Branch data Line data Source code
1 : : // Copyright (c) 2010 Satoshi Nakamoto
2 : : // Copyright (c) 2009-present The Bitcoin Core developers
3 : : // Distributed under the MIT software license, see the accompanying
4 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
5 : :
6 : : #include <base58.h>
7 : : #include <chain.h>
8 : : #include <coins.h>
9 : : #include <consensus/amount.h>
10 : : #include <consensus/validation.h>
11 : : #include <core_io.h>
12 : : #include <index/txindex.h>
13 : : #include <key_io.h>
14 : : #include <node/blockstorage.h>
15 : : #include <node/coin.h>
16 : : #include <node/context.h>
17 : : #include <node/psbt.h>
18 : : #include <node/transaction.h>
19 : : #include <node/types.h>
20 : : #include <policy/packages.h>
21 : : #include <policy/policy.h>
22 : : #include <policy/rbf.h>
23 : : #include <primitives/transaction.h>
24 : : #include <psbt.h>
25 : : #include <random.h>
26 : : #include <rpc/blockchain.h>
27 : : #include <rpc/rawtransaction_util.h>
28 : : #include <rpc/server.h>
29 : : #include <rpc/server_util.h>
30 : : #include <rpc/util.h>
31 : : #include <script/script.h>
32 : : #include <script/sign.h>
33 : : #include <script/signingprovider.h>
34 : : #include <script/solver.h>
35 : : #include <uint256.h>
36 : : #include <undo.h>
37 : : #include <util/bip32.h>
38 : : #include <util/check.h>
39 : : #include <util/strencodings.h>
40 : : #include <util/string.h>
41 : : #include <util/vector.h>
42 : : #include <validation.h>
43 : : #include <validationinterface.h>
44 : :
45 : : #include <cstdint>
46 : : #include <numeric>
47 : :
48 : : #include <univalue.h>
49 : :
50 : : using node::AnalyzePSBT;
51 : : using node::FindCoins;
52 : : using node::GetTransaction;
53 : : using node::NodeContext;
54 : : using node::PSBTAnalysis;
55 : :
56 : : static constexpr decltype(CTransaction::version) DEFAULT_RAWTX_VERSION{CTransaction::CURRENT_VERSION};
57 : :
58 : 3417 : static void TxToJSON(const CTransaction& tx, const uint256 hashBlock, UniValue& entry,
59 : : Chainstate& active_chainstate, const CTxUndo* txundo = nullptr,
60 : : TxVerbosity verbosity = TxVerbosity::SHOW_DETAILS)
61 : : {
62 : 3417 : CHECK_NONFATAL(verbosity >= TxVerbosity::SHOW_DETAILS);
63 : : // Call into TxToUniv() in bitcoin-common to decode the transaction hex.
64 : : //
65 : : // Blockchain contextual information (confirmations and blocktime) is not
66 : : // available to code in bitcoin-common, so we query them here and push the
67 : : // data into the returned UniValue.
68 [ + - ]: 3417 : TxToUniv(tx, /*block_hash=*/uint256(), entry, /*include_hex=*/true, txundo, verbosity);
69 : :
70 [ + + ]: 6834 : if (!hashBlock.IsNull()) {
71 : 52 : LOCK(cs_main);
72 : :
73 [ + - + - : 104 : entry.pushKV("blockhash", hashBlock.GetHex());
+ - + - ]
74 [ + - ]: 52 : const CBlockIndex* pindex = active_chainstate.m_blockman.LookupBlockIndex(hashBlock);
75 [ + - ]: 52 : if (pindex) {
76 [ + + ]: 52 : if (active_chainstate.m_chain.Contains(pindex)) {
77 [ - + + - : 98 : entry.pushKV("confirmations", 1 + active_chainstate.m_chain.Height() - pindex->nHeight);
+ - + - ]
78 [ + - + - : 98 : entry.pushKV("time", pindex->GetBlockTime());
+ - ]
79 [ + - + - : 98 : entry.pushKV("blocktime", pindex->GetBlockTime());
+ - ]
80 : : }
81 : : else
82 [ + - + - : 6 : entry.pushKV("confirmations", 0);
+ - ]
83 : : }
84 : 52 : }
85 : 3417 : }
86 : :
87 : 5304 : static std::vector<RPCArg> CreateTxDoc()
88 : : {
89 : 5304 : return {
90 [ + - + - ]: 10608 : {"inputs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The inputs",
91 : : {
92 [ + - + - ]: 10608 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
93 : : {
94 [ + - + - ]: 10608 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
95 [ + - + - ]: 10608 : {"vout", RPCArg::Type::NUM, RPCArg::Optional::NO, "The output number"},
96 [ + - + - : 15912 : {"sequence", RPCArg::Type::NUM, RPCArg::DefaultHint{"depends on the value of the 'replaceable' and 'locktime' arguments"}, "The sequence number"},
+ - ]
97 : : },
98 : : },
99 : : },
100 : : },
101 [ + - + - ]: 10608 : {"outputs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The outputs specified as key-value pairs.\n"
102 : : "Each key may only appear once, i.e. there can only be one 'data' output, and no address may be duplicated.\n"
103 : : "At least one output of either type must be specified.\n"
104 : : "For compatibility reasons, a dictionary, which holds the key-value pairs directly, is also\n"
105 : : " accepted as second parameter.",
106 : : {
107 [ + - + - ]: 10608 : {"", RPCArg::Type::OBJ_USER_KEYS, RPCArg::Optional::OMITTED, "",
108 : : {
109 [ + - + - ]: 10608 : {"address", RPCArg::Type::AMOUNT, RPCArg::Optional::NO, "A key-value pair. The key (string) is the bitcoin address, the value (float or string) is the amount in " + CURRENCY_UNIT},
110 : : },
111 : : },
112 [ + - + - ]: 10608 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
113 : : {
114 [ + - + - ]: 10608 : {"data", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "A key-value pair. The key must be \"data\", the value is hex-encoded data that becomes a part of an OP_RETURN output"},
115 : : },
116 : : },
117 : : },
118 [ + - ]: 5304 : RPCArgOptions{.skip_type_check = true}},
119 [ + - + - : 15912 : {"locktime", RPCArg::Type::NUM, RPCArg::Default{0}, "Raw locktime. Non-0 value also locktime-activates inputs"},
+ - ]
120 [ + - + - : 15912 : {"replaceable", RPCArg::Type::BOOL, RPCArg::Default{true}, "Marks this transaction as BIP125-replaceable.\n"
+ - ]
121 : : "Allows this transaction to be replaced by a transaction with higher fees. If provided, it is an error if explicit sequence numbers are incompatible."},
122 [ + - + - : 15912 : {"version", RPCArg::Type::NUM, RPCArg::Default{DEFAULT_RAWTX_VERSION}, "Transaction version"},
+ - ]
123 [ + - + - : 137904 : };
+ - + - +
- + - + +
+ + + + +
+ + + + +
- - - - -
- - - - -
- - ]
124 [ + - + - : 132600 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - ]
125 : :
126 : : // Update PSBT with information from the mempool, the UTXO set, the txindex, and the provided descriptors.
127 : : // Optionally, sign the inputs that we can using information from the descriptors.
128 : 15 : PartiallySignedTransaction ProcessPSBT(const std::string& psbt_string, const std::any& context, const HidingSigningProvider& provider, std::optional<int> sighash_type, bool finalize)
129 : : {
130 : : // Unserialize the transactions
131 : 15 : PartiallySignedTransaction psbtx;
132 [ + - ]: 15 : std::string error;
133 [ + - - + ]: 15 : if (!DecodeBase64PSBT(psbtx, psbt_string, error)) {
134 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
135 : : }
136 : :
137 [ - + - - ]: 15 : if (g_txindex) g_txindex->BlockUntilSyncedToCurrentChain();
138 [ + - ]: 15 : const NodeContext& node = EnsureAnyNodeContext(context);
139 : :
140 : : // If we can't find the corresponding full transaction for all of our inputs,
141 : : // this will be used to find just the utxos for the segwit inputs for which
142 : : // the full transaction isn't found
143 : 15 : std::map<COutPoint, Coin> coins;
144 : :
145 : : // Fetch previous transactions:
146 : : // First, look in the txindex and the mempool
147 [ - + + + ]: 36 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
148 [ + - ]: 21 : PSBTInput& psbt_input = psbtx.inputs.at(i);
149 [ + - ]: 21 : const CTxIn& tx_in = psbtx.tx->vin.at(i);
150 : :
151 : : // The `non_witness_utxo` is the whole previous transaction
152 [ + + ]: 21 : if (psbt_input.non_witness_utxo) continue;
153 : :
154 : 11 : CTransactionRef tx;
155 : :
156 : : // Look in the txindex
157 [ - + ]: 11 : if (g_txindex) {
158 : 0 : uint256 block_hash;
159 [ # # ]: 0 : g_txindex->FindTx(tx_in.prevout.hash, block_hash, tx);
160 : : }
161 : : // If we still don't have it look in the mempool
162 [ + - ]: 11 : if (!tx) {
163 [ + - - + ]: 22 : tx = node.mempool->get(tx_in.prevout.hash);
164 : : }
165 [ + + ]: 11 : if (tx) {
166 : 9 : psbt_input.non_witness_utxo = tx;
167 : : } else {
168 [ + - ]: 2 : coins[tx_in.prevout]; // Create empty map entry keyed by prevout
169 : : }
170 : 11 : }
171 : :
172 : : // If we still haven't found all of the inputs, look for the missing ones in the utxo set
173 [ + + ]: 15 : if (!coins.empty()) {
174 [ + - ]: 1 : FindCoins(node, coins);
175 [ - + + + ]: 3 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
176 [ + - ]: 2 : PSBTInput& input = psbtx.inputs.at(i);
177 : :
178 : : // If there are still missing utxos, add them if they were found in the utxo set
179 [ + - ]: 2 : if (!input.non_witness_utxo) {
180 [ + - ]: 2 : const CTxIn& tx_in = psbtx.tx->vin.at(i);
181 [ + - ]: 2 : const Coin& coin = coins.at(tx_in.prevout);
182 [ - + - - : 2 : if (!coin.out.IsNull() && IsSegWitOutput(provider, coin.out.scriptPubKey)) {
- - ]
183 : 0 : input.witness_utxo = coin.out;
184 : : }
185 : : }
186 : : }
187 : : }
188 : :
189 [ + - ]: 15 : const PrecomputedTransactionData& txdata = PrecomputePSBTData(psbtx);
190 : :
191 [ - + + + ]: 29 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
192 [ + - + - : 21 : if (PSBTInputSigned(psbtx.inputs.at(i))) {
- + ]
193 : 0 : continue;
194 : : }
195 : :
196 : : // Update script/keypath information using descriptor data.
197 : : // Note that SignPSBTInput does a lot more than just constructing ECDSA signatures.
198 : : // We only actually care about those if our signing provider doesn't hide private
199 : : // information, as is the case with `descriptorprocesspsbt`
200 : : // Only error for mismatching sighash types as it is critical that the sighash to sign with matches the PSBT's
201 [ + - + + ]: 21 : if (SignPSBTInput(provider, psbtx, /*index=*/i, &txdata, sighash_type, /*out_sigdata=*/nullptr, finalize) == common::PSBTError::SIGHASH_MISMATCH) {
202 [ + - ]: 7 : throw JSONRPCPSBTError(common::PSBTError::SIGHASH_MISMATCH);
203 : : }
204 : : }
205 : :
206 : : // Update script/keypath information using descriptor data.
