc    -c -o rain_hash.o rain_hash.c
dcc    -c -o rain_6_bit.o rain_6_bit.c
dcc   rain.o rain_main.o rain_hash.o rain_6_bit.o   -o rain
./rain -l a.drop
list_drop called to list drop: 'a.drop'

If you are running make(1) without dcc available you can compile like this:

make CC=gcc
gcc    -c -o rain.o rain.c
gcc    -c -o rain_main.o rain_main.c
gcc    -c -o rain_hash.o rain_hash.c
gcc    -c -o rain_6_bit.o rain_6_bit.c
gcc   rain.o rain_main.o rain_hash.o rain_6_bit.o   -o rain
./rain -l a.drop
list_drop called to list drop: 'a.drop'

If you don't have make(1) available you can compile like this:

dcc rain.c rain_main.c rain_hash.c rain_6_bit.c -o rain
./rain -C b.drop
check_drop called to check drop: 'a.drop'

If you don't have make(1) or dcc available you can compile like this:

gcc -Wall rain.c rain_main.c rain_hash.c rain_6_bit.c -o rain
./rain -C b.drop
check_drop called to check drop: 'a.drop'

You may optionally create extra .c or .h files.

You should run unzip(1) to get a directory called examples/ full of .drop files to test your program against.

unzip examples.zip

Subset 0

To complete subset 0, you need to implement code that can

  • print a list of the contents of a drop, and
  • print a detailed list of the contents of a drop.

Subset 0: Print a list of the contents of a drop

Given the -l command-line argument, rain should print the path names of the files/directories in a drop.

For example:

List each item in the drop called text_file.drop, which is in the examples directory
./rain -l examples/text_file.drop
hello.txt
List each item in the drop called 4_files.drop, which is in the examples directory
./rain -l examples/4_files.drop
256.bin
hello.txt
last_goodbye.txt
these_days.txt
List each item in the drop called hello_world.drop, which is in the examples directory
./rain -l examples/hello_world.drop
hello.c
hello.cpp
hello.d
hello.go
hello.hs
hello.java
hello.js
hello.pl
hello.py
hello.rs
hello.s
hello.sh
hello.sql

Subset 0: Print a detailed list of the contents of a drop

Given the -L command-line argument, rain should, for each file in the specified drop, print:

  1. the file/directory permissions,
  2. the droplet format which will be one of 6, 7 or 8 (the default),
  3. the file/directory size in bytes, and
  4. the file/directory path name.
./rain -L examples/text_file.drop
-rw-r--r--  8     56  hello.txt
List the details of each item in the drop called 4_files.drop, which is in the examples directory
./rain -L examples/4_files.drop
-rw-r--r--  8    256  256.bin
-rw-r--r--  8     56  hello.txt
-r--r--r--  8    166  last_goodbye.txt
-r--rw-r--  8    148  these_days.txt
List the details of each item in the drop called hello_world.drop, which is in the examples directory
./rain -L examples/hello_world.drop
-rw-r--r--  8     93  hello.c
-rw-r--r--  8     82  hello.cpp
-rw-r--r--  8     65  hello.d
-rw-r--r--  8     77  hello.go
-rw-r--r--  8     32  hello.hs
-rw-r--r--  8    117  hello.java
-rw-r--r--  8     30  hello.js
-rwxr-xr-x  8     47  hello.pl
-rwxr-xr-x  8    103  hello.py
-rw-r--r--  8     45  hello.rs
-rw-r--r--  8    123  hello.s
-rwxr-xr-x  8     41  hello.sh
-rw-r--r--  8     24  hello.sql

Subset 1

To complete subset 1, you need to implement code that can

  • check the contents of a drop, and
  • extract files from a drop.

Subset 1: Check the contents of a drop

Given the -C command-line argument, rain should check the hashes in the specified drop. For example:

Check the drop called 4_files.drop, which is in the examples directory
./rain -C examples/4_files.drop
256.bin - correct hash
hello.txt - correct hash
last_goodbye.txt - correct hash
these_days.txt - correct hash
Check the drop called examples/hello_world.bad_hash.drop, which is in the examples directory
./rain -C examples/hello_world.bad_hash.drop
hello.c - correct hash
hello.cpp - correct hash
hello.d - correct hash
hello.go - correct hash
hello.hs - correct hash
hello.java - correct hash
hello.js - correct hash
hello.pl - correct hash
hello.py - correct hash
hello.rs - correct hash
hello.s - correct hash
hello.sh - correct hash
hello.sql - incorrect hash 0x19 should be 0x43

It should also check the droplet magic number (first byte) of each droplet, and emit an error if it is incorrect.

