Branch data Line data Source code
1 : : // Copyright (c) 2010 Satoshi Nakamoto
2 : : // Copyright (c) 2009-present The Bitcoin Core developers
3 : : // Distributed under the MIT software license, see the accompanying
4 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
5 : :
6 : : #include <base58.h>
7 : : #include <chain.h>
8 : : #include <coins.h>
9 : : #include <consensus/amount.h>
10 : : #include <consensus/validation.h>
11 : : #include <core_io.h>
12 : : #include <index/txindex.h>
13 : : #include <key_io.h>
14 : : #include <node/blockstorage.h>
15 : : #include <node/coin.h>
16 : : #include <node/context.h>
17 : : #include <node/psbt.h>
18 : : #include <node/transaction.h>
19 : : #include <node/types.h>
20 : : #include <policy/packages.h>
21 : : #include <policy/policy.h>
22 : : #include <policy/rbf.h>
23 : : #include <primitives/transaction.h>
24 : : #include <psbt.h>
25 : : #include <random.h>
26 : : #include <rpc/blockchain.h>
27 : : #include <rpc/rawtransaction_util.h>
28 : : #include <rpc/server.h>
29 : : #include <rpc/server_util.h>
30 : : #include <rpc/util.h>
31 : : #include <script/script.h>
32 : : #include <script/sign.h>
33 : : #include <script/signingprovider.h>
34 : : #include <script/solver.h>
35 : : #include <uint256.h>
36 : : #include <undo.h>
37 : : #include <util/bip32.h>
38 : : #include <util/check.h>
39 : : #include <util/strencodings.h>
40 : : #include <util/string.h>
41 : : #include <util/vector.h>
42 : : #include <validation.h>
43 : : #include <validationinterface.h>
44 : :
45 : : #include <cstdint>
46 : : #include <numeric>
47 : :
48 : : #include <univalue.h>
49 : :
50 : : using node::AnalyzePSBT;
51 : : using node::FindCoins;
52 : : using node::GetTransaction;
53 : : using node::NodeContext;
54 : : using node::PSBTAnalysis;
55 : :
56 : : static constexpr decltype(CTransaction::version) DEFAULT_RAWTX_VERSION{CTransaction::CURRENT_VERSION};
57 : :
58 : 4305 : static void TxToJSON(const CTransaction& tx, const uint256 hashBlock, UniValue& entry,
59 : : Chainstate& active_chainstate, const CTxUndo* txundo = nullptr,
60 : : TxVerbosity verbosity = TxVerbosity::SHOW_DETAILS)
61 : : {
62 : 4305 : CHECK_NONFATAL(verbosity >= TxVerbosity::SHOW_DETAILS);
63 : : // Call into TxToUniv() in bitcoin-common to decode the transaction hex.
64 : : //
65 : : // Blockchain contextual information (confirmations and blocktime) is not
66 : : // available to code in bitcoin-common, so we query them here and push the
67 : : // data into the returned UniValue.
68 [ + - ]: 4305 : TxToUniv(tx, /*block_hash=*/uint256(), entry, /*include_hex=*/true, txundo, verbosity);
69 : :
70 [ + + ]: 8610 : if (!hashBlock.IsNull()) {
71 : 52 : LOCK(cs_main);
72 : :
73 [ + - + - : 104 : entry.pushKV("blockhash", hashBlock.GetHex());
+ - + - ]
74 [ + - ]: 52 : const CBlockIndex* pindex = active_chainstate.m_blockman.LookupBlockIndex(hashBlock);
75 [ + - ]: 52 : if (pindex) {
76 [ + + ]: 52 : if (active_chainstate.m_chain.Contains(*pindex)) {
77 [ - + + - : 98 : entry.pushKV("confirmations", 1 + active_chainstate.m_chain.Height() - pindex->nHeight);
+ - + - ]
78 [ + - + - : 98 : entry.pushKV("time", pindex->GetBlockTime());
+ - ]
79 [ + - + - : 98 : entry.pushKV("blocktime", pindex->GetBlockTime());
+ - ]
80 : : }
81 : : else
82 [ + - + - : 6 : entry.pushKV("confirmations", 0);
+ - ]
83 : : }
84 : 52 : }
85 : 4305 : }
86 : :
87 : 5311 : static std::vector<RPCArg> CreateTxDoc()
88 : : {
89 : 5311 : return {
90 [ + - + - ]: 10622 : {"inputs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The inputs",
91 : : {
92 [ + - + - ]: 10622 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
93 : : {
94 [ + - + - ]: 10622 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
95 [ + - + - ]: 10622 : {"vout", RPCArg::Type::NUM, RPCArg::Optional::NO, "The output number"},
96 [ + - + - : 15933 : {"sequence", RPCArg::Type::NUM, RPCArg::DefaultHint{"depends on the value of the 'replaceable' and 'locktime' arguments"}, "The sequence number"},
+ - ]