207 [ - + + + ]: 19 : for (unsigned int i = 0; i < psbtx.tx->vout.size(); ++i) {
208 [ + - ]: 11 : UpdatePSBTOutput(provider, psbtx, i);
209 : : }
210 : :
211 [ + - ]: 8 : RemoveUnnecessaryTransactions(psbtx);
212 : :
213 : 8 : return psbtx;
214 : 29 : }
215 : :
216 : 5884 : static RPCMethod getrawtransaction()
217 : : {
218 : 5884 : return RPCMethod{
219 : 5884 : "getrawtransaction",
220 : :
221 [ + - ]: 11768 : "By default, this call only returns a transaction if it is in the mempool. If -txindex is enabled\n"
222 : : "and no blockhash argument is passed, it will return the transaction if it is in the mempool or any block.\n"
223 : : "If a blockhash argument is passed, it will return the transaction if\n"
224 : : "the specified block is available and the transaction is in that block.\n\n"
225 : : "Hint: Use gettransaction for wallet transactions.\n\n"
226 : :
227 : : "If verbosity is 0 or omitted, returns the serialized transaction as a hex-encoded string.\n"
228 : : "If verbosity is 1, returns a JSON Object with information about the transaction.\n"
229 : : "If verbosity is 2, returns a JSON Object with information about the transaction, including fee and prevout information.",
230 : : {
231 [ + - + - ]: 11768 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
232 [ + - + - : 17652 : {"verbosity|verbose", RPCArg::Type::NUM, RPCArg::Default{0}, "0 for hex-encoded data, 1 for a JSON object, and 2 for JSON object with fee and prevout",
+ - ]
233 [ + - ]: 11768 : RPCArgOptions{.skip_type_check = true}},
234 [ + - + - ]: 11768 : {"blockhash", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "The block in which to look for the transaction"},
235 : : },
236 : : {
237 [ + - ]: 5884 : RPCResult{"if verbosity is not set or set to 0",
238 [ + - + - ]: 11768 : RPCResult::Type::STR, "data", "The serialized transaction as a hex-encoded string for 'txid'"
239 : 5884 : },
240 [ + - ]: 11768 : RPCResult{"if verbosity is set to 1",
241 [ + - + - ]: 11768 : RPCResult::Type::OBJ, "", "",
242 [ + - + - : 82376 : Cat<std::vector<RPCResult>>(
+ + - - ]
243 : : {
244 [ + - + - ]: 11768 : {RPCResult::Type::BOOL, "in_active_chain", /*optional=*/true, "Whether specified block is in the active chain or not (only present with explicit \"blockhash\" argument)"},
245 [ + - + - ]: 11768 : {RPCResult::Type::STR_HEX, "blockhash", /*optional=*/true, "the block hash"},
246 [ + - + - ]: 11768 : {RPCResult::Type::NUM, "confirmations", /*optional=*/true, "The confirmations"},
247 [ + - + - ]: 11768 : {RPCResult::Type::NUM_TIME, "blocktime", /*optional=*/true, "The block time expressed in " + UNIX_EPOCH_TIME},
248 [ + - + - ]: 11768 : {RPCResult::Type::NUM, "time", /*optional=*/true, "Same as \"blocktime\""},
249 [ + - + - ]: 11768 : {RPCResult::Type::STR_HEX, "hex", "The serialized, hex-encoded data for 'txid'"},
250 : : },
251 : 11768 : TxDoc({.txid_field_doc="The transaction id (same as provided)"})),
252 : : },
253 [ + - ]: 11768 : RPCResult{"for verbosity = 2",
254 [ + - + - ]: 11768 : RPCResult::Type::OBJ, "", "",
255 : : {
256 [ + - + - ]: 11768 : {RPCResult::Type::ELISION, "", "Same output as verbosity = 1"},
257 [ + - + - ]: 11768 : {RPCResult::Type::NUM, "fee", /*optional=*/true, "transaction fee in " + CURRENCY_UNIT + ", omitted if block undo data is not available"},
258 [ + - + - ]: 11768 : {RPCResult::Type::ARR, "vin", "",
259 : : {
260 [ + - + - ]: 11768 : {RPCResult::Type::OBJ, "", "utxo being spent",
261 : : {
262 [ + - + - ]: 11768 : {RPCResult::Type::ELISION, "", "Same output as verbosity = 1"},
263 [ + - + - ]: 11768 : {RPCResult::Type::OBJ, "prevout", /*optional=*/true, "The previous output, omitted if block undo data is not available",
264 : : {
265 [ + - + - ]: 11768 : {RPCResult::Type::BOOL, "generated", "Coinbase or not"},
266 [ + - + - ]: 11768 : {RPCResult::Type::NUM, "height", "The height of the prevout"},
267 [ + - + - ]: 11768 : {RPCResult::Type::STR_AMOUNT, "value", "The value in " + CURRENCY_UNIT},
268 [ + - + - : 11768 : {RPCResult::Type::OBJ, "scriptPubKey", "", ScriptPubKeyDoc()},
+ - ]
269 : : }},
270 : : }},
271 : : }},
272 [ + - + - : 141216 : }},
+ - + - +
+ + + + +
+ + - - -
- - - -
- ]
273 : : },
274 : 5884 : RPCExamples{
275 [ + - + - : 11768 : HelpExampleCli("getrawtransaction", "\"mytxid\"")
+ - ]
276 [ + - + - : 23536 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 1")
+ - + - ]
277 [ + - + - : 23536 : + HelpExampleRpc("getrawtransaction", "\"mytxid\", 1")
+ - + - ]
278 [ + - + - : 23536 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 0 \"myblockhash\"")
+ - + - ]
279 [ + - + - : 23536 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 1 \"myblockhash\"")
+ - + - ]
280 [ + - + - : 23536 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 2 \"myblockhash\"")
+ - ]
281 [ + - ]: 5884 : },
282 : 5884 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
283 : : {
284 : 3492 : const NodeContext& node = EnsureAnyNodeContext(request.context);
285 : 3492 : ChainstateManager& chainman = EnsureChainman(node);
286 : :
287 [ + + ]: 3492 : auto txid{Txid::FromUint256(ParseHashV(request.params[0], "parameter 1"))};
288 : 3491 : const CBlockIndex* blockindex = nullptr;
289 : :
290 [ + + ]: 3491 : if (txid.ToUint256() == chainman.GetParams().GenesisBlock().hashMerkleRoot) {
291 : : // Special exception for the genesis block coinbase transaction
292 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "The genesis block coinbase is not considered an ordinary transaction and cannot be retrieved");
293 : : }
294 : :
295 : 3490 : int verbosity{ParseVerbosity(request.params[1], /*default_verbosity=*/0, /*allow_bool=*/true)};
296 : :
297 [ + + ]: 3478 : if (!request.params[2].isNull()) {
298 : 41 : LOCK(cs_main);
299 : :
300 [ + - + + ]: 41 : uint256 blockhash = ParseHashV(request.params[2], "parameter 3");
301 [ + - ]: 35 : blockindex = chainman.m_blockman.LookupBlockIndex(blockhash);
302 [ + + ]: 35 : if (!blockindex) {
303 [ + - + - ]: 4 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Block hash not found");
304 : : }
305 : 41 : }
306 : :
307 : 3470 : bool f_txindex_ready = false;
308 [ + + + + ]: 3470 : if (g_txindex && !blockindex) {
309 : 33 : f_txindex_ready = g_txindex->BlockUntilSyncedToCurrentChain();
310 : : }
311 : :
312 : 3470 : uint256 hash_block;
313 : 3470 : const CTransactionRef tx = GetTransaction(blockindex, node.mempool.get(), txid, chainman.m_blockman, hash_block);
314 [ + + ]: 3470 : if (!tx) {
315 [ + + ]: 8 : std::string errmsg;
316 [ + + ]: 8 : if (blockindex) {
317 [ + - + - ]: 4 : const bool block_has_data = WITH_LOCK(::cs_main, return blockindex->nStatus & BLOCK_HAVE_DATA);
318 [ - + ]: 2 : if (!block_has_data) {
319 [ # # # # ]: 0 : throw JSONRPCError(RPC_MISC_ERROR, "Block not available");
320 : : }
321 [ + - ]: 2 : errmsg = "No such transaction found in the provided block";
322 [ + - ]: 6 : } else if (!g_txindex) {
323 [ + - ]: 6 : errmsg = "No such mempool transaction. Use -txindex or provide a block hash to enable blockchain transaction queries";
324 [ # # ]: 0 : } else if (!f_txindex_ready) {
325 [ # # ]: 0 : errmsg = "No such mempool transaction. Blockchain transactions are still in the process of being indexed";
326 : : } else {
327 [ # # ]: 0 : errmsg = "No such mempool or blockchain transaction";
328 : : }
329 [ + - + - ]: 16 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, errmsg + ". Use gettransaction for wallet transactions.");
330 : 8 : }
331 : :
332 [ + + ]: 3462 : if (verbosity <= 0) {
333 [ + - + - ]: 90 : return EncodeHexTx(*tx);
334 : : }
335 : :
336 : 3417 : UniValue result(UniValue::VOBJ);
337 [ + + ]: 3417 : if (blockindex) {
338 [ + - ]: 30 : LOCK(cs_main);
339 [ + - + - : 60 : result.pushKV("in_active_chain", chainman.ActiveChain().Contains(blockindex));
+ - + - +
- ]
340 : 30 : }
341 : : // If request is verbosity >= 1 but no blockhash was given, then look up the blockindex
342 [ + - + + ]: 3417 : if (request.params[2].isNull()) {
343 [ + - ]: 3387 : LOCK(cs_main);
344 [ + - + - ]: 3387 : blockindex = chainman.m_blockman.LookupBlockIndex(hash_block); // May be nullptr for mempool transactions
345 : 3387 : }
346 [ + + ]: 3417 : if (verbosity == 1) {
347 [ + - + - ]: 3410 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate());
348 : 3410 : return result;
349 : : }
350 : :
351 : 7 : CBlockUndo blockUndo;
352 : 7 : CBlock block;
353 : :
354 [ + + + + : 12 : if (tx->IsCoinBase() || !blockindex || WITH_LOCK(::cs_main, return !(blockindex->nStatus & BLOCK_HAVE_MASK))) {
+ - + - +
- ]
355 [ + - + - ]: 2 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate());
356 : 2 : return result;
357 : : }
358 [ + - - + ]: 5 : if (!chainman.m_blockman.ReadBlockUndo(blockUndo, *blockindex)) {
359 [ # # # # ]: 0 : throw JSONRPCError(RPC_INTERNAL_ERROR, "Undo data expected but can't be read. This could be due to disk corruption or a conflict with a pruning event.");
360 : : }
361 [ + - - + ]: 5 : if (!chainman.m_blockman.ReadBlock(block, *blockindex)) {
362 [ # # # # ]: 0 : throw JSONRPCError(RPC_INTERNAL_ERROR, "Block data expected but can't be read. This could be due to disk corruption or a conflict with a pruning event.");
363 : : }
364 : :
365 : 5 : CTxUndo* undoTX {nullptr};
366 [ + - + - : 55 : auto it = std::find_if(block.vtx.begin(), block.vtx.end(), [tx](CTransactionRef t){ return *t == *tx; });
+ - + - +
- + - + -
+ - + - ]
367 [ + - ]: 5 : if (it != block.vtx.end()) {
368 : : // -1 as blockundo does not have coinbase tx
369 [ + - ]: 5 : undoTX = &blockUndo.vtxundo.at(it - block.vtx.begin() - 1);
370 : : }
371 [ + - + - ]: 5 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate(), undoTX, TxVerbosity::SHOW_DETAILS_AND_PREVOUT);
372 : 5 : return result;
373 : 6879 : },
374 [ + - + - : 76492 : };
+ - + - +
+ + + - -
- - ]
375 [ + - + - : 258896 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - -
- - - - -
- - - - -
- ]
376 : :
377 : 2855 : static RPCMethod createrawtransaction()
378 : : {
379 : 2855 : return RPCMethod{
380 : 2855 : "createrawtransaction",
381 [ + - ]: 5710 : "Create a transaction spending the given inputs and creating new outputs.\n"
382 : : "Outputs can be addresses or data.\n"
383 : : "Returns hex-encoded raw transaction.\n"
384 : : "Note that the transaction's inputs are not signed, and\n"
385 : : "it is not stored in the wallet or transmitted to the network.\n",
386 [ + - ]: 5710 : CreateTxDoc(),
387 [ + - ]: 5710 : RPCResult{
388 [ + - + - ]: 5710 : RPCResult::Type::STR_HEX, "transaction", "hex string of the transaction"
389 [ + - ]: 5710 : },
390 : 2855 : RPCExamples{
391 [ + - + - : 5710 : HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"address\\\":0.01}]\"")
+ - ]
392 [ + - + - : 11420 : + HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"data\\\":\\\"00010203\\\"}]\"")
+ - + - ]
393 [ + - + - : 11420 : + HelpExampleRpc("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\", \"[{\\\"address\\\":0.01}]\"")
+ - + - ]
394 [ + - + - : 11420 : + HelpExampleRpc("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\", \"[{\\\"data\\\":\\\"00010203\\\"}]\"")
+ - + - ]
395 [ + - ]: 2855 : },
396 : 2855 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
397 : : {
398 : 457 : std::optional<bool> rbf;
399 [ + + ]: 457 : if (!request.params[3].isNull()) {
400 : 12 : rbf = request.params[3].get_bool();
401 : : }
402 : 457 : CMutableTransaction rawTx = ConstructTransaction(request.params[0], request.params[1], request.params[2], rbf, self.Arg<uint32_t>("version"));
403 : :
404 [ + - + - : 1287 : return EncodeHexTx(CTransaction(rawTx));
+ - ]
405 : 429 : },
406 [ + - ]: 5710 : };
407 : : }
408 : :
409 : 6521 : static RPCMethod decoderawtransaction()
410 : : {
411 : 6521 : return RPCMethod{"decoderawtransaction",
412 [ + - ]: 13042 : "Return a JSON object representing the serialized, hex-encoded transaction.",
413 : : {
414 [ + - + - ]: 13042 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction hex string"},
415 [ + - + - : 19563 : {"iswitness", RPCArg::Type::BOOL, RPCArg::DefaultHint{"depends on heuristic tests"}, "Whether the transaction hex is a serialized witness transaction.\n"
+ - ]
416 : : "If iswitness is not present, heuristic tests will be used in decoding.\n"
417 : : "If true, only witness deserialization will be tried.\n"
418 : : "If false, only non-witness deserialization will be tried.\n"
419 : : "This boolean should reflect whether the transaction has inputs\n"
420 : : "(e.g. fully valid, or on-chain transactions), if known by the caller."
421 : : },
422 : : },
423 [ + - ]: 13042 : RPCResult{
424 [ + - + - ]: 13042 : RPCResult::Type::OBJ, "", "",
425 : 13042 : TxDoc(),
426 [ + - ]: 13042 : },
427 : 6521 : RPCExamples{
428 [ + - + - : 13042 : HelpExampleCli("decoderawtransaction", "\"hexstring\"")
+ - ]
429 [ + - + - : 26084 : + HelpExampleRpc("decoderawtransaction", "\"hexstring\"")
+ - + - ]
430 [ + - ]: 6521 : },
431 : 6521 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
432 : : {
433 : 4130 : CMutableTransaction mtx;
434 : :
435 [ + - + + : 4130 : bool try_witness = request.params[1].isNull() ? true : request.params[1].get_bool();
+ - + - ]
436 [ + - + + : 4130 : bool try_no_witness = request.params[1].isNull() ? true : !request.params[1].get_bool();
+ - + - ]
437 : :
438 [ + - + - : 4130 : if (!DecodeHexTx(mtx, request.params[0].get_str(), try_no_witness, try_witness)) {
+ - + + ]
439 [ + - + - ]: 14 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed");
440 : : }
441 : :
442 : 4123 : UniValue result(UniValue::VOBJ);
443 [ + - + - ]: 8246 : TxToUniv(CTransaction(std::move(mtx)), /*block_hash=*/uint256(), /*entry=*/result, /*include_hex=*/false);
444 : :
445 : 4123 : return result;
446 : 4123 : },
447 [ + - + - : 39126 : };
+ + - - ]
448 [ + - + - : 32605 : }
+ - + - -
- ]
449 : :
450 : 2420 : static RPCMethod decodescript()
451 : : {
452 : 2420 : return RPCMethod{
453 : 2420 : "decodescript",
454 [ + - ]: 4840 : "Decode a hex-encoded script.\n",
455 : : {
456 [ + - + - ]: 4840 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "the hex-encoded script"},
457 : : },
458 [ + - ]: 4840 : RPCResult{
459 [ + - + - ]: 4840 : RPCResult::Type::OBJ, "", "",
460 : : {
461 [ + - + - ]: 4840 : {RPCResult::Type::STR, "asm", "Disassembly of the script"},
462 [ + - + - ]: 4840 : {RPCResult::Type::STR, "desc", "Inferred descriptor for the script"},
463 [ + - + - : 4840 : {RPCResult::Type::STR, "type", "The output type (e.g. " + GetAllOutputTypes() + ")"},
+ - ]
464 [ + - + - ]: 4840 : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
465 [ + - ]: 4840 : {RPCResult::Type::STR, "p2sh", /*optional=*/true,
466 [ + - ]: 4840 : "address of P2SH script wrapping this redeem script (not returned for types that should not be wrapped)"},
467 [ + - ]: 4840 : {RPCResult::Type::OBJ, "segwit", /*optional=*/true,
468 [ + - ]: 4840 : "Result of a witness output script wrapping this redeem script (not returned for types that should not be wrapped)",
469 : : {
470 [ + - + - ]: 4840 : {RPCResult::Type::STR, "asm", "Disassembly of the output script"},
471 [ + - + - ]: 4840 : {RPCResult::Type::STR_HEX, "hex", "The raw output script bytes, hex-encoded"},
472 [ + - + - ]: 4840 : {RPCResult::Type::STR, "type", "The type of the output script (e.g. witness_v0_keyhash or witness_v0_scripthash)"},
473 [ + - + - ]: 4840 : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
474 [ + - + - ]: 4840 : {RPCResult::Type::STR, "desc", "Inferred descriptor for the script"},
475 [ + - + - ]: 4840 : {RPCResult::Type::STR, "p2sh-segwit", "address of the P2SH script wrapping this witness redeem script"},
476 : : }},
477 : : },
478 [ + - + - : 65340 : },
+ - + + +
+ - - -
- ]
479 : 2420 : RPCExamples{
480 [ + - + - : 4840 : HelpExampleCli("decodescript", "\"hexstring\"")
+ - ]
481 [ + - + - : 9680 : + HelpExampleRpc("decodescript", "\"hexstring\"")
+ - + - ]
482 [ + - ]: 2420 : },
483 : 2420 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
484 : : {
485 : 31 : UniValue r(UniValue::VOBJ);
486 : 31 : CScript script;
487 [ + - + - : 31 : if (request.params[0].get_str().size() > 0){
- + + - ]
488 [ + - + - ]: 31 : std::vector<unsigned char> scriptData(ParseHexV(request.params[0], "argument"));
489 : 31 : script = CScript(scriptData.begin(), scriptData.end());
490 : 31 : } else {
491 : : // Empty scripts are valid
492 : : }
493 [ + - ]: 31 : ScriptToUniv(script, /*out=*/r, /*include_hex=*/false, /*include_address=*/true);
494 : :
495 : 31 : std::vector<std::vector<unsigned char>> solutions_data;
496 [ + - ]: 31 : const TxoutType which_type{Solver(script, solutions_data)};
497 : :
498 : 62 : const bool can_wrap{[&] {
499 [ + + ]: 31 : switch (which_type) {
500 : : case TxoutType::MULTISIG:
501 : : case TxoutType::NONSTANDARD:
502 : : case TxoutType::PUBKEY:
503 : : case TxoutType::PUBKEYHASH:
504 : : case TxoutType::WITNESS_V0_KEYHASH:
505 : : case TxoutType::WITNESS_V0_SCRIPTHASH:
506 : : // Can be wrapped if the checks below pass
507 : : break;
508 : : case TxoutType::NULL_DATA:
509 : : case TxoutType::SCRIPTHASH:
510 : : case TxoutType::WITNESS_UNKNOWN:
511 : : case TxoutType::WITNESS_V1_TAPROOT:
512 : : case TxoutType::ANCHOR:
513 : : // Should not be wrapped
514 : : return false;
515 : : } // no default case, so the compiler can warn about missing cases
516 [ + + + - ]: 21 : if (!script.HasValidOps() || script.IsUnspendable()) {
517 : : return false;
518 : : }
519 [ + + + + ]: 130 : for (CScript::const_iterator it{script.begin()}; it != script.end();) {
520 : 95 : opcodetype op;
521 : 95 : CHECK_NONFATAL(script.GetOp(it, op));
522 [ + - + + : 96 : if (op == OP_CHECKSIGADD || IsOpSuccess(op)) {
+ + ]
523 : : return false;
524 : : }
525 : : }
526 : : return true;
527 [ + - ]: 31 : }()};
528 : :
529 [ + + ]: 31 : if (can_wrap) {
530 [ + - + - : 34 : r.pushKV("p2sh", EncodeDestination(ScriptHash(script)));
+ - + - +
- ]
531 : : // P2SH and witness programs cannot be wrapped in P2WSH, if this script
532 : : // is a witness program, don't return addresses for a segwit programs.