Check the drop called text_file.bad_magic.drop, which is in the examples directory
./rain -C examples/text_file.bad_magic.drop
error: incorrect first droplet byte: 0x39 should be 0x63

Subset 1: Extract files from a drop

Given the -x command-line argument, rain should extract the files in the specified drop.

It should set file permissions for extracted files to the permissions specified in the drop.

rain will extract files into the current working directory.
So as not to clutter your assignment directory, you should create a
temporary directory, 'tmp', and change to it.  Once in that directory,
both your rain program and 'examples/' will be in its parent
directory --- hence the use of '..' in these path names.

Make a directory called tmp.
mkdir -p tmp/
Change into the tmp directory.
cd tmp/
Forcibly remove all files inside the tmp directory.
rm -f * .*
Use your program to extract the contents of text_file.drop.
../rain -x ../examples/text_file.drop
Extracting: hello.txt
Show the contents of hello.txt in the terminal.
You can manually open it in your text editor too, if you like.
cat hello.txt
Hello COMP1521
I hope you are enjoying this assignment.
Forcibly remove all files inside the tmp directory.
rm -f * .*
Use your program to extract the contents of hello_world.drop.
../rain -x ../examples/hello_world.drop
Extracting: hello.c
Extracting: hello.cpp
Extracting: hello.d
Extracting: hello.go
Extracting: hello.hs
Extracting: hello.java
Extracting: hello.js
Extracting: hello.pl
Extracting: hello.py
Extracting: hello.rs
Extracting: hello.s
Extracting: hello.sh
Extracting: hello.sql
Show the first 25 lines from the extracted files to confirm the extraction was successful.
cat $(echo * | sort) | head -n 25
extern int puts(const char *s);

int main(void)
{
    puts("Hello, World!");
    return 0;
}
#include <iostream>

int main () {
  std::cout << "Hello, world!" << std::endl;
}
import std.stdio;

void main() {
    writeln("Hello, world!");
}
package main

import "fmt"

func main() {
    fmt.Println("Hello, World!")
}
main = putStrLn "Hello, World!"
Forcibly remove all files inside the tmp directory
rm -f * .*
Use your program to extract the contents of meta.drop.
../rain -x ../examples/meta.drop
Extracting: 1_file.subdirectory.7-bit.drop
Extracting: 1_file.subdirectory.drop
Extracting: 2_files.7-bit.drop
Extracting: 2_files.drop
Extracting: 3_files.7-bit.drop
Extracting: 3_files.bad_hash.drop
Extracting: 3_files.bad_magic.drop
Extracting: 3_files.drop
Extracting: 3_files.subdirectory.7-bit.drop
Extracting: 3_files.subdirectory.bad_hash.drop
Extracting: 3_files.subdirectory.bad_magic.drop
Extracting: 3_files.subdirectory.drop
Extracting: 4_files.drop
Extracting: all_the_modes.subdirectory.7-bit.drop
Extracting: all_the_modes.subdirectory.drop
Extracting: all_three_formats.6-bit.drop
Extracting: binary_file.drop
Extracting: hello_world.7-bit.drop
Extracting: hello_world.bad_hash.drop
Extracting: hello_world.bad_magic.drop
Extracting: hello_world.drop
Extracting: lecture_code.subdirectory.7-bit.drop
Extracting: lecture_code.subdirectory.drop
Extracting: small.6-bit.drop
Extracting: small.7-bit.drop
Extracting: small.drop
Extracting: text_file.7-bit.drop
Extracting: text_file.bad_hash.drop
Extracting: text_file.bad_magic.drop
Extracting: text_file.drop
Extracting: tiny.6-bit.drop
Extracting: tiny.7-bit.drop
Extracting: tiny.drop
Show the first 10 items in this directory alphabetically to check extraction was successful.
ls -1 $(echo * | sort) | head
1_file.subdirectory.drop
1_file.subdirectory.compressed.drop
2_files.drop
2_files.compressed.drop
3_files.bad_hash.drop
3_files.bad_magic.drop
3_files.drop
3_files.compressed.drop
3_files.subdirectory.bad_hash.drop
3_files.subdirectory.bad_magic.drop
Go back into the directory with your code.
cd ../
Remove the tmp directory and everything inside it.
rm -rf tmp/

Subset 2

To complete subset 2, you need to implement code that can

  • create a drop from a list of files.

Subset 2: Create a drop from a list of files

Given the -c command-line argument, rain should create a drop containing the specified files.

These "echo" lines show you how to create these test files and what their contents are.

Create a file called hello.txt with the contents "hello".
echo hello >hello.txt
Create a file called hola.txt with the contents "hola".
echo hola >hola.txt
Create a file called hi.txt with the contents "hi".
echo hi >hi.txt
Set the permissions of these files to 644 (octal permission string (equivalent to rw-r--r--)).
When you list the contents of the drop, the permissions should match this.
chmod 644 hello.txt hola.txt hi.txt
Create a drop called selamat.drop with the files hello.txt, hola.txt, and hi.txt.
./rain -c selamat.drop hello.txt hola.txt hi.txt
Adding: hello.txt
Adding: hola.txt
Adding: hi.txt
List the contents of selamat.drop.
./rain -L selamat.drop
-rw-r--r--  8      6  hello.txt
-rw-r--r--  8      5  hola.txt
-rw-r--r--  8      3  hi.txt
Make a directory called tmp.
mkdir -p tmp/
Change into the tmp directory.
cd tmp/
Forcibly remove all files inside the tmp directory.
rm -f * .*
Use your program to extract the contents of selamat.drop.
../rain -x ../selamat.drop
Extracting: hello.txt
Extracting: hola.txt
Extracting: hi.txt
Check that the extracted file hello.txt is the same as the source file ../hello.txt.
diff -s ../hello.txt hello.txt
Files ../hello.txt and hello.txt are identical
Check that the extracted file hola.txt is the same as the source file ../hola.txt.
diff -s ../hola.txt hola.txt
Files ../hola.txt and hola.txt are identical
Check that the extracted file hi.txt is the same as the source file ../hi.txt.
diff -s ../hi.txt hi.txt
Files ../hi.txt and hi.txt are identical
Go back into the directory with your code.
cd ../
Remove the tmp directory and everything inside it.
rm -rf tmp/

It is also possible to append droplets to an existing drop file using the -a command-line option. For example:

./rain -a bonjour.drop hello.txt
Adding: hello.txt
./rain -L bonjour.drop
-rw-r--r--  8      6  hello.txt
./rain -a bonjour.drop hola.txt hi.txt
Adding: hola.txt
Adding: hi.txt
./rain -L bonjour.drop
-rw-r--r--  8      6  hello.txt
-rw-r--r--  8      5  hola.txt
-rw-r--r--  8      3  hi.txt

Subset 3

To complete subset 3, you need to implement code that can

  • create a drop from a list of files and directories,
  • extract directories from a drop, and
  • manipulate 6-bit and 7-bit storage formats.

Subset 3: Create a drop from a list of files and directories

Given the -c command-line argument, rain should be able to add files in sub-directories. For example:

Create a drop called a.drop with the file "hello.txt" that is contained within 2 levels of directories.
./rain -c a.drop examples/2_files.d/hello.txt 
Adding: examples
Adding: examples/2_files.d
Adding: examples/2_files.d/hello.txt

If a directory is specified when creating a drop, rain should add the entire directory tree to the drop.

Create a drop called a.drop with *all* the contents within the directory "3_files.subdirectory.d"
which is in the "examples" directory.
./rain -c a.drop examples/3_files.subdirectory.d
Adding: examples
Adding: examples/3_files.subdirectory.d
Adding: examples/3_files.subdirectory.d/goodbye
Adding: examples/3_files.subdirectory.d/goodbye/last_goodbye.txt
Adding: examples/3_files.subdirectory.d/hello
Adding: examples/3_files.subdirectory.d/hello/hello.txt
Adding: examples/3_files.subdirectory.d/these_days.txt

Given the -L command-line argument and a drop containing directories, rain should be able to list files and directories. For example:

./rain -L examples/1_file.subdirectory.drop 
drwxr-xr-x  8      0  hello
-rw-r--r--  8     56  hello/hello.txt

Subset 3: Extract directories from a drop

Given the -x command-line argument, and a drop containing directories, rain should be able to extract files and directories. For example:

./rain -x examples/3_files.subdirectory.drop 
Creating directory: goodbye
Extracting: goodbye/last_goodbye.txt
Creating directory: hello
Extracting: hello/hello.txt
Extracting: these_days.txt

Subset 3: Manipulate 6-bit and 7-bit storage formats

The -7 and -6 options allow droplets to be created in 7-bit and 6-bit format. For example:

./rain -7 -c seven.drop hello.txt
Adding: hello.txt
./rain -L seven.drop
-rw-r--r--  7      6  hello.txt
./rain -6 -c six.drop hola.txt hi.txt
Adding: hola.txt
Adding: hi.txt
./rain -L six.drop
-rw-r--r--  6      5  hola.txt
-rw-r--r--  6      3  hi.txt