533 : 34 : const bool can_wrap_P2WSH{[&] {
534 [ + + - + ]: 17 : switch (which_type) {
535 : 4 : case TxoutType::MULTISIG:
536 : 4 : case TxoutType::PUBKEY:
537 : : // Uncompressed pubkeys cannot be used with segwit checksigs.
538 : : // If the script contains an uncompressed pubkey, skip encoding of a segwit program.
539 [ + + ]: 12 : for (const auto& solution : solutions_data) {
540 [ - + + + : 10 : if ((solution.size() != 1) && !CPubKey(solution).IsCompressed()) {
+ + ]
541 : : return false;
542 : : }
543 : : }
544 : : return true;
545 : : case TxoutType::NONSTANDARD:
546 : : case TxoutType::PUBKEYHASH:
547 : : // Can be P2WSH wrapped
548 : : return true;
549 : 3 : case TxoutType::NULL_DATA:
550 : 3 : case TxoutType::SCRIPTHASH:
551 : 3 : case TxoutType::WITNESS_UNKNOWN:
552 : 3 : case TxoutType::WITNESS_V0_KEYHASH:
553 : 3 : case TxoutType::WITNESS_V0_SCRIPTHASH:
554 : 3 : case TxoutType::WITNESS_V1_TAPROOT:
555 : 3 : case TxoutType::ANCHOR:
556 : : // Should not be wrapped
557 : 3 : return false;
558 : : } // no default case, so the compiler can warn about missing cases
559 [ # # ]: 0 : NONFATAL_UNREACHABLE();
560 [ + - ]: 17 : }()};
561 [ + + ]: 17 : if (can_wrap_P2WSH) {
562 : 12 : UniValue sr(UniValue::VOBJ);
563 : 12 : CScript segwitScr;
564 : 12 : FlatSigningProvider provider;
565 [ + + ]: 12 : if (which_type == TxoutType::PUBKEY) {
566 [ + - + - ]: 2 : segwitScr = GetScriptForDestination(WitnessV0KeyHash(Hash160(solutions_data[0])));
567 [ + + ]: 11 : } else if (which_type == TxoutType::PUBKEYHASH) {
568 [ - + + - ]: 2 : segwitScr = GetScriptForDestination(WitnessV0KeyHash(uint160{solutions_data[0]}));
569 : : } else {
570 : : // Scripts that are not fit for P2WPKH are encoded as P2WSH.
571 [ + - + - ]: 10 : provider.scripts[CScriptID(script)] = script;
572 [ + - + - ]: 20 : segwitScr = GetScriptForDestination(WitnessV0ScriptHash(script));
573 : : }
574 [ + - ]: 12 : ScriptToUniv(segwitScr, /*out=*/sr, /*include_hex=*/true, /*include_address=*/true, /*provider=*/&provider);
575 [ + - + - : 24 : sr.pushKV("p2sh-segwit", EncodeDestination(ScriptHash(segwitScr)));
+ - + - +
- ]
576 [ + - + - ]: 24 : r.pushKV("segwit", std::move(sr));
577 : 12 : }
578 : : }
579 : :
580 : 62 : return r;
581 : 31 : },
582 [ + - + - : 12100 : };
+ + - - ]
583 [ + - + - : 62920 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- ]
584 : :
585 : 2469 : static RPCMethod combinerawtransaction()
586 : : {
587 : 2469 : return RPCMethod{
588 : 2469 : "combinerawtransaction",
589 [ + - ]: 4938 : "Combine multiple partially signed transactions into one transaction.\n"
590 : : "The combined transaction may be another partially signed transaction or a \n"
591 : : "fully signed transaction.",
592 : : {
593 [ + - + - ]: 4938 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The hex strings of partially signed transactions",
594 : : {
595 [ + - + - ]: 4938 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "A hex-encoded raw transaction"},
596 : : },
597 : : },
598 : : },
599 [ + - ]: 4938 : RPCResult{
600 [ + - + - ]: 4938 : RPCResult::Type::STR, "", "The hex-encoded raw transaction with signature(s)"
601 [ + - ]: 4938 : },
602 : 2469 : RPCExamples{
603 [ + - + - : 4938 : HelpExampleCli("combinerawtransaction", R"('["myhex1", "myhex2", "myhex3"]')")
+ - ]
604 [ + - ]: 2469 : },
605 : 2469 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
606 : : {
607 : :
608 : 80 : UniValue txs = request.params[0].get_array();
609 [ - + + - ]: 80 : std::vector<CMutableTransaction> txVariants(txs.size());
610 : :
611 [ - + + + ]: 180 : for (unsigned int idx = 0; idx < txs.size(); idx++) {
612 [ + - + - : 120 : if (!DecodeHexTx(txVariants[idx], txs[idx].get_str())) {
+ - + + ]
613 [ + - + - ]: 40 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed for tx %d. Make sure the tx has at least one input.", idx));
614 : : }
615 : : }
616 : :
617 [ + + ]: 60 : if (txVariants.empty()) {
618 [ + - + - ]: 40 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "Missing transactions");
619 : : }
620 : :
621 : : // mergedTx will end up with all the signatures; it
622 : : // starts as a clone of the rawtx:
623 [ + - ]: 40 : CMutableTransaction mergedTx(txVariants[0]);
624 : :
625 : : // Fetch previous transactions (inputs):
626 [ + - + - ]: 40 : CCoinsViewCache view{&CoinsViewEmpty::Get()};
627 : 40 : {
628 [ + - ]: 40 : NodeContext& node = EnsureAnyNodeContext(request.context);
629 [ + - ]: 40 : const CTxMemPool& mempool = EnsureMemPool(node);
630 [ + - ]: 40 : ChainstateManager& chainman = EnsureChainman(node);
631 [ + - + - ]: 40 : LOCK2(cs_main, mempool.cs);
632 [ + - + - ]: 40 : CCoinsViewCache &viewChain = chainman.ActiveChainstate().CoinsTip();
633 [ + - ]: 40 : CCoinsViewMemPool viewMempool(&viewChain, mempool);
634 : 40 : view.SetBackend(viewMempool); // temporarily switch cache backend to db+mempool view
635 : :
636 [ + + ]: 80 : for (const CTxIn& txin : mergedTx.vin) {
637 [ + - ]: 40 : view.AccessCoin(txin.prevout); // Load entries from viewChain into view; can fail.
638 : : }
639 : :
640 [ + - ]: 40 : view.SetBackend(CoinsViewEmpty::Get()); // switch back to avoid locking mempool for too long
641 [ + - + - ]: 80 : }
642 : :
643 : : // Use CTransaction for the constant parts of the
644 : : // transaction to avoid rehashing.
645 [ + - ]: 40 : const CTransaction txConst(mergedTx);
646 : : // Sign what we can:
647 [ - + + + ]: 60 : for (unsigned int i = 0; i < mergedTx.vin.size(); i++) {
648 [ + - ]: 40 : CTxIn& txin = mergedTx.vin[i];
649 [ + - ]: 40 : const Coin& coin = view.AccessCoin(txin.prevout);
650 [ + + ]: 40 : if (coin.IsSpent()) {
651 [ + - + - ]: 40 : throw JSONRPCError(RPC_VERIFY_ERROR, "Input not found or already spent");
652 : : }
653 : 20 : SignatureData sigdata;
654 : :
655 : : // ... and merge in other signatures:
656 [ + + ]: 60 : for (const CMutableTransaction& txv : txVariants) {
657 [ - + + - ]: 40 : if (txv.vin.size() > i) {
658 [ + - + - ]: 40 : sigdata.MergeSignatureData(DataFromTransaction(txv, i, coin.out));
659 : : }
660 : : }
661 [ + - + - ]: 20 : ProduceSignature(DUMMY_SIGNING_PROVIDER, MutableTransactionSignatureCreator(mergedTx, i, coin.out.nValue, 1), coin.out.scriptPubKey, sigdata);
662 : :
663 [ + - ]: 20 : UpdateInput(txin, sigdata);
664 : 20 : }
665 : :
666 [ + - + - : 80 : return EncodeHexTx(CTransaction(mergedTx));
+ - ]
667 : 180 : },
668 [ + - + - : 19752 : };
+ - + + +
+ - - -
- ]
669 [ + - + - ]: 9876 : }
670 : :
671 : 2567 : static RPCMethod signrawtransactionwithkey()
672 : : {
673 : 2567 : return RPCMethod{
674 : 2567 : "signrawtransactionwithkey",
675 [ + - ]: 5134 : "Sign inputs for raw transaction (serialized, hex-encoded).\n"
676 : : "The second argument is an array of base58-encoded private\n"
677 : : "keys that will be the only keys used to sign the transaction.\n"
678 : : "The third optional argument (may be null) is an array of previous transaction outputs that\n"
679 : : "this transaction depends on but may not yet be in the block chain.\n",
680 : : {
681 [ + - + - ]: 5134 : {"hexstring", RPCArg::Type::STR, RPCArg::Optional::NO, "The transaction hex string"},
682 [ + - + - ]: 5134 : {"privkeys", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base58-encoded private keys for signing",
683 : : {
684 [ + - + - ]: 5134 : {"privatekey", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "private key in base58-encoding"},
685 : : },
686 : : },
687 [ + - + - ]: 5134 : {"prevtxs", RPCArg::Type::ARR, RPCArg::Optional::OMITTED, "The previous dependent transaction outputs",
688 : : {
689 [ + - + - ]: 5134 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
690 : : {
691 [ + - + - ]: 5134 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
692 [ + - + - ]: 5134 : {"vout", RPCArg::Type::NUM, RPCArg::Optional::NO, "The output number"},
693 [ + - + - ]: 5134 : {"scriptPubKey", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "output script"},
694 [ + - + - ]: 5134 : {"redeemScript", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "(required for P2SH) redeem script"},
695 [ + - + - ]: 5134 : {"witnessScript", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "(required for P2WSH or P2SH-P2WSH) witness script"},
696 [ + - + - ]: 5134 : {"amount", RPCArg::Type::AMOUNT, RPCArg::Optional::OMITTED, "(required for Segwit inputs) the amount spent"},
697 : : },
698 : : },
699 : : },
700 : : },
701 [ + - + - : 7701 : {"sighashtype", RPCArg::Type::STR, RPCArg::Default{"DEFAULT for Taproot, ALL otherwise"}, "The signature hash type. Must be one of:\n"
+ - ]
702 : : " \"DEFAULT\"\n"
703 : : " \"ALL\"\n"
704 : : " \"NONE\"\n"
705 : : " \"SINGLE\"\n"
706 : : " \"ALL|ANYONECANPAY\"\n"
707 : : " \"NONE|ANYONECANPAY\"\n"
708 : : " \"SINGLE|ANYONECANPAY\"\n"
709 : : },
710 : : },
711 [ + - ]: 5134 : RPCResult{
712 [ + - + - ]: 5134 : RPCResult::Type::OBJ, "", "",
713 : : {
714 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "hex", "The hex-encoded raw transaction with signature(s)"},
715 [ + - + - ]: 5134 : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
716 [ + - + - ]: 5134 : {RPCResult::Type::ARR, "errors", /*optional=*/true, "Script verification errors (if there are any)",
717 : : {
718 [ + - + - ]: 5134 : {RPCResult::Type::OBJ, "", "",
719 : : {
720 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "txid", "The hash of the referenced, previous transaction"},
721 [ + - + - ]: 5134 : {RPCResult::Type::NUM, "vout", "The index of the output to spent and used as input"},
722 [ + - + - ]: 5134 : {RPCResult::Type::ARR, "witness", "",
723 : : {
724 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "witness", ""},
725 : : }},
726 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "scriptSig", "The hex-encoded signature script"},
727 [ + - + - ]: 5134 : {RPCResult::Type::NUM, "sequence", "Script sequence number"},
728 [ + - + - ]: 5134 : {RPCResult::Type::STR, "error", "Verification or signing error related to the input"},
729 : : }},
730 : : }},
731 : : }
732 [ + - + - : 69309 : },
+ - + - +
- + + + +
+ + + + -
- - - - -
- - ]
733 : 2567 : RPCExamples{
734 [ + - + - : 5134 : HelpExampleCli("signrawtransactionwithkey", "\"myhex\" \"[\\\"key1\\\",\\\"key2\\\"]\"")
+ - ]
735 [ + - + - : 10268 : + HelpExampleRpc("signrawtransactionwithkey", "\"myhex\", \"[\\\"key1\\\",\\\"key2\\\"]\"")
+ - + - ]
736 [ + - ]: 2567 : },
737 : 2567 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
738 : : {
739 : 178 : CMutableTransaction mtx;
740 [ + - + - : 178 : if (!DecodeHexTx(mtx, request.params[0].get_str())) {
+ - + + ]
741 [ + - + - ]: 2 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed. Make sure the tx has at least one input.");
742 : : }
743 : :
744 : 177 : FlatSigningProvider keystore;
745 [ + - + - ]: 177 : const UniValue& keys = request.params[1].get_array();
746 [ - + + + ]: 1032 : for (unsigned int idx = 0; idx < keys.size(); ++idx) {
747 [ + - + - ]: 856 : UniValue k = keys[idx];
748 [ + - + - ]: 856 : CKey key = DecodeSecret(k.get_str());
749 [ + + ]: 856 : if (!key.IsValid()) {
750 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Invalid private key");
751 : : }
752 : :
753 [ + - ]: 855 : CPubKey pubkey = key.GetPubKey();
754 [ + - ]: 855 : CKeyID key_id = pubkey.GetID();
755 [ + - ]: 855 : keystore.pubkeys.emplace(key_id, pubkey);
756 [ + - ]: 855 : keystore.keys.emplace(key_id, key);
757 : 856 : }
758 : :
759 : : // Fetch previous transactions (inputs):
760 : 176 : std::map<COutPoint, Coin> coins;
761 [ + + ]: 356 : for (const CTxIn& txin : mtx.vin) {
762 [ + - ]: 180 : coins[txin.prevout]; // Create empty map entry keyed by prevout.