It is possible for drops to contain droplets in multiple formats. For example:

./rain -a mixed.drop hello.txt
Adding: hello.txt
./rain -L mixed.drop
-rw-r--r--  8      6  hello.txt
./rain -7 -a mixed.drop hi.txt
Adding: hi.txt
./rain -L mixed.drop
-rw-r--r--  8      6  hello.txt
-rw-r--r--  7      3  hi.txt
./rain -6 -a mixed.drop hola.txt
Adding: hola.txt
./rain -L mixed.drop
-rw-r--r--  8      6  hello.txt
-rw-r--r--  7      3  hi.txt
-rw-r--r--  6      5  hola.txt

Your code should handle creating, listing, checking, and extracting drops in 7-bit and 6-bit format.

Your code should produce an error if asked to create a droplet containing bytes which can be encoded in the specified format. For example:

 echo Hello >Hello.txt
./rain -6 -c broken.drop Hello.txt
error: byte 0x48 can not be represented in 6-bit format

Handling Errors

Error checking is an important part of this assignment. Automarking will test error handling.

Error messages should be one line (only) and be written to stderr (not stdout).

rain should exit with status 1 after an error.

rain should check all file operations for errors.

As much as possible match the reference implementation error messages exactly.

The reference implementation uses perror(3) to report errors from file operations and other system calls.

It is not necessary to remove files and directories already created or partially created when an error occurs.

You may extract a file or directory from droplet before determining if the droplet hash is correct.

You can extract previous file or directory from a droplet.

Where multiple errors messages could be produced, for example, if two non-existent files are specified to be added to a drop, rain may produce any one of the error messages.

Reference implementation

A reference implementation is a common, efficient, and effective method to provide or define an operational specification; and it's something you will likely work with after you leave UNSW.

We've provided a reference implementation, 1521 rain, which you can use to find the correct outputs and behaviours for any input:

1521 rain -L examples/tiny.6-bit.drop
-rw-r--r--  6      0  a

Every concrete example shown below is runnable using the reference implementation; run 1521 rain instead of ./rain.

Where any aspect of this assignment is undefined in this specification, you should match the behaviour exhibited by the reference implementation. Discovering and matching the reference implementation's behaviour is deliberately a part of this assignment.

If you discover what you believe to be a bug in the reference implementation, please report it in the class forum. If it is a bug, we may fix the bug; or otherwise indicate that you do not need to match the reference implementation's behaviour in that specific case.

The drop and droplet format

drops must follow exactly the format produced by the reference implementation.

A drop consists of a sequence of one or more droplets. Each droplet contains the information about one file or directory.

The first byte of a drop file is the first byte of the first droplet. That droplet is immediately followed by either another droplet, or by the end of the drop file.

name length type description
magic number B unsigned, 8-bit, little-endian byte 0 in every droplet must be 0x63 (ASCII 'c')
droplet format B unsigned, 8-bit, little-endian byte 1 in every droplet must be one of 0x36, 0x37, 0x38 (ASCII '6', '7', '8')
permissions 10 B characters bytes 2—11 are the type and permissions as a ls(1)-like character array; e.g., "-rwxr-xr-x"
pathname length B unsigned, 16-bit, little-endian bytes 12—13 are an unsigned 2-byte (16-bit) little-endian integer, giving the length of
pathname pathname-length characters the filename of the object in this droplet.
content length B unsigned, 48-bit, little-endian the next bytes are an unsigned 6-byte (48-bit) little-endian integer giving the length of the file that was encoded to give
content content-length for 8-bit format, see below for other formats bytes the data of the object in this droplet.
hash B unsigned, 8-bit, little-endian the last byte of a droplet is a droplet-hash of all bytes of this droplet except this byte.

droplet content encodings (Subset 3 only)

  • 8-bit format (droplet format == 0x38 contents is an array of bytes, which are exactly equivalent to the bytes in the original file.

  • 7-bit format (droplet format == 0x37) contents is an array of bytes representing packed seven-bit values, with the trailing bits set to zero. Every byte of the original file is taken as a seven-bit value, and packed as described below. This format can store any seven bit value — so, for example, any byte containing valid ASCII can be stored.

    This format needs \( \lceil (7.0/8) * \text{content-length} \rceil \) bytes. 7-bit format is used only in subset 3.

  • 6-bit format (droplet format == 0x36) contents is an array of bytes of packed six-bit values where the trailing bits in the last byte are zero, and which are translated using the functions droplet_to_6_bit and droplet_from_6_bit in rain_6_bit.c.

    This format cannot store all ASCII values, for example upper case letters can't be stored in 6-bit format.

    This format needs \( \lceil (6.0/8) * \text{content-length} \rceil \) bytes.

6-bit format is used only in subset 3.

Packed n-bit encoding (Subset 3 only)

We often store smaller values inside larger types. For example, the integer 42 only needs six bits; but we often will store it in a full thirty-two-bit integer, wasting many bits of zeroes. Assuming we know how many bits the value needs, we could only store the relevant bits.

For example, let's say we have three seven-bit values a, b, c, made up of arbitrary bit-strings, and stored in eight-bit variables

  • a: 0b0AAA_AAAA,
  • b: 0b0BBB_BBBB,
  • c: 0b0CCC_CCCC,
then a packed seven-bit encoding of these values in order would be:
    0bAAAA_AAAB_BBBB_BBCC_CCCC_C???

However, we have a problem: what happens to the trailing bits, which don't have a value? Note that we've defined all trailing bits to be zero above, which would here give:

    0bAAAA_AAAB_BBBB_BBCC_CCCC_C000

Inspecting drops and droplets

The hexdump(1) utility can show the individual bytes of a file. We can use this to inspect drops and droplets.

For example, here is a drop, made up of two droplets.

hexdump -vC  examples/2_files.drop
00000000  63 38 2d 72 77 2d 72 2d  2d 72 2d 2d 09 00 68 65  |c8-rw-r--r--..he|
00000010  6c 6c 6f 2e 74 78 74 38  00 00 00 00 00 48 65 6c  |llo.txt8.....Hel|
00000020  6c 6f 20 43 4f 4d 50 31  35 32 31 0a 49 20 68 6f  |lo COMP1521.I ho|
00000030  70 65 20 79 6f 75 20 61  72 65 20 65 6e 6a 6f 79  |pe you are enjoy|
00000040  69 6e 67 20 74 68 69 73  20 61 73 73 69 67 6e 6d  |ing this assignm|
00000050  65 6e 74 2e 0a 2d 63 38  2d 72 77 2d 72 2d 2d 72  |ent..-c8-rw-r--r|
00000060  2d 2d 10 00 6c 61 73 74  5f 67 6f 6f 64 62 79 65  |--..last_goodbye|
00000070  2e 74 78 74 a6 00 00 00  00 00 54 68 69 73 20 69  |.txt......This i|
00000080  73 20 6f 75 72 20 6c 61  73 74 20 67 6f 6f 64 62  |s our last goodb|
00000090  79 65 0a 49 20 68 61 74  65 20 74 6f 20 66 65 65  |ye.I hate to fee|
000000a0  6c 20 74 68 65 20 6c 6f  76 65 20 62 65 74 77 65  |l the love betwe|
000000b0  65 6e 20 75 73 20 64 69  65 0a 42 75 74 20 69 74  |en us die.But it|
000000c0  27 73 20 6f 76 65 72 0a  4a 75 73 74 20 68 65 61  |'s over.Just hea|
000000d0  72 20 74 68 69 73 20 61  6e 64 20 74 68 65 6e 20  |r this and then |
000000e0  49 27 6c 6c 20 67 6f 0a  59 6f 75 20 67 61 76 65  |I'll go.You gave|
000000f0  20 6d 65 20 6d 6f 72 65  20 74 6f 20 6c 69 76 65  | me more to live|
00000100  20 66 6f 72 0a 4d 6f 72  65 20 74 68 61 6e 20 79  | for.More than y|
00000110  6f 75 27 6c 6c 20 65 76  65 72 20 6b 6e 6f 77 0a  |ou'll ever know.|
00000120  60                                                |`|
00000121

Each line of hexdump(1) output is in three groups:

  • the address column: this starts at 0x00000000, and increases by 0x10 (or 16 in base 10) each line;

  • the data columns: after the address, we get (up to) 16 two-digit hexadecimal values, grouped into two blocks of eight values each, which represents the actual data of the file, and

  • the human readable stripe: at the very end of each line, between the vertical bars (|) is the human readable version of the bytes preceding, or a '.' if the byte wouldn't ordinarily be visible.