763 : : }
764 [ + - ]: 176 : NodeContext& node = EnsureAnyNodeContext(request.context);
765 [ + - ]: 176 : FindCoins(node, coins);
766 : :
767 : : // Parse the prevtxs array
768 [ + - + + ]: 176 : ParsePrevouts(request.params[2], &keystore, coins);
769 : :
770 : 96 : UniValue result(UniValue::VOBJ);
771 [ + - + + ]: 96 : SignTransaction(mtx, &keystore, coins, request.params[3], result);
772 : 95 : return result;
773 : 273 : },
774 [ + - + - : 56474 : };
+ - + - +
- + + + +
+ + + + -
- - - - -
- - ]
775 [ + - + - : 118082 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - -
- ]
776 : :
777 : 2815 : const RPCResult& DecodePSBTInputs()
778 : : {
779 : 2815 : static const RPCResult decodepsbt_inputs{
780 [ + - + - ]: 2378 : RPCResult::Type::ARR, "inputs", "",
781 : : {
782 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
783 : : {
784 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "non_witness_utxo", /*optional=*/true, "Decoded network transaction for non-witness UTXOs",
785 : 2378 : TxDoc({.elision_description="The layout is the same as the output of decoderawtransaction."})
786 : : },
787 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "witness_utxo", /*optional=*/true, "Transaction output for witness UTXOs",
788 : : {
789 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "amount", "The value in " + CURRENCY_UNIT},
790 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "scriptPubKey", "",
791 : : {
792 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the output script"},
793 [ + - + - ]: 2378 : {RPCResult::Type::STR, "desc", "Inferred descriptor for the output"},
794 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw output script bytes, hex-encoded"},
795 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
796 [ + - + - ]: 2378 : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
797 : : }},
798 : : }},
799 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "partial_signatures", /*optional=*/true, "",
800 : : {
801 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The public key and signature that corresponds to it."},
802 : : }},
803 [ + - + - ]: 2378 : {RPCResult::Type::STR, "sighash", /*optional=*/true, "The sighash type to be used"},
804 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "redeem_script", /*optional=*/true, "",
805 : : {
806 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the redeem script"},
807 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw redeem script bytes, hex-encoded"},
808 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
809 : : }},
810 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "witness_script", /*optional=*/true, "",
811 : : {
812 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the witness script"},
813 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw witness script bytes, hex-encoded"},
814 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
815 : : }},
816 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "bip32_derivs", /*optional=*/true, "",
817 : : {
818 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
819 : : {
820 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The public key with the derivation path as the value."},
821 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
822 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
823 : : }},
824 : : }},
825 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "final_scriptSig", /*optional=*/true, "",
826 : : {
827 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the final signature script"},
828 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw final signature script bytes, hex-encoded"},
829 : : }},
830 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "final_scriptwitness", /*optional=*/true, "",
831 : : {
832 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "", "hex-encoded witness data (if any)"},
833 : : }},
834 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "ripemd160_preimages", /*optional=*/ true, "",
835 : : {
836 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
837 : : }},
838 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "sha256_preimages", /*optional=*/ true, "",
839 : : {
840 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
841 : : }},
842 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "hash160_preimages", /*optional=*/ true, "",
843 : : {
844 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
845 : : }},
846 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "hash256_preimages", /*optional=*/ true, "",
847 : : {
848 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
849 : : }},
850 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_key_path_sig", /*optional=*/ true, "hex-encoded signature for the Taproot key path spend"},
851 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_script_path_sigs", /*optional=*/ true, "",
852 : : {
853 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "signature", /*optional=*/ true, "The signature for the pubkey and leaf hash combination",
854 : : {
855 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The x-only pubkey for this signature"},
856 [ + - + - ]: 2378 : {RPCResult::Type::STR, "leaf_hash", "The leaf hash for this signature"},
857 [ + - + - ]: 2378 : {RPCResult::Type::STR, "sig", "The signature itself"},
858 : : }},
859 : : }},
860 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_scripts", /*optional=*/ true, "",
861 : : {
862 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
863 : : {
864 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "script", "A leaf script"},
865 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "leaf_ver", "The version number for the leaf script"},
866 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "control_blocks", "The control blocks for this script",
867 : : {
868 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "control_block", "A hex-encoded control block for this script"},
869 : : }},
870 : : }},
871 : : }},
872 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_bip32_derivs", /*optional=*/ true, "",
873 : : {
874 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
875 : : {
876 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The x-only public key this path corresponds to"},
877 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
878 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
879 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "leaf_hashes", "The hashes of the leaves this pubkey appears in",
880 : : {
881 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hash", "The hash of a leaf this pubkey appears in"},
882 : : }},
883 : : }},
884 : : }},
885 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_internal_key", /*optional=*/ true, "The hex-encoded Taproot x-only internal key"},
886 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_merkle_root", /*optional=*/ true, "The hex-encoded Taproot merkle root"},
887 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_participant_pubkeys", /*optional=*/true, "",
888 : : {
889 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
890 : : {
891 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which the participants create."},
892 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "participant_pubkeys", "",
893 : : {
894 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "pubkey", "The compressed public keys that are aggregated for aggregate_pubkey."},
895 : : }},
896 : : }},
897 : : }},
898 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_pubnonces", /*optional=*/true, "",
899 : : {
900 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
901 : : {
902 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "participant_pubkey", "The compressed public key of the participant that created this pubnonce."},
903 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which this pubnonce is for."},
904 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "leaf_hash", /*optional=*/true, "The hash of the leaf script that contains the aggregate pubkey being signed for. Omitted when signing for the internal key."},
905 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "pubnonce", "The public nonce itself."},
906 : : }},
907 : : }},
908 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_partial_sigs", /*optional=*/true, "",
909 : : {
910 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
911 : : {
912 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "participant_pubkey", "The compressed public key of the participant that created this partial signature."},
913 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which this partial signature is for."},
914 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "leaf_hash", /*optional=*/true, "The hash of the leaf script that contains the aggregate pubkey being signed for. Omitted when signing for the internal key."},
915 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "partial_sig", "The partial signature itself."},
916 : : }},
917 : : }},
918 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "unknown", /*optional=*/ true, "The unknown input fields",
919 : : {
920 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
921 : : }},
922 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "proprietary", /*optional=*/true, "The input proprietary map",
923 : : {
924 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
925 : : {
926 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
927 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
928 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
929 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
930 : : }},
931 : : }},
932 : : }},
933 : : }
934 [ + + + - : 245371 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - -
- ]
935 : 2815 : return decodepsbt_inputs;
936 [ + - + - : 202130 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - -
- ]
937 : :
938 : 2815 : const RPCResult& DecodePSBTOutputs()
939 : : {
940 : 2815 : static const RPCResult decodepsbt_outputs{
941 [ + - + - ]: 2378 : RPCResult::Type::ARR, "outputs", "",
942 : : {
943 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
944 : : {
945 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "redeem_script", /*optional=*/true, "",
946 : : {
947 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the redeem script"},
948 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw redeem script bytes, hex-encoded"},
949 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
950 : : }},
951 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "witness_script", /*optional=*/true, "",
952 : : {
953 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the witness script"},
954 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw witness script bytes, hex-encoded"},
955 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
956 : : }},
957 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "bip32_derivs", /*optional=*/true, "",
958 : : {
959 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
960 : : {
961 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The public key this path corresponds to"},
962 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
963 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
964 : : }},
965 : : }},
966 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_internal_key", /*optional=*/ true, "The hex-encoded Taproot x-only internal key"},
967 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_tree", /*optional=*/ true, "The tuples that make up the Taproot tree, in depth first search order",
968 : : {
969 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "tuple", /*optional=*/ true, "A single leaf script in the taproot tree",
970 : : {
971 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "depth", "The depth of this element in the tree"},
972 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "leaf_ver", "The version of this leaf"},
973 [ + - + - ]: 2378 : {RPCResult::Type::STR, "script", "The hex-encoded script itself"},
974 : : }},
975 : : }},
976 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_bip32_derivs", /*optional=*/ true, "",
977 : : {
978 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
979 : : {
980 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The x-only public key this path corresponds to"},
981 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
982 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
983 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "leaf_hashes", "The hashes of the leaves this pubkey appears in",
984 : : {
985 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hash", "The hash of a leaf this pubkey appears in"},
986 : : }},
987 : : }},
988 : : }},
989 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_participant_pubkeys", /*optional=*/true, "",
990 : : {
991 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
992 : : {
993 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which the participants create."},
994 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "participant_pubkeys", "",
995 : : {
996 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "pubkey", "The compressed public keys that are aggregated for aggregate_pubkey."},
997 : : }},
998 : : }},
999 : : }},
1000 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "unknown", /*optional=*/true, "The unknown output fields",
1001 : : {
1002 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
1003 : : }},
1004 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "proprietary", /*optional=*/true, "The output proprietary map",
1005 : : {
1006 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
1007 : : {
1008 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
1009 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
1010 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
1011 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
1012 : : }},
1013 : : }},
1014 : : }},
1015 : : }
1016 [ + + + - : 119337 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - ]
1017 : 2815 : return decodepsbt_outputs;
1018 [ + - + - : 95120 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- - - - -
- - - - -
- - - - -
- - ]
1019 : :
1020 : 2815 : static RPCMethod decodepsbt()
1021 : : {
1022 : 2815 : return RPCMethod{
1023 : 2815 : "decodepsbt",
1024 [ + - ]: 5630 : "Return a JSON object representing the serialized, base64-encoded partially signed Bitcoin transaction.",
1025 : : {
1026 [ + - + - ]: 5630 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "The PSBT base64 string"},
1027 : : },
1028 [ + - ]: 5630 : RPCResult{
1029 [ + - + - ]: 5630 : RPCResult::Type::OBJ, "", "",
1030 : : {
1031 [ + - + - ]: 5630 : {RPCResult::Type::OBJ, "tx", "The decoded network-serialized unsigned transaction.",
1032 : 5630 : TxDoc({.elision_description="The layout is the same as the output of decoderawtransaction."})
1033 : : },
1034 [ + - + - ]: 5630 : {RPCResult::Type::ARR, "global_xpubs", "",
1035 : : {
1036 [ + - + - ]: 5630 : {RPCResult::Type::OBJ, "", "",
1037 : : {
1038 [ + - + - ]: 5630 : {RPCResult::Type::STR, "xpub", "The extended public key this path corresponds to"},
1039 [ + - + - ]: 5630 : {RPCResult::Type::STR_HEX, "master_fingerprint", "The fingerprint of the master key"},
1040 [ + - + - ]: 5630 : {RPCResult::Type::STR, "path", "The path"},
1041 : : }},
1042 : : }},
1043 [ + - + - ]: 5630 : {RPCResult::Type::NUM, "psbt_version", "The PSBT version number. Not to be confused with the unsigned transaction version"},
1044 [ + - + - ]: 5630 : {RPCResult::Type::ARR, "proprietary", "The global proprietary map",
1045 : : {
1046 [ + - + - ]: 5630 : {RPCResult::Type::OBJ, "", "",
1047 : : {
1048 [ + - + - ]: 5630 : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