You could also use the hd(1), od(1), or xxd(1) utilities instead of hexdump(1) . Also provided for the assignment is 1521 dump_drop which prints the contents of a drop in a mroe structured way, e.g.:

1521 dump_drop examples/2_files.drop
------------------------------------------------------------------------------
Field Name      Field Offset  Field Hex                      Field ASCII     Field Numeric

magic           0x00000000    63                             c
format          0x00000001    38                             8
mode            0x00000002    2d 72 77 2d 72 2d 2d 72 2d 2d  -rw-r--r--
path length     0x0000000c    09 00                                          9
pathname        0x0000000e                                   hello.txt
content length  0x00000017    38 00 00 00 00 00                              56
contents        0x0000001d
"""
Hello COMP1521.I hope you are enjoying this assignment..
"""
hash            0x00000055    2d

------------------------------------------------------------------------------
Field Name      Field Offset  Field Hex                      Field ASCII     Field Numeric

magic           0x00000056    63                             c
format          0x00000057    38                             8
mode            0x00000058    2d 72 77 2d 72 2d 2d 72 2d 2d  -rw-r--r--
path length     0x00000062    10 00                                          16
pathname        0x00000064                                   last_goodbye.txt
content length  0x00000074    a6 00 00 00 00 00                              166
contents        0x0000007a
"""
This is our last goodbye.I hate to feel the love between us die.But it's over.Just hear this and then I'll go.You gave me more to live for.More than you'll ever know.
"""
hash            0x00000120    60

6-bit format (Subset 3 only)

droplet 6-bit format defines a subset of 64 8-bit values (bytes) to have a six-bit encoding; those six bits are then stored packed.

The remaining 192 8-bit values can not be encoded in 6-bit format.

The functions droplet_to_6_bit and droplet_from_6_bit in rain_6_bit.c to convert 8-bit values to and from 6-bit format.

You can find the mapping by reading the code in rain_6_bit.c.

The droplet hash (Subsets 1, 2, 3)

Each droplet ends with a hash (sometimes referred to as a digest) which calculated from the other values of the droplet. This allows us to detect if any bytes of the drop have changed, for example by disk or network errors.

The droplet_hash() function makes one step of computation of the hash of a sequence of bytes:

uint8_t droplet_hash(uint8_t current_hash_value, uint8_t byte_value) {
    return ((current_hash_value * 33) & 0xff) ^ byte_value;
}

Given the hash value of the sequence up to this byte, and the value of this byte it calculates the new hash value.

If we create a drop of a single one-byte file, like this:

echo >a
1521 rain -c a.drop a

We can then inspect the drop, and see its hash is 0x15.

hexdump -Cv a.drop
00000000  63 38 2d 72 77 2d 72 2d  2d 72 2d 2d 01 00 61 01  |c8-rw-r--r--..a.|
00000010  00 00 00 00 00 0a 15                              |.......|
00000017

Here's the sequence of calls that calculated that value:

droplet_hash(0x00, 0x63) = 0x63
droplet_hash(0x63, 0x38) = 0xfb
droplet_hash(0xfb, 0x2d) = 0x76
droplet_hash(0x76, 0x72) = 0x44
droplet_hash(0x44, 0x77) = 0xb3
droplet_hash(0xb3, 0x2d) = 0x3e
droplet_hash(0x3e, 0x72) = 0x8c
droplet_hash(0x8c, 0x2d) = 0x21
droplet_hash(0x21, 0x2d) = 0x6c
droplet_hash(0x6c, 0x72) = 0x9e
droplet_hash(0x9e, 0x2d) = 0x73
droplet_hash(0x73, 0x2d) = 0xfe
droplet_hash(0xfe, 0x01) = 0xbf
droplet_hash(0xbf, 0x00) = 0x9f
droplet_hash(0x9f, 0x61) = 0x1e
droplet_hash(0x1e, 0x01) = 0xdf
droplet_hash(0xdf, 0x00) = 0xbf
droplet_hash(0xbf, 0x00) = 0x9f
droplet_hash(0x9f, 0x00) = 0x7f
droplet_hash(0x7f, 0x00) = 0x5f
droplet_hash(0x5f, 0x00) = 0x3f
droplet_hash(0x3f, 0x0a) = 0x15

Assumptions and Clarifications

Like all good programmers, you should make as few assumptions as possible. If in doubt, match the output of the reference implementation.

  • Your submitted code must be a single C program only. You may not submit code in other languages.

  • You can call functions from the C standard library available by default on CSE Linux systems: including, e.g., stdio.h, stdlib.h, string.h, math.h, assert.h.

  • We will compile your code with dcc when marking. Run-time errors from illegal or invalid C will cause your code to fail automarking (and will likely result in you losing marks).

  • Your program must not require extra compile options. It must compile successfully with:

    dcc *.c -o rain
    
  • You may not use functions from other libraries. In other words, you cannot use the dcc -l flag.

  • If your program prints debugging output, it will fail automarking tests. Make sure you disable any debugging output before submission.

  • You may not create or use temporary files.

  • You may not create subprocesses: you may not use posix_spawn(3), posix_spawnp(3), system(3), popen(3), fork(2), vfork(2), clone(2), or any of the exec* family of functions, like execve(2).

  • You may assume that the length of a drop is less than the maximum value supported by a long.

  • rain only has to handle ordinary files and directories.

    rain does not have to handle symbolic links, devices or other special files.

    rain will not be given directories containing symbolic links, devices or other special files.

    rain does not have to handle hard links.

  • If completing a rain command would produce multiple errors, you may produce any of the errors and stop.

    You do not have to produce the particular error that the reference implementation does.

  • If a droplet path name contains a directory then a droplet for the directory will appear in the drop beforehand.

    For example, if there is a droplet for the path name a/b/file.txt then there will be preceding droplets for the directories a and a/b,

    You may also assume the droplet for the directory specifies the directory is writable.

  • When adding an entire directory (subset 3) to a drop you may add the directory contents in any order to the drop, after the directory droplet.

    You do not have to match the order the reference implementation uses.

  • When a rain command specifies adding files with a common sub-directory. You may add a droplet for the sub-directory multiple times. For example, given this command:

    ./rain -c a.drop b/file1 b/file2
    
    You may add two (duplicate) droplets for b.
  • You can assume the path name of a drop being created with -c, will not also be added to the drop, and will not be in a directory being added to the drop.

  • It is not necessary to check the hashes or magic numbers of droplets in subset 0. Subset 0 tests will only use valid droplets.

  • The reference implementation checks the magic number (first byte), format and hash when listing (-l and -L) and extracting (-x) drops. and stops with an error emssage if they are are invalid, for example:

    ./rain -l examples/text_file.bad_hash.drop
    error: incorrect droplet hash 0x2d should be 0x77
    ./rain -L examples/text_file.bad_magic.drop
    error: incorrect first droplet byte: 0x39 should be 0x63
    

    This is very desirable behaviour and you can implement this in your code. However it will not be tested with -l, -L and -x command line options to avoid problems in automarking.

    Your code will only be tested with the -C option on drops with invalid hashes, magic numbers and formats

  • It is not necessary to check the hashes or magic numbers in an existing drop when appending to it (-a).

If you need clarification on what you can and cannot use or do for this assignment, ask in the class forum.

You are required to submit intermediate versions of your assignment. See below for details.

Assessment

Testing

When you think your program is working, you can use autotest to run some simple automated tests:

1521 autotest rain rain.c [optionally: any extra .c or .h files]

1521 autotest will not test everything.
Always do your own testing.

Automarking will be run by the lecturer after the submission deadline, using a superset of tests to those autotest runs for you.

Submission

When you are finished working on the assignment, you must submit your work by running give:

give cs1521 ass2_rain rain.c [optionally: any extra .c or .h files]

You must run give before Week 11 Monday 09:00:00 to obtain the marks for this assignment. Note that this is an individual exercise, the work you submit with give must be entirely your own.

You can run give multiple times.
Only your last submission will be marked.

If you are working at home, you may find it more convenient to upload your work via give's web interface.

You cannot obtain marks by emailing your code to tutors or lecturers.

You can check your latest submission on CSE servers with:

1521 classrun check ass2_rain

You can check the files you have submitted here.

Manual marking will be done by your tutor, who will mark for style and readability, as described in the Assessment section below. After your tutor has assessed your work, you can view your results here; The resulting mark will also be available via give's web interface.

Due Date

This assignment is due Week 11 Monday 09:00:00 (2023-04-24 09:00:00).

The UNSW standard late penalty for assessment is 5% per day for 5 days - this is implemented hourly for this assignment.

Your assignment mark will be reduced by 0.2% for each hour (or part thereof) late past the submission deadline.

For example, if an assignment worth 60% was submitted half an hour late, it would be awarded 59.8%, whereas if it was submitted past 10 hours late, it would be awarded 57.8%.

Beware - submissions 5 or more days late will receive zero marks. This again is the UNSW standard assessment policy.

Assessment Scheme

This assignment will contribute 15 marks to your final COMP1521 mark.

80% of the marks for assignment 2 will come from the performance of your code on a large series of tests.

20% of the marks for assignment 2 will come from hand marking. These marks will be awarded on the basis of clarity, commenting, elegance and style. In other words, you will be assessed on how easy it is for a human to read and understand your program.