1049 [ + - + - ]: 5630 : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
1050 [ + - + - ]: 5630 : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
1051 [ + - + - ]: 5630 : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
1052 : : }},
1053 : : }},
1054 [ + - + - ]: 5630 : {RPCResult::Type::OBJ_DYN, "unknown", "The unknown global fields",
1055 : : {
1056 [ + - + - ]: 5630 : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
1057 : : }},
1058 : : DecodePSBTInputs(),
1059 : : DecodePSBTOutputs(),
1060 [ + - + - ]: 5630 : {RPCResult::Type::STR_AMOUNT, "fee", /*optional=*/true, "The transaction fee paid if all UTXOs slots in the PSBT have been filled."},
1061 : : }
1062 [ + - + - : 112600 : },
+ - + - +
- + - + -
+ + + + +
+ + + + +
+ + - - -
- - - - -
- - - - ]
1063 : 2815 : RPCExamples{
1064 [ + - + - : 5630 : HelpExampleCli("decodepsbt", "\"psbt\"")
+ - ]
1065 [ + - ]: 2815 : },
1066 : 2815 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1067 : : {
1068 : : // Unserialize the transactions
1069 : 426 : PartiallySignedTransaction psbtx;
1070 [ + - ]: 426 : std::string error;
1071 [ + - + - : 426 : if (!DecodeBase64PSBT(psbtx, request.params[0].get_str(), error)) {
+ - + + ]
1072 [ + - + - ]: 124 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1073 : : }
1074 : :
1075 : 364 : UniValue result(UniValue::VOBJ);
1076 : :
1077 : : // Add the decoded tx
1078 : 364 : UniValue tx_univ(UniValue::VOBJ);
1079 [ + - + - ]: 728 : TxToUniv(CTransaction(*psbtx.tx), /*block_hash=*/uint256(), /*entry=*/tx_univ, /*include_hex=*/false);
1080 [ + - + - ]: 728 : result.pushKV("tx", std::move(tx_univ));
1081 : :
1082 : : // Add the global xpubs
1083 : 364 : UniValue global_xpubs(UniValue::VARR);
1084 [ + - + + ]: 367 : for (std::pair<KeyOriginInfo, std::set<CExtPubKey>> xpub_pair : psbtx.m_xpubs) {
1085 [ + + ]: 6 : for (auto& xpub : xpub_pair.second) {
1086 : 3 : std::vector<unsigned char> ser_xpub;
1087 [ + - ]: 3 : ser_xpub.assign(BIP32_EXTKEY_WITH_VERSION_SIZE, 0);
1088 [ + - ]: 3 : xpub.EncodeWithVersion(ser_xpub.data());
1089 : :
1090 : 3 : UniValue keypath(UniValue::VOBJ);
1091 [ - + + - : 6 : keypath.pushKV("xpub", EncodeBase58Check(ser_xpub));
+ - + - +
- ]
1092 [ + - + - : 6 : keypath.pushKV("master_fingerprint", HexStr(std::span<unsigned char>(xpub_pair.first.fingerprint, xpub_pair.first.fingerprint + 4)));
+ - + - ]
1093 [ + - + - : 6 : keypath.pushKV("path", WriteHDKeypath(xpub_pair.first.path));
+ - + - ]
1094 [ + - ]: 3 : global_xpubs.push_back(std::move(keypath));
1095 : 3 : }
1096 : 3 : }
1097 [ + - + - ]: 728 : result.pushKV("global_xpubs", std::move(global_xpubs));
1098 : :
1099 : : // PSBT version
1100 [ + - + - : 728 : result.pushKV("psbt_version", psbtx.GetVersion());
+ - + - ]
1101 : :
1102 : : // Proprietary
1103 : 364 : UniValue proprietary(UniValue::VARR);
1104 [ + + ]: 366 : for (const auto& entry : psbtx.m_proprietary) {
1105 : 2 : UniValue this_prop(UniValue::VOBJ);
1106 [ - + + - : 4 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - +
- ]
1107 [ + - + - : 4 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1108 [ - + + - : 4 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - +
- ]
1109 [ - + + - : 4 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - +
- ]
1110 [ + - ]: 2 : proprietary.push_back(std::move(this_prop));
1111 : 2 : }
1112 [ + - + - ]: 728 : result.pushKV("proprietary", std::move(proprietary));
1113 : :
1114 : : // Unknown data
1115 : 364 : UniValue unknowns(UniValue::VOBJ);
1116 [ - - - + ]: 364 : for (auto entry : psbtx.unknown) {
1117 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # #
# ]
1118 : 0 : }
1119 [ + - + - ]: 728 : result.pushKV("unknown", std::move(unknowns));
1120 : :
1121 : : // inputs
1122 : 364 : CAmount total_in = 0;
1123 : 364 : bool have_all_utxos = true;
1124 : 364 : UniValue inputs(UniValue::VARR);
1125 [ - + + + ]: 797 : for (unsigned int i = 0; i < psbtx.inputs.size(); ++i) {
1126 : 433 : const PSBTInput& input = psbtx.inputs[i];
1127 : 433 : UniValue in(UniValue::VOBJ);
1128 : : // UTXOs
1129 : 433 : bool have_a_utxo = false;
1130 : 433 : CTxOut txout;
1131 [ + + ]: 433 : if (!input.witness_utxo.IsNull()) {
1132 : 371 : txout = input.witness_utxo;
1133 : :
1134 : 371 : UniValue o(UniValue::VOBJ);
1135 [ + - ]: 371 : ScriptToUniv(txout.scriptPubKey, /*out=*/o, /*include_hex=*/true, /*include_address=*/true);
1136 : :
1137 : 371 : UniValue out(UniValue::VOBJ);
1138 [ + - + - : 742 : out.pushKV("amount", ValueFromAmount(txout.nValue));
+ - ]
1139 [ + - + - ]: 742 : out.pushKV("scriptPubKey", std::move(o));
1140 : :
1141 [ + - + - ]: 742 : in.pushKV("witness_utxo", std::move(out));
1142 : :
1143 : 371 : have_a_utxo = true;
1144 : 371 : }
1145 [ + + ]: 433 : if (input.non_witness_utxo) {
1146 : 147 : txout = input.non_witness_utxo->vout[psbtx.tx->vin[i].prevout.n];
1147 : :
1148 : 147 : UniValue non_wit(UniValue::VOBJ);
1149 [ + - ]: 147 : TxToUniv(*input.non_witness_utxo, /*block_hash=*/uint256(), /*entry=*/non_wit, /*include_hex=*/false);
1150 [ + - + - ]: 294 : in.pushKV("non_witness_utxo", std::move(non_wit));
1151 : :
1152 : 147 : have_a_utxo = true;
1153 : 0 : }
1154 [ + + ]: 433 : if (have_a_utxo) {
1155 [ + - - + ]: 410 : if (MoneyRange(txout.nValue) && MoneyRange(total_in + txout.nValue)) {
1156 : : total_in += txout.nValue;
1157 : : } else {
1158 : : // Hack to just not show fee later
1159 : : have_all_utxos = false;
1160 : : }
1161 : : } else {
1162 : : have_all_utxos = false;
1163 : : }
1164 : :
1165 : : // Partial sigs
1166 [ + + ]: 433 : if (!input.partial_sigs.empty()) {
1167 : 38 : UniValue partial_sigs(UniValue::VOBJ);
1168 [ + + ]: 93 : for (const auto& sig : input.partial_sigs) {
1169 [ - + + - : 110 : partial_sigs.pushKV(HexStr(sig.second.first), HexStr(sig.second.second));
+ - + - +
- ]
1170 : : }
1171 [ + - + - ]: 76 : in.pushKV("partial_signatures", std::move(partial_sigs));
1172 : 38 : }
1173 : :
1174 : : // Sighash
1175 [ + + ]: 433 : if (input.sighash_type != std::nullopt) {
1176 [ + - + - : 14 : in.pushKV("sighash", SighashToStr((unsigned char)*input.sighash_type));
+ - + - ]
1177 : : }
1178 : :
1179 : : // Redeem script and witness script
1180 [ - + + + ]: 433 : if (!input.redeem_script.empty()) {
1181 : 19 : UniValue r(UniValue::VOBJ);
1182 [ + - ]: 19 : ScriptToUniv(input.redeem_script, /*out=*/r);
1183 [ + - + - ]: 38 : in.pushKV("redeem_script", std::move(r));
1184 : 19 : }
1185 [ + + + + ]: 460 : if (!input.witness_script.empty()) {
1186 : 27 : UniValue r(UniValue::VOBJ);
1187 [ + - ]: 27 : ScriptToUniv(input.witness_script, /*out=*/r);
1188 [ + - + - ]: 54 : in.pushKV("witness_script", std::move(r));
1189 : 27 : }
1190 : :
1191 : : // keypaths
1192 [ + + ]: 433 : if (!input.hd_keypaths.empty()) {
1193 : 103 : UniValue keypaths(UniValue::VARR);
1194 [ + - + + ]: 247 : for (auto entry : input.hd_keypaths) {
1195 : 144 : UniValue keypath(UniValue::VOBJ);
1196 [ + - + - : 288 : keypath.pushKV("pubkey", HexStr(entry.first));
+ - + - ]
1197 : :
1198 [ + - + - : 288 : keypath.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(entry.second.fingerprint)));
+ - + - ]
1199 [ + - + - : 288 : keypath.pushKV("path", WriteHDKeypath(entry.second.path));
+ - + - ]
1200 [ + - ]: 144 : keypaths.push_back(std::move(keypath));
1201 : 144 : }
1202 [ + - + - ]: 206 : in.pushKV("bip32_derivs", std::move(keypaths));
1203 : 103 : }
1204 : :
1205 : : // Final scriptSig and scriptwitness
1206 [ + + + + ]: 446 : if (!input.final_script_sig.empty()) {
1207 : 17 : UniValue scriptsig(UniValue::VOBJ);
1208 [ + - + - : 34 : scriptsig.pushKV("asm", ScriptToAsmStr(input.final_script_sig, true));
+ - + - ]
1209 [ + + + - : 51 : scriptsig.pushKV("hex", HexStr(input.final_script_sig));
+ - + - +
- ]
1210 [ + - + - ]: 34 : in.pushKV("final_scriptSig", std::move(scriptsig));
1211 : 17 : }
1212 [ + + ]: 433 : if (!input.final_script_witness.IsNull()) {
1213 : 32 : UniValue txinwitness(UniValue::VARR);
1214 [ + + ]: 99 : for (const auto& item : input.final_script_witness.stack) {
1215 [ - + + - : 67 : txinwitness.push_back(HexStr(item));
+ - + - ]
1216 : : }
1217 [ + - + - ]: 64 : in.pushKV("final_scriptwitness", std::move(txinwitness));
1218 : 32 : }
1219 : :
1220 : : // Ripemd160 hash preimages
1221 [ + + ]: 433 : if (!input.ripemd160_preimages.empty()) {
1222 : 2 : UniValue ripemd160_preimages(UniValue::VOBJ);
1223 [ - + + + ]: 5 : for (const auto& [hash, preimage] : input.ripemd160_preimages) {
1224 [ - + + - : 6 : ripemd160_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1225 : : }
1226 [ + - + - ]: 4 : in.pushKV("ripemd160_preimages", std::move(ripemd160_preimages));
1227 : 2 : }
1228 : :
1229 : : // Sha256 hash preimages
1230 [ + + ]: 433 : if (!input.sha256_preimages.empty()) {
1231 : 3 : UniValue sha256_preimages(UniValue::VOBJ);
1232 [ - + + + ]: 7 : for (const auto& [hash, preimage] : input.sha256_preimages) {
1233 [ - + + - : 8 : sha256_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1234 : : }
1235 [ + - + - ]: 6 : in.pushKV("sha256_preimages", std::move(sha256_preimages));
1236 : 3 : }
1237 : :
1238 : : // Hash160 hash preimages
1239 [ + + ]: 433 : if (!input.hash160_preimages.empty()) {
1240 : 2 : UniValue hash160_preimages(UniValue::VOBJ);
1241 [ - + + + ]: 5 : for (const auto& [hash, preimage] : input.hash160_preimages) {
1242 [ - + + - : 6 : hash160_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1243 : : }
1244 [ + - + - ]: 4 : in.pushKV("hash160_preimages", std::move(hash160_preimages));
1245 : 2 : }
1246 : :
1247 : : // Hash256 hash preimages
1248 [ + + ]: 433 : if (!input.hash256_preimages.empty()) {
1249 : 2 : UniValue hash256_preimages(UniValue::VOBJ);
1250 [ - + + + ]: 5 : for (const auto& [hash, preimage] : input.hash256_preimages) {
1251 [ - + + - : 6 : hash256_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1252 : : }
1253 [ + - + - ]: 4 : in.pushKV("hash256_preimages", std::move(hash256_preimages));
1254 : 2 : }
1255 : :
1256 : : // Taproot key path signature
1257 [ + + ]: 433 : if (!input.m_tap_key_sig.empty()) {
1258 [ - + + - : 152 : in.pushKV("taproot_key_path_sig", HexStr(input.m_tap_key_sig));
+ - + - +
- ]
1259 : : }
1260 : :
1261 : : // Taproot script path signatures
1262 [ + + ]: 433 : if (!input.m_tap_script_sigs.empty()) {
1263 : 113 : UniValue script_sigs(UniValue::VARR);
1264 [ + + ]: 280 : for (const auto& [pubkey_leaf, sig] : input.m_tap_script_sigs) {
1265 : 167 : const auto& [xonly, leaf_hash] = pubkey_leaf;
1266 : 167 : UniValue sigobj(UniValue::VOBJ);
1267 [ + - + - : 334 : sigobj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1268 [ + - + - : 334 : sigobj.pushKV("leaf_hash", HexStr(leaf_hash));
+ - + - ]
1269 [ - + + - : 334 : sigobj.pushKV("sig", HexStr(sig));
+ - + - +
- ]
1270 [ + - ]: 167 : script_sigs.push_back(std::move(sigobj));
1271 : 167 : }
1272 [ + - + - ]: 226 : in.pushKV("taproot_script_path_sigs", std::move(script_sigs));
1273 : 113 : }
1274 : :
1275 : : // Taproot leaf scripts
1276 [ + + ]: 433 : if (!input.m_tap_scripts.empty()) {
1277 : 178 : UniValue tap_scripts(UniValue::VARR);
1278 [ + + ]: 444 : for (const auto& [leaf, control_blocks] : input.m_tap_scripts) {
1279 : 266 : const auto& [script, leaf_ver] = leaf;
1280 : 266 : UniValue script_info(UniValue::VOBJ);
1281 [ - + + - : 532 : script_info.pushKV("script", HexStr(script));
+ - + - +
- ]
1282 [ + - + - : 532 : script_info.pushKV("leaf_ver", leaf_ver);
+ - ]
1283 : 266 : UniValue control_blocks_univ(UniValue::VARR);
1284 [ + + ]: 598 : for (const auto& control_block : control_blocks) {
1285 [ - + + - : 332 : control_blocks_univ.push_back(HexStr(control_block));
+ - + - ]
1286 : : }
1287 [ + - + - ]: 532 : script_info.pushKV("control_blocks", std::move(control_blocks_univ));
1288 [ + - ]: 266 : tap_scripts.push_back(std::move(script_info));
1289 : 266 : }
1290 [ + - + - ]: 356 : in.pushKV("taproot_scripts", std::move(tap_scripts));
1291 : 178 : }
1292 : :
1293 : : // Taproot bip32 keypaths
1294 [ + + ]: 433 : if (!input.m_tap_bip32_paths.empty()) {
1295 : 244 : UniValue keypaths(UniValue::VARR);
1296 [ + + ]: 1069 : for (const auto& [xonly, leaf_origin] : input.m_tap_bip32_paths) {
1297 : 825 : const auto& [leaf_hashes, origin] = leaf_origin;
1298 : 825 : UniValue path_obj(UniValue::VOBJ);
1299 [ + - + - : 1650 : path_obj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1300 [ + - + - : 1650 : path_obj.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(origin.fingerprint)));
+ - + - ]
1301 [ + - + - : 1650 : path_obj.pushKV("path", WriteHDKeypath(origin.path));
+ - + - ]
1302 : 825 : UniValue leaf_hashes_arr(UniValue::VARR);
1303 [ + + ]: 1365 : for (const auto& leaf_hash : leaf_hashes) {
1304 [ + - + - : 540 : leaf_hashes_arr.push_back(HexStr(leaf_hash));
+ - ]
1305 : : }
1306 [ + - + - ]: 1650 : path_obj.pushKV("leaf_hashes", std::move(leaf_hashes_arr));
1307 [ + - ]: 825 : keypaths.push_back(std::move(path_obj));
1308 : 825 : }
1309 [ + - + - ]: 488 : in.pushKV("taproot_bip32_derivs", std::move(keypaths));
1310 : 244 : }
1311 : :
1312 : : // Taproot internal key
1313 [ + + ]: 866 : if (!input.m_tap_internal_key.IsNull()) {
1314 [ + - + - : 434 : in.pushKV("taproot_internal_key", HexStr(input.m_tap_internal_key));
+ - + - ]
1315 : : }
1316 : :
1317 : : // Write taproot merkle root
1318 [ + + ]: 866 : if (!input.m_tap_merkle_root.IsNull()) {
1319 [ + - + - : 356 : in.pushKV("taproot_merkle_root", HexStr(input.m_tap_merkle_root));
+ - + - ]
1320 : : }
1321 : :
1322 : : // Write MuSig2 fields
1323 [ + + ]: 433 : if (!input.m_musig2_participants.empty()) {
1324 : 77 : UniValue musig_pubkeys(UniValue::VARR);
1325 [ + + ]: 175 : for (const auto& [agg, parts] : input.m_musig2_participants) {
1326 : 98 : UniValue musig_part(UniValue::VOBJ);
1327 [ + - + - : 196 : musig_part.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1328 : 98 : UniValue part_pubkeys(UniValue::VARR);
1329 [ + + ]: 369 : for (const auto& pub : parts) {
1330 [ + - + - : 271 : part_pubkeys.push_back(HexStr(pub));
+ - ]
1331 : : }
1332 [ + - + - : 196 : musig_part.pushKV("participant_pubkeys", part_pubkeys);
+ - ]
1333 [ + - + - ]: 98 : musig_pubkeys.push_back(musig_part);
1334 : 98 : }
1335 [ + - + - : 154 : in.pushKV("musig2_participant_pubkeys", musig_pubkeys);
+ - ]
1336 : 77 : }
1337 [ + + ]: 433 : if (!input.m_musig2_pubnonces.empty()) {
1338 : 53 : UniValue musig_pubnonces(UniValue::VARR);
1339 [ + + ]: 120 : for (const auto& [agg_lh, part_pubnonce] : input.m_musig2_pubnonces) {
1340 : 67 : const auto& [agg, lh] = agg_lh;
1341 [ + + ]: 245 : for (const auto& [part, pubnonce] : part_pubnonce) {
1342 : 178 : UniValue info(UniValue::VOBJ);
1343 [ + - + - : 356 : info.pushKV("participant_pubkey", HexStr(part));
+ - + - ]
1344 [ + - + - : 356 : info.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1345 [ + + + - : 443 : if (!lh.IsNull()) info.pushKV("leaf_hash", HexStr(lh));
+ - + - +
- ]
1346 [ - + + - : 356 : info.pushKV("pubnonce", HexStr(pubnonce));
+ - + - +
- ]
1347 [ + - + - ]: 178 : musig_pubnonces.push_back(info);
1348 : 178 : }
1349 : : }
1350 [ + - + - : 106 : in.pushKV("musig2_pubnonces", musig_pubnonces);
+ - ]
1351 : 53 : }
1352 [ + + ]: 433 : if (!input.m_musig2_partial_sigs.empty()) {
1353 : 26 : UniValue musig_partial_sigs(UniValue::VARR);
1354 [ + + ]: 57 : for (const auto& [agg_lh, part_psig] : input.m_musig2_partial_sigs) {
1355 : 31 : const auto& [agg, lh] = agg_lh;
1356 [ + + ]: 115 : for (const auto& [part, psig] : part_psig) {
1357 : 84 : UniValue info(UniValue::VOBJ);
1358 [ + - + - : 168 : info.pushKV("participant_pubkey", HexStr(part));
+ - + - ]
1359 [ + - + - : 168 : info.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1360 [ + + + - : 211 : if (!lh.IsNull()) info.pushKV("leaf_hash", HexStr(lh));
+ - + - +
- ]
1361 [ + - + - : 168 : info.pushKV("partial_sig", HexStr(psig));
+ - + - ]
1362 [ + - + - ]: 84 : musig_partial_sigs.push_back(info);
1363 : 84 : }
1364 : : }
1365 [ + - + - : 52 : in.pushKV("musig2_partial_sigs", musig_partial_sigs);
+ - ]
1366 : 26 : }
1367 : :
1368 : : // Proprietary
1369 [ + + ]: 433 : if (!input.m_proprietary.empty()) {
1370 : 1 : UniValue proprietary(UniValue::VARR);
1371 [ + + ]: 2 : for (const auto& entry : input.m_proprietary) {
1372 : 1 : UniValue this_prop(UniValue::VOBJ);
1373 [ - + + - : 2 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - +
- ]
1374 [ + - + - : 2 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1375 [ - + + - : 2 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - +
- ]
1376 [ - + + - : 2 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - +
- ]
1377 [ + - ]: 1 : proprietary.push_back(std::move(this_prop));
1378 : 1 : }
1379 [ + - + - ]: 2 : in.pushKV("proprietary", std::move(proprietary));
1380 : 1 : }
1381 : :
1382 : : // Unknown data
1383 [ - + ]: 433 : if (input.unknown.size() > 0) {
1384 : 0 : UniValue unknowns(UniValue::VOBJ);
1385 [ # # # # ]: 0 : for (auto entry : input.unknown) {
1386 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # #
# ]
1387 : 0 : }
1388 [ # # # # ]: 0 : in.pushKV("unknown", std::move(unknowns));
1389 : 0 : }
1390 : :
1391 [ + - ]: 433 : inputs.push_back(std::move(in));
1392 : 433 : }
1393 [ + - + - ]: 728 : result.pushKV("inputs", std::move(inputs));
1394 : :
1395 : : // outputs
1396 : 364 : CAmount output_value = 0;
1397 : 364 : UniValue outputs(UniValue::VARR);
1398 [ - + + + ]: 1003 : for (unsigned int i = 0; i < psbtx.outputs.size(); ++i) {
1399 : 639 : const PSBTOutput& output = psbtx.outputs[i];
1400 : 639 : UniValue out(UniValue::VOBJ);
1401 : : // Redeem script and witness script
1402 [ - + + + ]: 639 : if (!output.redeem_script.empty()) {
1403 : 16 : UniValue r(UniValue::VOBJ);
1404 [ + - ]: 16 : ScriptToUniv(output.redeem_script, /*out=*/r);
1405 [ + - + - ]: 32 : out.pushKV("redeem_script", std::move(r));
1406 : 16 : }
1407 [ + + + + ]: 651 : if (!output.witness_script.empty()) {
1408 : 12 : UniValue r(UniValue::VOBJ);
1409 [ + - ]: 12 : ScriptToUniv(output.witness_script, /*out=*/r);
1410 [ + - + - ]: 24 : out.pushKV("witness_script", std::move(r));
1411 : 12 : }
1412 : :
1413 : : // keypaths
1414 [ + + ]: 639 : if (!output.hd_keypaths.empty()) {
1415 : 97 : UniValue keypaths(UniValue::VARR);
1416 [ + - + + ]: 210 : for (auto entry : output.hd_keypaths) {
1417 : 113 : UniValue keypath(UniValue::VOBJ);
1418 [ + - + - : 226 : keypath.pushKV("pubkey", HexStr(entry.first));
+ - + - ]
1419 [ + - + - : 226 : keypath.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(entry.second.fingerprint)));
+ - + - ]
1420 [ + - + - : 226 : keypath.pushKV("path", WriteHDKeypath(entry.second.path));
+ - + - ]
1421 [ + - ]: 113 : keypaths.push_back(std::move(keypath));
1422 : 113 : }
1423 [ + - + - ]: 194 : out.pushKV("bip32_derivs", std::move(keypaths));
1424 : 97 : }
1425 : :
1426 : : // Taproot internal key
1427 [ + + ]: 1278 : if (!output.m_tap_internal_key.IsNull()) {
1428 [ + - + - : 370 : out.pushKV("taproot_internal_key", HexStr(output.m_tap_internal_key));
+ - + - ]
1429 : : }
1430 : :
1431 : : // Taproot tree
1432 [ + + ]: 639 : if (!output.m_tap_tree.empty()) {
1433 : 146 : UniValue tree(UniValue::VARR);
1434 [ + + ]: 478 : for (const auto& [depth, leaf_ver, script] : output.m_tap_tree) {
1435 : 332 : UniValue elem(UniValue::VOBJ);
1436 [ + - + - : 664 : elem.pushKV("depth", depth);
+ - ]
1437 [ + - + - : 664 : elem.pushKV("leaf_ver", leaf_ver);
+ - ]
1438 [ - + + - : 664 : elem.pushKV("script", HexStr(script));
+ - + - +
- ]
1439 [ + - ]: 332 : tree.push_back(std::move(elem));
1440 : 332 : }
1441 [ + - + - ]: 292 : out.pushKV("taproot_tree", std::move(tree));
1442 : 146 : }
1443 : :
1444 : : // Taproot bip32 keypaths
1445 [ + + ]: 639 : if (!output.m_tap_bip32_paths.empty()) {
1446 : 211 : UniValue keypaths(UniValue::VARR);
1447 [ + + ]: 923 : for (const auto& [xonly, leaf_origin] : output.m_tap_bip32_paths) {
1448 : 712 : const auto& [leaf_hashes, origin] = leaf_origin;
1449 : 712 : UniValue path_obj(UniValue::VOBJ);
1450 [ + - + - : 1424 : path_obj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1451 [ + - + - : 1424 : path_obj.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(origin.fingerprint)));
+ - + - ]
1452 [ + - + - : 1424 : path_obj.pushKV("path", WriteHDKeypath(origin.path));
+ - + - ]
1453 : 712 : UniValue leaf_hashes_arr(UniValue::VARR);
1454 [ + + ]: 1196 : for (const auto& leaf_hash : leaf_hashes) {
1455 [ + - + - : 484 : leaf_hashes_arr.push_back(HexStr(leaf_hash));
+ - ]
1456 : : }
1457 [ + - + - ]: 1424 : path_obj.pushKV("leaf_hashes", std::move(leaf_hashes_arr));
1458 [ + - ]: 712 : keypaths.push_back(std::move(path_obj));
1459 : 712 : }
1460 [ + - + - ]: 422 : out.pushKV("taproot_bip32_derivs", std::move(keypaths));
1461 : 211 : }
1462 : :
1463 : : // Write MuSig2 fields
1464 [ + + ]: 639 : if (!output.m_musig2_participants.empty()) {
1465 : 75 : UniValue musig_pubkeys(UniValue::VARR);
1466 [ + + ]: 174 : for (const auto& [agg, parts] : output.m_musig2_participants) {
1467 : 99 : UniValue musig_part(UniValue::VOBJ);
1468 [ + - + - : 198 : musig_part.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1469 : 99 : UniValue part_pubkeys(UniValue::VARR);
1470 [ + + ]: 374 : for (const auto& pub : parts) {
1471 [ + - + - : 275 : part_pubkeys.push_back(HexStr(pub));
+ - ]
1472 : : }
1473 [ + - + - : 198 : musig_part.pushKV("participant_pubkeys", part_pubkeys);
+ - ]
1474 [ + - + - ]: 99 : musig_pubkeys.push_back(musig_part);
1475 : 99 : }
1476 [ + - + - : 150 : out.pushKV("musig2_participant_pubkeys", musig_pubkeys);
+ - ]
1477 : 75 : }
1478 : :
1479 : : // Proprietary
1480 [ + + ]: 639 : if (!output.m_proprietary.empty()) {
1481 : 1 : UniValue proprietary(UniValue::VARR);
1482 [ + + ]: 2 : for (const auto& entry : output.m_proprietary) {
1483 : 1 : UniValue this_prop(UniValue::VOBJ);
1484 [ - + + - : 2 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - +
- ]
1485 [ + - + - : 2 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1486 [ - + + - : 2 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - +
- ]
1487 [ - + + - : 2 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - +
- ]
1488 [ + - ]: 1 : proprietary.push_back(std::move(this_prop));
1489 : 1 : }
1490 [ + - + - ]: 2 : out.pushKV("proprietary", std::move(proprietary));
1491 : 1 : }
1492 : :
1493 : : // Unknown data
1494 [ - + ]: 639 : if (output.unknown.size() > 0) {
1495 : 0 : UniValue unknowns(UniValue::VOBJ);
1496 [ # # # # ]: 0 : for (auto entry : output.unknown) {
1497 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # #
# ]
1498 : 0 : }
1499 [ # # # # ]: 0 : out.pushKV("unknown", std::move(unknowns));
1500 : 0 : }
1501 : :
1502 [ + - ]: 639 : outputs.push_back(std::move(out));
1503 : :
1504 : : // Fee calculation
1505 [ + - - + ]: 639 : if (MoneyRange(psbtx.tx->vout[i].nValue) && MoneyRange(output_value + psbtx.tx->vout[i].nValue)) {
1506 : : output_value += psbtx.tx->vout[i].nValue;
1507 : : } else {
1508 : : // Hack to just not show fee later
1509 : : have_all_utxos = false;
1510 : : }
1511 : 639 : }
1512 [ + - + - ]: 728 : result.pushKV("outputs", std::move(outputs));
1513 [ + + ]: 364 : if (have_all_utxos) {
1514 [ + - + - : 702 : result.pushKV("fee", ValueFromAmount(total_in - output_value));
+ - ]
1515 : : }
1516 : :
1517 : 364 : return result;
1518 : 426 : },
1519 [ + - + - : 14075 : };
+ + - - ]
1520 [ + - + - : 95710 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - -
- - - -
- ]
1521 : :
1522 : 2442 : static RPCMethod combinepsbt()
1523 : : {
1524 : 2442 : return RPCMethod{
1525 : 2442 : "combinepsbt",
1526 [ + - ]: 4884 : "Combine multiple partially signed Bitcoin transactions into one transaction.\n"
1527 : : "Implements the Combiner role.\n",
1528 : : {
1529 [ + - + - ]: 4884 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base64 strings of partially signed transactions",
1530 : : {
1531 [ + - + - ]: 4884 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "A base64 string of a PSBT"},
1532 : : },
1533 : : },
1534 : : },
1535 [ + - ]: 4884 : RPCResult{
1536 [ + - + - ]: 4884 : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction"
1537 [ + - ]: 4884 : },
1538 : 2442 : RPCExamples{
1539 [ + - + - : 4884 : HelpExampleCli("combinepsbt", R"('["mybase64_1", "mybase64_2", "mybase64_3"]')")
+ - ]
1540 [ + - ]: 2442 : },
1541 : 2442 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1542 : : {
1543 : : // Unserialize the transactions
1544 : 53 : std::vector<PartiallySignedTransaction> psbtxs;
1545 [ + - + - : 53 : UniValue txs = request.params[0].get_array();
+ - ]
1546 [ - + + + ]: 53 : if (txs.empty()) {
1547 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "Parameter 'txs' cannot be empty");
1548 : : }
1549 [ - + + + ]: 201 : for (unsigned int i = 0; i < txs.size(); ++i) {
1550 : 149 : PartiallySignedTransaction psbtx;
1551 [ + - ]: 149 : std::string error;
1552 [ + - + - : 149 : if (!DecodeBase64PSBT(psbtx, txs[i].get_str(), error)) {
+ - - + ]
1553 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1554 : : }
1555 [ + - ]: 149 : psbtxs.push_back(psbtx);
1556 : 149 : }
1557 : :
1558 : 52 : PartiallySignedTransaction merged_psbt;
1559 [ + - + + ]: 52 : if (!CombinePSBTs(merged_psbt, psbtxs)) {
1560 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "PSBTs not compatible (different transactions)");
1561 : : }
1562 : :
1563 : 51 : DataStream ssTx{};
1564 [ + - ]: 51 : ssTx << merged_psbt;
1565 [ - + + - : 153 : return EncodeBase64(ssTx);
+ - ]
1566 : 56 : },
1567 [ + - + - : 19536 : };
+ - + + +
+ - - -
- ]
1568 [ + - + - ]: 9768 : }
1569 : :
1570 : 2616 : static RPCMethod finalizepsbt()
1571 : : {
1572 : 2616 : return RPCMethod{"finalizepsbt",
1573 [ + - ]: 5232 : "Finalize the inputs of a PSBT. If the transaction is fully signed, it will produce a\n"
1574 : : "network serialized transaction which can be broadcast with sendrawtransaction. Otherwise a PSBT will be\n"
1575 : : "created which has the final_scriptSig and final_scriptwitness fields filled for inputs that are complete.\n"
1576 : : "Implements the Finalizer and Extractor roles.\n",
1577 : : {
1578 [ + - + - ]: 5232 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"},
1579 [ + - + - : 7848 : {"extract", RPCArg::Type::BOOL, RPCArg::Default{true}, "If true and the transaction is complete,\n"
+ - ]
1580 : : " extract and return the complete transaction in normal network serialization instead of the PSBT."},
1581 : : },
1582 [ + - ]: 5232 : RPCResult{
1583 [ + - + - ]: 5232 : RPCResult::Type::OBJ, "", "",
1584 : : {
1585 [ + - + - ]: 5232 : {RPCResult::Type::STR, "psbt", /*optional=*/true, "The base64-encoded partially signed transaction if not extracted"},
1586 [ + - + - ]: 5232 : {RPCResult::Type::STR_HEX, "hex", /*optional=*/true, "The hex-encoded network transaction if extracted"},
1587 [ + - + - ]: 5232 : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
1588 : : }
1589 [ + - + - : 20928 : },
+ + - - ]
1590 : 2616 : RPCExamples{
1591 [ + - + - : 5232 : HelpExampleCli("finalizepsbt", "\"psbt\"")
+ - ]
1592 [ + - ]: 2616 : },
1593 : 2616 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1594 : : {
1595 : : // Unserialize the transactions
1596 : 227 : PartiallySignedTransaction psbtx;
1597 [ + - ]: 227 : std::string error;
1598 [ + - + - : 227 : if (!DecodeBase64PSBT(psbtx, request.params[0].get_str(), error)) {
+ - + + ]
1599 [ + - + - ]: 2 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1600 : : }
1601 : :
1602 [ + - + + : 226 : bool extract = request.params[1].isNull() || (!request.params[1].isNull() && request.params[1].get_bool());
+ - + - +
- + - +
+ ]
1603 : :
1604 [ + - ]: 226 : CMutableTransaction mtx;
1605 [ + - ]: 226 : bool complete = FinalizeAndExtractPSBT(psbtx, mtx);
1606 : :
1607 : 226 : UniValue result(UniValue::VOBJ);
1608 : 226 : DataStream ssTx{};
1609 [ + + ]: 226 : std::string result_str;
1610 : :
1611 [ + + + + ]: 226 : if (complete && extract) {
1612 [ + - ]: 196 : ssTx << TX_WITH_WITNESS(mtx);
1613 [ - + + - ]: 196 : result_str = HexStr(ssTx);
1614 [ + - + - : 392 : result.pushKV("hex", result_str);
+ - ]
1615 : : } else {
1616 [ + - ]: 30 : ssTx << psbtx;
1617 [ + - + - ]: 60 : result_str = EncodeBase64(ssTx.str());
1618 [ + - + - : 60 : result.pushKV("psbt", result_str);
+ - ]
1619 : : }
1620 [ + - + - : 452 : result.pushKV("complete", complete);
+ - ]
1621 : :
1622 : 452 : return result;
1623 : 453 : },
1624 [ + - + - : 15696 : };
+ + - - ]
1625 [ + - + - : 26160 : }
+ - + - +
- - - -
- ]
1626 : :
1627 : 2449 : static RPCMethod createpsbt()
1628 : : {
1629 : 2449 : return RPCMethod{
1630 : 2449 : "createpsbt",
1631 [ + - ]: 4898 : "Creates a transaction in the Partially Signed Transaction format.\n"
1632 : : "Implements the Creator role.\n"
1633 : : "Note that the transaction's inputs are not signed, and\n"
1634 : : "it is not stored in the wallet or transmitted to the network.\n",
1635 [ + - ]: 4898 : CreateTxDoc(),
1636 [ + - ]: 4898 : RPCResult{
1637 [ + - + - ]: 4898 : RPCResult::Type::STR, "", "The resulting raw transaction (base64-encoded string)"
1638 [ + - ]: 4898 : },
1639 : 2449 : RPCExamples{
1640 [ + - + - : 4898 : HelpExampleCli("createpsbt", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"address\\\":0.01}]\"")
+ - ]
1641 [ + - ]: 2449 : },
1642 : 2449 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1643 : : {
1644 : :
1645 : 60 : std::optional<bool> rbf;
1646 [ + + ]: 60 : if (!request.params[3].isNull()) {
1647 : 1 : rbf = request.params[3].get_bool();
1648 : : }
1649 : 60 : CMutableTransaction rawTx = ConstructTransaction(request.params[0], request.params[1], request.params[2], rbf, self.Arg<uint32_t>("version"));
1650 : :
1651 : : // Make a blank psbt
1652 : 60 : PartiallySignedTransaction psbtx;
1653 [ + - ]: 60 : psbtx.tx = rawTx;
1654 [ - + + + ]: 123 : for (unsigned int i = 0; i < rawTx.vin.size(); ++i) {
1655 [ + - ]: 63 : psbtx.inputs.emplace_back();
1656 : : }
1657 [ - + + + ]: 121 : for (unsigned int i = 0; i < rawTx.vout.size(); ++i) {
1658 [ + - ]: 61 : psbtx.outputs.emplace_back();
1659 : : }
1660 : :
1661 : : // Serialize the PSBT
1662 : 60 : DataStream ssTx{};
1663 [ + - ]: 60 : ssTx << psbtx;
1664 : :
1665 [ - + + - : 120 : return EncodeBase64(ssTx);
+ - ]
1666 : 120 : },
1667 [ + - ]: 4898 : };
1668 : : }
1669 : :
1670 : 2395 : static RPCMethod converttopsbt()
1671 : : {
1672 : 2395 : return RPCMethod{
1673 : 2395 : "converttopsbt",
1674 [ + - ]: 4790 : "Converts a network serialized transaction to a PSBT. This should be used only with createrawtransaction and fundrawtransaction\n"
1675 : : "createpsbt and walletcreatefundedpsbt should be used for new applications.\n",
1676 : : {
1677 [ + - + - ]: 4790 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The hex string of a raw transaction"},
1678 [ + - + - : 7185 : {"permitsigdata", RPCArg::Type::BOOL, RPCArg::Default{false}, "If true, any signatures in the input will be discarded and conversion\n"
+ - ]
1679 : : " will continue. If false, RPC will fail if any signatures are present."},
1680 [ + - + - : 7185 : {"iswitness", RPCArg::Type::BOOL, RPCArg::DefaultHint{"depends on heuristic tests"}, "Whether the transaction hex is a serialized witness transaction.\n"
+ - ]
1681 : : "If iswitness is not present, heuristic tests will be used in decoding.\n"
1682 : : "If true, only witness deserialization will be tried.\n"
1683 : : "If false, only non-witness deserialization will be tried.\n"
1684 : : "This boolean should reflect whether the transaction has inputs\n"
1685 : : "(e.g. fully valid, or on-chain transactions), if known by the caller."