An indicative assessment scheme for performance follows. The lecturer may vary the assessment scheme after inspecting the assignment submissions, but it is likely to be broadly similar to the following:

HD (90+%) well documented code,
very readable code,
subsets 0-3 working for all drops.
DN (80+%) some documentation in code,
readable code,
subsets 0-2 working for all drops.
CR (70%) some documentation in code,
readable code,
subset 0-1 working for all drops.
PS (60%) subset 0 working for all drops.
0% knowingly providing your work to anyone
and it is subsequently submitted (by anyone).
0 FL for
COMP1521
submitting any other person's work;
this includes joint work.
academic
misconduct
submitting another person's work without their consent;
paying another person to do work for you.

An indicative assessment scheme for style follows. The lecturer may vary the assessment scheme after inspecting the assignment submissions, but it is likely to be broadly similar to the following:

100% for style perfect style
90% for style great style, almost all style characteristics perfect.
80% for style good style, one or two style characteristics not well done.
70% for style good style, a few style characteristics not well done.
60% for style ok style, an attempt at most style characteristics.
≤ 50% for style an attempt at style.

An indicative style rubric follows:

  • Formatting (6/20):
    • Whitespace (e.g. 1 + 2 instead of 1+2)
    • Indentation (consistent, tabs or spaces are okay)
    • Line length (below 100 characters unless very exceptional)
    • Line breaks (using vertical whitespace to improve readability)
  • Documentation (8/20):
    • Header comment (with name, zID, description of program)
    • Function comments (above each function with a description)
    • Descriptive variable names (e.g. char *home_directory instead of char *h)
    • Descriptive function names (e.g. get_home_directory instead of get_hd)
    • Sensible commenting throughout the code (don't comment every single line; leave comments when necessary)
  • Elegance (5/20):
    • Does this code avoid redundancy? (e.g. Don't repeat yourself!)
    • Are helper functions used to reduce complexity? (functions should be small and simple where possible)
    • Are constants appropriately created and used? (magic numbers should be avoided)
  • Portability (1/20):
    • Would this code be able to compile and behave as expected on other POSIX-compliant machines? (using standard libraries without platform-specific code)

Note that the following penalties apply to your total mark for plagiarism:

0 for asst2 knowingly providing your work to anyone
and it is subsequently submitted (by anyone).
0 FL for
COMP1521
submitting any other person's work; this includes joint work.
academic
misconduct
submitting another person's work without their consent;
paying another person to do work for you.

Intermediate Versions of Work

You are required to submit intermediate versions of your assignment.

Every time you work on the assignment and make some progress you should copy your work to your CSE account and submit it using the give command below. It is fine if intermediate versions do not compile or otherwise fail submission tests. Only the final submitted version of your assignment will be marked.

Assignment Conditions

  • Joint work is not permitted on this assignment.

    This is an individual assignment. The work you submit must be entirely your own work: submission of work even partly written by any other person is not permitted.

    Do not request help from anyone other than the teaching staff of COMP1521 — for example, in the course forum, or in help sessions.

    Do not post your assignment code to the course forum. The teaching staff can view code you have recently submitted with give, or recently autotested.

    Assignment submissions are routinely examined both automatically and manually for work written by others.

    Rationale: this assignment is designed to develop the individual skills needed to produce an entire working program. Using code written by, or taken from, other people will stop you learning these skills. Other CSE courses focus on skills needed for working in a team.

  • The use of generative tools such as Github Copilot, ChatGPT, Google Bard is not permitted on this assignment.

    Rationale: this assignment is designed to develop your understanding of basic concepts. Using synthesis tools will stop you learning these fundamental concepts, which will significantly impact your ability to complete future courses.

  • Sharing, publishing, or distributing your assignment work is not permitted.

    Do not provide or show your assignment work to any other person, other than the teaching staff of COMP1521. For example, do not message your work to friends.

    Do not publish your assignment code via the Internet. For example, do not place your assignment in a public GitHub repository.

    Rationale: by publishing or sharing your work, you are facilitating other students using your work. If other students find your assignment work and submit part or all of it as their own work, you may become involved in an academic integrity investigation.

  • Sharing, publishing, or distributing your assignment work after the completion of COMP1521 is not permitted.

    For example, do not place your assignment in a public GitHub repository after this offering of COMP1521 is over.

    Rationale: COMP1521 may reuse assignment themes covering similar concepts and content. If students in future terms find your assignment work and submit part or all of it as their own work, you may become involved in an academic integrity investigation.

Violation of any of the above conditions may result in an academic integrity investigation, with possible penalties up to and including a mark of 0 in COMP1521, and exclusion from future studies at UNSW. For more information, read the UNSW Student Code, or contact the course account.