1686 : : },
1687 : : },
1688 [ + - ]: 4790 : RPCResult{
1689 [ + - + - ]: 4790 : RPCResult::Type::STR, "", "The resulting raw transaction (base64-encoded string)"
1690 [ + - ]: 4790 : },
1691 : 2395 : RPCExamples{
1692 : : "\nCreate a transaction\n"
1693 [ + - + - : 4790 : + HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"data\\\":\\\"00010203\\\"}]\"") +
+ - + - ]
1694 : 2395 : "\nConvert the transaction to a PSBT\n"
1695 [ + - + - : 9580 : + HelpExampleCli("converttopsbt", "\"rawtransaction\"")
+ - + - ]
1696 [ + - ]: 2395 : },
1697 : 2395 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1698 : : {
1699 : : // parse hex string from parameter
1700 : 6 : CMutableTransaction tx;
1701 [ + - + + : 6 : bool permitsigdata = request.params[1].isNull() ? false : request.params[1].get_bool();
+ - + - ]
1702 [ + - + + ]: 6 : bool witness_specified = !request.params[2].isNull();
1703 [ + + + - : 6 : bool iswitness = witness_specified ? request.params[2].get_bool() : false;
+ - ]
1704 : 1 : const bool try_witness = witness_specified ? iswitness : true;
1705 : 1 : const bool try_no_witness = witness_specified ? !iswitness : true;
1706 [ + - + - : 6 : if (!DecodeHexTx(tx, request.params[0].get_str(), try_no_witness, try_witness)) {
+ - - + ]
1707 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed");
1708 : : }
1709 : :
1710 : : // Remove all scriptSigs and scriptWitnesses from inputs
1711 [ + + ]: 9 : for (CTxIn& input : tx.vin) {
1712 [ - + + - : 6 : if ((!input.scriptSig.empty() || !input.scriptWitness.IsNull()) && !permitsigdata) {
+ + + + ]
1713 [ + - + - ]: 6 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "Inputs must not have scriptSigs and scriptWitnesses");
1714 : : }
1715 : 3 : input.scriptSig.clear();
1716 : 3 : input.scriptWitness.SetNull();
1717 : : }
1718 : :
1719 : : // Make a blank psbt
1720 : 3 : PartiallySignedTransaction psbtx;
1721 [ + - ]: 3 : psbtx.tx = tx;
1722 [ - + + + ]: 6 : for (unsigned int i = 0; i < tx.vin.size(); ++i) {
1723 [ + - ]: 3 : psbtx.inputs.emplace_back();
1724 : : }
1725 [ - + + + ]: 8 : for (unsigned int i = 0; i < tx.vout.size(); ++i) {
1726 [ + - ]: 5 : psbtx.outputs.emplace_back();
1727 : : }
1728 : :
1729 : : // Serialize the PSBT
1730 : 3 : DataStream ssTx{};
1731 [ + - ]: 3 : ssTx << psbtx;
1732 : :
1733 [ - + + - : 6 : return EncodeBase64(ssTx);
+ - ]
1734 : 6 : },
1735 [ + - + - : 16765 : };
+ + - - ]
1736 [ + - + - : 14370 : }
+ - - - ]
1737 : :
1738 : 2392 : static RPCMethod utxoupdatepsbt()
1739 : : {
1740 : 2392 : return RPCMethod{
1741 : 2392 : "utxoupdatepsbt",
1742 [ + - ]: 4784 : "Updates all segwit inputs and outputs in a PSBT with data from output descriptors, the UTXO set, txindex, or the mempool.\n",
1743 : : {
1744 [ + - + - ]: 4784 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"},
1745 [ + - + - ]: 4784 : {"descriptors", RPCArg::Type::ARR, RPCArg::Optional::OMITTED, "An array of either strings or objects", {
1746 [ + - + - ]: 4784 : {"", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "An output descriptor"},
1747 [ + - + - ]: 4784 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "An object with an output descriptor and extra information", {
1748 [ + - + - ]: 4784 : {"desc", RPCArg::Type::STR, RPCArg::Optional::NO, "An output descriptor"},
1749 [ + - + - : 7176 : {"range", RPCArg::Type::RANGE, RPCArg::Default{1000}, "Up to what index HD chains should be explored (either end or [begin,end])"},
+ - ]
1750 : : }},
1751 : : }},
1752 : : },
1753 [ + - ]: 4784 : RPCResult {
1754 [ + - + - ]: 4784 : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction with inputs updated"
1755 [ + - ]: 4784 : },
1756 : 2392 : RPCExamples {
1757 [ + - + - : 4784 : HelpExampleCli("utxoupdatepsbt", "\"psbt\"")
+ - ]
1758 [ + - ]: 2392 : },
1759 : 2392 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1760 : : {
1761 : : // Parse descriptors, if any.
1762 : 3 : FlatSigningProvider provider;
1763 [ + - + + ]: 3 : if (!request.params[1].isNull()) {
1764 [ + - + - : 1 : auto descs = request.params[1].get_array();
+ - ]
1765 [ - + + + ]: 4 : for (size_t i = 0; i < descs.size(); ++i) {
1766 [ + - + - ]: 3 : EvalDescriptorStringOrObject(descs[i], provider);
1767 : : }
1768 : 1 : }
1769 : :
1770 : : // We don't actually need private keys further on; hide them as a precaution.
1771 : 3 : const PartiallySignedTransaction& psbtx = ProcessPSBT(
1772 : 3 : request.params[0].get_str(),
1773 : 3 : request.context,
1774 [ + - ]: 3 : HidingSigningProvider(&provider, /*hide_secret=*/true, /*hide_origin=*/false),
1775 : : /*sighash_type=*/std::nullopt,
1776 [ + - + - : 3 : /*finalize=*/false);
+ - + - ]
1777 : :
1778 : 3 : DataStream ssTx{};
1779 [ + - ]: 3 : ssTx << psbtx;
1780 [ - + + - : 9 : return EncodeBase64(ssTx);
+ - ]
1781 : 3 : },
1782 [ + - + - : 33488 : };
+ - + - +
+ + + + +
- - - - -
- ]
1783 [ + - + - : 28704 : }
+ - + - +
- + - - -
- - - - ]
1784 : :
1785 : 2392 : static RPCMethod joinpsbts()
1786 : : {
1787 : 2392 : return RPCMethod{
1788 : 2392 : "joinpsbts",
1789 [ + - ]: 4784 : "Joins multiple distinct PSBTs with different inputs and outputs into one PSBT with inputs and outputs from all of the PSBTs\n"
1790 : : "No input in any of the PSBTs can be in more than one of the PSBTs.\n",
1791 : : {
1792 [ + - + - ]: 4784 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base64 strings of partially signed transactions",
1793 : : {
1794 [ + - + - ]: 4784 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"}
1795 : : }}
1796 : : },
1797 [ + - ]: 4784 : RPCResult {
1798 [ + - + - ]: 4784 : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction"
1799 [ + - ]: 4784 : },
1800 : 2392 : RPCExamples {
1801 [ + - + - : 4784 : HelpExampleCli("joinpsbts", "\"psbt\"")
+ - ]
1802 [ + - ]: 2392 : },
1803 : 2392 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1804 : : {
1805 : : // Unserialize the transactions
1806 : 3 : std::vector<PartiallySignedTransaction> psbtxs;
1807 [ + - + - : 3 : UniValue txs = request.params[0].get_array();
+ - ]
1808 : :
1809 [ - + - + ]: 3 : if (txs.size() <= 1) {
1810 [ # # # # ]: 0 : throw JSONRPCError(RPC_INVALID_PARAMETER, "At least two PSBTs are required to join PSBTs.");
1811 : : }
1812 : :
1813 : : uint32_t best_version = 1;
1814 : : uint32_t best_locktime = 0xffffffff;
1815 [ - + + + ]: 9 : for (unsigned int i = 0; i < txs.size(); ++i) {
1816 : 6 : PartiallySignedTransaction psbtx;
1817 [ + - ]: 6 : std::string error;
1818 [ + - + - : 6 : if (!DecodeBase64PSBT(psbtx, txs[i].get_str(), error)) {
+ - - + ]
1819 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1820 : : }
1821 [ + - ]: 6 : psbtxs.push_back(psbtx);
1822 : : // Choose the highest version number
1823 [ + + ]: 6 : if (psbtx.tx->version > best_version) {
1824 : 3 : best_version = psbtx.tx->version;
1825 : : }
1826 : : // Choose the lowest lock time
1827 [ + + ]: 6 : if (psbtx.tx->nLockTime < best_locktime) {
1828 : 3 : best_locktime = psbtx.tx->nLockTime;
1829 : : }
1830 : 6 : }
1831 : :
1832 : : // Create a blank psbt where everything will be added
1833 : 3 : PartiallySignedTransaction merged_psbt;
1834 [ + - ]: 3 : merged_psbt.tx = CMutableTransaction();
1835 : 3 : merged_psbt.tx->version = best_version;
1836 : 3 : merged_psbt.tx->nLockTime = best_locktime;
1837 : :
1838 : : // Merge
1839 [ + + ]: 8 : for (auto& psbt : psbtxs) {
1840 [ - + + + ]: 15 : for (unsigned int i = 0; i < psbt.tx->vin.size(); ++i) {
1841 [ + - + + ]: 10 : if (!merged_psbt.AddInput(psbt.tx->vin[i], psbt.inputs[i])) {
1842 [ + - + - : 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, strprintf("Input %s:%d exists in multiple PSBTs", psbt.tx->vin[i].prevout.hash.ToString(), psbt.tx->vin[i].prevout.n));
+ - ]
1843 : : }
1844 : : }
1845 [ - + + + ]: 10 : for (unsigned int i = 0; i < psbt.tx->vout.size(); ++i) {
1846 [ + - ]: 5 : merged_psbt.AddOutput(psbt.tx->vout[i], psbt.outputs[i]);
1847 : : }
1848 [ - + ]: 5 : for (auto& xpub_pair : psbt.m_xpubs) {
1849 [ # # ]: 0 : if (!merged_psbt.m_xpubs.contains(xpub_pair.first)) {
1850 [ # # # # ]: 0 : merged_psbt.m_xpubs[xpub_pair.first] = xpub_pair.second;
1851 : : } else {
1852 [ # # # # ]: 0 : merged_psbt.m_xpubs[xpub_pair.first].insert(xpub_pair.second.begin(), xpub_pair.second.end());
1853 : : }
1854 : : }
1855 [ + - ]: 5 : merged_psbt.unknown.insert(psbt.unknown.begin(), psbt.unknown.end());
1856 : : }
1857 : :
1858 : : // Generate list of shuffled indices for shuffling inputs and outputs of the merged PSBT
1859 [ - + + - ]: 2 : std::vector<int> input_indices(merged_psbt.inputs.size());
1860 : 2 : std::iota(input_indices.begin(), input_indices.end(), 0);
1861 [ - + + - ]: 2 : std::vector<int> output_indices(merged_psbt.outputs.size());
1862 : 2 : std::iota(output_indices.begin(), output_indices.end(), 0);
1863 : :
1864 : : // Shuffle input and output indices lists
1865 : 2 : std::shuffle(input_indices.begin(), input_indices.end(), FastRandomContext());
1866 : 2 : std::shuffle(output_indices.begin(), output_indices.end(), FastRandomContext());
1867 : :
1868 : 2 : PartiallySignedTransaction shuffled_psbt;
1869 [ + - ]: 2 : shuffled_psbt.tx = CMutableTransaction();
1870 : 2 : shuffled_psbt.tx->version = merged_psbt.tx->version;
1871 : 2 : shuffled_psbt.tx->nLockTime = merged_psbt.tx->nLockTime;
1872 [ + + ]: 10 : for (int i : input_indices) {
1873 [ + - ]: 8 : shuffled_psbt.AddInput(merged_psbt.tx->vin[i], merged_psbt.inputs[i]);
1874 : : }
1875 [ + + ]: 6 : for (int i : output_indices) {
1876 [ + - ]: 4 : shuffled_psbt.AddOutput(merged_psbt.tx->vout[i], merged_psbt.outputs[i]);
1877 : : }
1878 [ + - ]: 2 : shuffled_psbt.unknown.insert(merged_psbt.unknown.begin(), merged_psbt.unknown.end());
1879 : :
1880 : 2 : DataStream ssTx{};
1881 [ + - ]: 2 : ssTx << shuffled_psbt;
1882 [ - + + - : 6 : return EncodeBase64(ssTx);
+ - ]
1883 : 5 : },
1884 [ + - + - : 19136 : };
+ - + + +
+ - - -
- ]
1885 [ + - + - ]: 9568 : }
1886 : :
1887 : 2398 : static RPCMethod analyzepsbt()
1888 : : {
1889 : 2398 : return RPCMethod{
1890 : 2398 : "analyzepsbt",
1891 [ + - ]: 4796 : "Analyzes and provides information about the current status of a PSBT and its inputs\n",
1892 : : {
1893 [ + - + - ]: 4796 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"}
1894 : : },
1895 [ + - ]: 4796 : RPCResult {
1896 [ + - + - ]: 4796 : RPCResult::Type::OBJ, "", "",
1897 : : {
1898 [ + - + - ]: 4796 : {RPCResult::Type::ARR, "inputs", /*optional=*/true, "",
1899 : : {
1900 [ + - + - ]: 4796 : {RPCResult::Type::OBJ, "", "",
1901 : : {
1902 [ + - + - ]: 4796 : {RPCResult::Type::BOOL, "has_utxo", "Whether a UTXO is provided"},
1903 [ + - + - ]: 4796 : {RPCResult::Type::BOOL, "is_final", "Whether the input is finalized"},
1904 [ + - + - ]: 4796 : {RPCResult::Type::OBJ, "missing", /*optional=*/true, "Things that are missing that are required to complete this input",
1905 : : {
1906 [ + - + - ]: 4796 : {RPCResult::Type::ARR, "pubkeys", /*optional=*/true, "",
1907 : : {
1908 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "keyid", "Public key ID, hash160 of the public key, of a public key whose BIP 32 derivation path is missing"},
1909 : : }},
1910 [ + - + - ]: 4796 : {RPCResult::Type::ARR, "signatures", /*optional=*/true, "",
1911 : : {
1912 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "keyid", "Public key ID, hash160 of the public key, of a public key whose signature is missing"},
1913 : : }},
1914 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "redeemscript", /*optional=*/true, "Hash160 of the redeem script that is missing"},
1915 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "witnessscript", /*optional=*/true, "SHA256 of the witness script that is missing"},
1916 : : }},
1917 [ + - + - ]: 4796 : {RPCResult::Type::STR, "next", /*optional=*/true, "Role of the next person that this input needs to go to"},
1918 : : }},
1919 : : }},
1920 [ + - + - ]: 4796 : {RPCResult::Type::NUM, "estimated_vsize", /*optional=*/true, "Estimated vsize of the final signed transaction"},
1921 [ + - + - ]: 4796 : {RPCResult::Type::STR_AMOUNT, "estimated_feerate", /*optional=*/true, "Estimated feerate of the final signed transaction in " + CURRENCY_UNIT + "/kvB. Shown only if all UTXO slots in the PSBT have been filled"},
1922 [ + - + - ]: 4796 : {RPCResult::Type::STR_AMOUNT, "fee", /*optional=*/true, "The transaction fee paid. Shown only if all UTXO slots in the PSBT have been filled"},
1923 [ + - + - ]: 4796 : {RPCResult::Type::STR, "next", "Role of the next person that this psbt needs to go to"},
1924 [ + - + - ]: 4796 : {RPCResult::Type::STR, "error", /*optional=*/true, "Error message (if there is one)"},
1925 : : }
1926 [ + - + - : 98318 : },
+ - + - +
- + - + -
+ + + + +
+ + + + +
+ + - - -
- - - - -
- - - - ]
1927 : 2398 : RPCExamples {
1928 [ + - + - : 4796 : HelpExampleCli("analyzepsbt", "\"psbt\"")
+ - ]
1929 [ + - ]: 2398 : },
1930 : 2398 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1931 : : {
1932 : : // Unserialize the transaction
1933 : 9 : PartiallySignedTransaction psbtx;
1934 [ + - ]: 9 : std::string error;
1935 [ + - + - : 9 : if (!DecodeBase64PSBT(psbtx, request.params[0].get_str(), error)) {
+ - + + ]
1936 [ + - + - ]: 2 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1937 : : }
1938 : :
1939 [ + - + - ]: 8 : PSBTAnalysis psbta = AnalyzePSBT(psbtx);
1940 : :
1941 : 8 : UniValue result(UniValue::VOBJ);
1942 : 8 : UniValue inputs_result(UniValue::VARR);
1943 [ + + ]: 14 : for (const auto& input : psbta.inputs) {
1944 : 6 : UniValue input_univ(UniValue::VOBJ);
1945 : 6 : UniValue missing(UniValue::VOBJ);
1946 : :
1947 [ + - + - : 12 : input_univ.pushKV("has_utxo", input.has_utxo);
+ - ]
1948 [ + - + - : 12 : input_univ.pushKV("is_final", input.is_final);
+ - ]
1949 [ + - + - : 12 : input_univ.pushKV("next", PSBTRoleName(input.next));
+ - + - ]
1950 : :
1951 [ - + ]: 6 : if (!input.missing_pubkeys.empty()) {
1952 : 0 : UniValue missing_pubkeys_univ(UniValue::VARR);
1953 [ # # ]: 0 : for (const CKeyID& pubkey : input.missing_pubkeys) {
1954 [ # # # # : 0 : missing_pubkeys_univ.push_back(HexStr(pubkey));
# # ]
1955 : : }
1956 [ # # # # ]: 0 : missing.pushKV("pubkeys", std::move(missing_pubkeys_univ));
1957 : 0 : }
1958 [ - + ]: 12 : if (!input.missing_redeem_script.IsNull()) {
1959 [ # # # # : 0 : missing.pushKV("redeemscript", HexStr(input.missing_redeem_script));
# # # # ]
1960 : : }
1961 [ - + ]: 12 : if (!input.missing_witness_script.IsNull()) {
1962 [ # # # # : 0 : missing.pushKV("witnessscript", HexStr(input.missing_witness_script));
# # # # ]
1963 : : }
1964 [ + + ]: 6 : if (!input.missing_sigs.empty()) {
1965 : 1 : UniValue missing_sigs_univ(UniValue::VARR);
1966 [ + + ]: 2 : for (const CKeyID& pubkey : input.missing_sigs) {
1967 [ + - + - : 1 : missing_sigs_univ.push_back(HexStr(pubkey));
+ - ]
1968 : : }
1969 [ + - + - ]: 2 : missing.pushKV("signatures", std::move(missing_sigs_univ));
1970 : 1 : }
1971 [ + - + + ]: 6 : if (!missing.getKeys().empty()) {
1972 [ + - + - ]: 2 : input_univ.pushKV("missing", std::move(missing));
1973 : : }
1974 [ + - ]: 6 : inputs_result.push_back(std::move(input_univ));
1975 : 6 : }
1976 [ - + + + : 13 : if (!inputs_result.empty()) result.pushKV("inputs", std::move(inputs_result));
+ - + - ]
1977 : :
1978 [ + + ]: 8 : if (psbta.estimated_vsize != std::nullopt) {
1979 [ + - + - : 6 : result.pushKV("estimated_vsize", *psbta.estimated_vsize);
+ - ]
1980 : : }
1981 [ + + ]: 8 : if (psbta.estimated_feerate != std::nullopt) {
1982 [ + - + - : 6 : result.pushKV("estimated_feerate", ValueFromAmount(psbta.estimated_feerate->GetFeePerK()));
+ - ]
1983 : : }
1984 [ + + ]: 8 : if (psbta.fee != std::nullopt) {
1985 [ + - + - : 6 : result.pushKV("fee", ValueFromAmount(*psbta.fee));
+ - ]
1986 : : }
1987 [ + - + - : 16 : result.pushKV("next", PSBTRoleName(psbta.next));
+ - + - ]
1988 [ + + ]: 8 : if (!psbta.error.empty()) {
1989 [ + - + - : 6 : result.pushKV("error", psbta.error);
+ - ]
1990 : : }
1991 : :
1992 : 8 : return result;
1993 : 17 : },
1994 [ + - + - : 11990 : };
+ + - - ]
1995 [ + - + - : 86328 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - ]
1996 : :
1997 : 2402 : RPCMethod descriptorprocesspsbt()
1998 : : {
1999 : 2402 : return RPCMethod{
2000 : 2402 : "descriptorprocesspsbt",
2001 [ + - ]: 4804 : "Update all segwit inputs in a PSBT with information from output descriptors, the UTXO set or the mempool. \n"
2002 : : "Then, sign the inputs we are able to with information from the output descriptors. ",
2003 : : {
2004 [ + - + - ]: 4804 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "The transaction base64 string"},
2005 [ + - + - ]: 4804 : {"descriptors", RPCArg::Type::ARR, RPCArg::Optional::NO, "An array of either strings or objects", {
2006 [ + - + - ]: 4804 : {"", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "An output descriptor"},
2007 [ + - + - ]: 4804 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "An object with an output descriptor and extra information", {
2008 [ + - + - ]: 4804 : {"desc", RPCArg::Type::STR, RPCArg::Optional::NO, "An output descriptor"},
2009 [ + - + - : 7206 : {"range", RPCArg::Type::RANGE, RPCArg::Default{1000}, "Up to what index HD chains should be explored (either end or [begin,end])"},
+ - ]
2010 : : }},
2011 : : }},
2012 [ + - + - : 7206 : {"sighashtype", RPCArg::Type::STR, RPCArg::Default{"DEFAULT for Taproot, ALL otherwise"}, "The signature hash type to sign with if not specified by the PSBT. Must be one of\n"
+ - ]
2013 : : " \"DEFAULT\"\n"
2014 : : " \"ALL\"\n"
2015 : : " \"NONE\"\n"
2016 : : " \"SINGLE\"\n"
2017 : : " \"ALL|ANYONECANPAY\"\n"
2018 : : " \"NONE|ANYONECANPAY\"\n"
2019 : : " \"SINGLE|ANYONECANPAY\""},
2020 [ + - + - : 7206 : {"bip32derivs", RPCArg::Type::BOOL, RPCArg::Default{true}, "Include BIP 32 derivation paths for public keys if we know them"},
+ - ]
2021 [ + - + - : 7206 : {"finalize", RPCArg::Type::BOOL, RPCArg::Default{true}, "Also finalize inputs if possible"},
+ - ]
2022 : : },
2023 [ + - ]: 4804 : RPCResult{
2024 [ + - + - ]: 4804 : RPCResult::Type::OBJ, "", "",
2025 : : {
2026 [ + - + - ]: 4804 : {RPCResult::Type::STR, "psbt", "The base64-encoded partially signed transaction"},
2027 [ + - + - ]: 4804 : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
2028 [ + - + - ]: 4804 : {RPCResult::Type::STR_HEX, "hex", /*optional=*/true, "The hex-encoded network transaction if complete"},
2029 : : }
2030 [ + - + - : 19216 : },
+ + - - ]
2031 : 2402 : RPCExamples{
2032 [ + - + - : 4804 : HelpExampleCli("descriptorprocesspsbt", "\"psbt\" \"[\\\"descriptor1\\\", \\\"descriptor2\\\"]\"") +
+ - ]
2033 [ + - + - : 7206 : HelpExampleCli("descriptorprocesspsbt", "\"psbt\" \"[{\\\"desc\\\":\\\"mydescriptor\\\", \\\"range\\\":21}]\"")
+ - + - ]
2034 [ + - ]: 2402 : },
2035 : 2402 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
2036 : : {
2037 : : // Add descriptor information to a signing provider
2038 : 13 : FlatSigningProvider provider;
2039 : :
2040 [ + - + - : 13 : auto descs = request.params[1].get_array();
+ - ]
2041 [ - + + + ]: 89 : for (size_t i = 0; i < descs.size(); ++i) {
2042 [ + - + - ]: 76 : EvalDescriptorStringOrObject(descs[i], provider, /*expand_priv=*/true);
2043 : : }
2044 : :
2045 [ + - + + ]: 13 : std::optional<int> sighash_type = ParseSighashString(request.params[2]);
2046 [ + - + + : 12 : bool bip32derivs = request.params[3].isNull() ? true : request.params[3].get_bool();
+ - + - ]
2047 [ + - + + : 12 : bool finalize = request.params[4].isNull() ? true : request.params[4].get_bool();
+ - + - ]
2048 : :
2049 : 12 : const PartiallySignedTransaction& psbtx = ProcessPSBT(
2050 : 12 : request.params[0].get_str(),
2051 [ + - ]: 12 : request.context,
2052 : 7 : HidingSigningProvider(&provider, /*hide_secret=*/false, !bip32derivs),
2053 : : sighash_type,
2054 [ + - + - : 12 : finalize);
+ + ]
2055 : :
2056 : : // Check whether or not all of the inputs are now signed
2057 : 5 : bool complete = true;
2058 [ + + ]: 11 : for (const auto& input : psbtx.inputs) {
2059 [ + - ]: 6 : complete &= PSBTInputSigned(input);
2060 : : }
2061 : :
2062 : 5 : DataStream ssTx{};
2063 [ + - ]: 5 : ssTx << psbtx;
2064 : :
2065 : 5 : UniValue result(UniValue::VOBJ);
2066 : :
2067 [ - + + - : 10 : result.pushKV("psbt", EncodeBase64(ssTx));
+ - + - +
- ]
2068 [ + - + - : 10 : result.pushKV("complete", complete);
+ - ]
2069 [ + + ]: 5 : if (complete) {
2070 [ + - ]: 2 : CMutableTransaction mtx;
2071 [ + - ]: 2 : PartiallySignedTransaction psbtx_copy = psbtx;
2072 [ + - + - ]: 2 : CHECK_NONFATAL(FinalizeAndExtractPSBT(psbtx_copy, mtx));
2073 : 2 : DataStream ssTx_final;
2074 [ + - ]: 2 : ssTx_final << TX_WITH_WITNESS(mtx);
2075 [ - + + - : 4 : result.pushKV("hex", HexStr(ssTx_final));
+ - + - +
- ]
2076 : 4 : }
2077 : 10 : return result;
2078 : 21 : },
2079 [ + - + - : 40834 : };
+ - + - +
+ + + + +
- - - - -
- ]
2080 [ + - + - : 57648 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
- - - - -
- - - ]
2081 : :
2082 : 1301 : void RegisterRawTransactionRPCCommands(CRPCTable& t)
2083 : : {
2084 : 1301 : static const CRPCCommand commands[]{
2085 [ + - ]: 2378 : {"rawtransactions", &getrawtransaction},
2086 [ + - ]: 2378 : {"rawtransactions", &createrawtransaction},
2087 [ + - ]: 2378 : {"rawtransactions", &decoderawtransaction},
2088 [ + - ]: 2378 : {"rawtransactions", &decodescript},
2089 [ + - ]: 2378 : {"rawtransactions", &combinerawtransaction},
2090 [ + - ]: 2378 : {"rawtransactions", &signrawtransactionwithkey},
2091 [ + - ]: 2378 : {"rawtransactions", &decodepsbt},
2092 [ + - ]: 2378 : {"rawtransactions", &combinepsbt},
2093 [ + - ]: 2378 : {"rawtransactions", &finalizepsbt},
2094 [ + - ]: 2378 : {"rawtransactions", &createpsbt},
2095 [ + - ]: 2378 : {"rawtransactions", &converttopsbt},
2096 [ + - ]: 2378 : {"rawtransactions", &utxoupdatepsbt},
2097 [ + - ]: 2378 : {"rawtransactions", &descriptorprocesspsbt},
2098 [ + - ]: 2378 : {"rawtransactions", &joinpsbts},
2099 [ + - ]: 2378 : {"rawtransactions", &analyzepsbt},
2100 [ + + + - : 20325 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
- - ]
2101 [ + + ]: 20816 : for (const auto& c : commands) {
2102 : 19515 : t.appendCommand(c.name, &c);
2103 : : }
2104 : 1301 : }
|