97 : : },
98 : : },
99 : : },
100 : : },
101 [ + - + - ]: 10622 : {"outputs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The outputs specified as key-value pairs.\n"
102 : : "Each key may only appear once, i.e. there can only be one 'data' output, and no address may be duplicated.\n"
103 : : "At least one output of either type must be specified.\n"
104 : : "For compatibility reasons, a dictionary, which holds the key-value pairs directly, is also\n"
105 : : " accepted as second parameter.",
106 : : {
107 [ + - + - ]: 10622 : {"", RPCArg::Type::OBJ_USER_KEYS, RPCArg::Optional::OMITTED, "",
108 : : {
109 [ + - + - ]: 10622 : {"address", RPCArg::Type::AMOUNT, RPCArg::Optional::NO, "A key-value pair. The key (string) is the bitcoin address, the value (float or string) is the amount in " + CURRENCY_UNIT},
110 : : },
111 : : },
112 [ + - + - ]: 10622 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
113 : : {
114 [ + - + - ]: 10622 : {"data", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "A key-value pair. The key must be \"data\", the value is hex-encoded data that becomes a part of an OP_RETURN output"},
115 : : },
116 : : },
117 : : },
118 [ + - ]: 5311 : RPCArgOptions{.skip_type_check = true}},
119 [ + - + - : 15933 : {"locktime", RPCArg::Type::NUM, RPCArg::Default{0}, "Raw locktime. Non-0 value also locktime-activates inputs"},
+ - ]
120 [ + - + - : 15933 : {"replaceable", RPCArg::Type::BOOL, RPCArg::Default{true}, "Marks this transaction as BIP125-replaceable.\n"
+ - ]
121 : : "Allows this transaction to be replaced by a transaction with higher fees. If provided, it is an error if explicit sequence numbers are incompatible."},
122 [ + - + - : 15933 : {"version", RPCArg::Type::NUM, RPCArg::Default{DEFAULT_RAWTX_VERSION}, "Transaction version"},
+ - ]
123 [ + - + - : 138086 : };
+ - + - +
- + - + +
+ + + + +
+ + + + +
- - - - -
- - - - -
- - ]
124 [ + - + - : 132775 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - ]
125 : :
126 : : // Update PSBT with information from the mempool, the UTXO set, the txindex, and the provided descriptors.
127 : : // Optionally, sign the inputs that we can using information from the descriptors.
128 : 19 : PartiallySignedTransaction ProcessPSBT(const std::string& psbt_string, const std::any& context, const HidingSigningProvider& provider, std::optional<int> sighash_type, bool finalize)
129 : : {
130 : : // Unserialize the transactions
131 : 19 : util::Result<PartiallySignedTransaction> psbt_res = DecodeBase64PSBT(psbt_string);
132 [ - + ]: 19 : if (!psbt_res) {
133 [ # # # # : 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", util::ErrorString(psbt_res).original));
# # ]
134 : : }
135 [ + - ]: 19 : PartiallySignedTransaction psbtx = *psbt_res;
136 : :
137 [ - + - - ]: 19 : if (g_txindex) g_txindex->BlockUntilSyncedToCurrentChain();
138 [ + - ]: 19 : const NodeContext& node = EnsureAnyNodeContext(context);
139 : :
140 : : // If we can't find the corresponding full transaction for all of our inputs,
141 : : // this will be used to find just the utxos for the segwit inputs for which
142 : : // the full transaction isn't found
143 : 19 : std::map<COutPoint, Coin> coins;
144 : :
145 : : // Fetch previous transactions:
146 : : // First, look in the txindex and the mempool
147 [ + + ]: 44 : for (PSBTInput& psbt_input : psbtx.inputs) {
148 : : // The `non_witness_utxo` is the whole previous transaction
149 [ + + ]: 25 : if (psbt_input.non_witness_utxo) continue;
150 : :
151 : 11 : CTransactionRef tx;
152 : :
153 : : // Look in the txindex
154 [ - + ]: 11 : if (g_txindex) {
155 : 0 : uint256 block_hash;
156 [ # # ]: 0 : g_txindex->FindTx(psbt_input.prev_txid, block_hash, tx);
157 : : }
158 : : // If we still don't have it look in the mempool
159 [ + - ]: 11 : if (!tx) {
160 [ + - - + ]: 22 : tx = node.mempool->get(psbt_input.prev_txid);
161 : : }
162 [ + + ]: 11 : if (tx) {
163 : 9 : psbt_input.non_witness_utxo = tx;
164 : : } else {
165 [ + - + - ]: 2 : coins[psbt_input.GetOutPoint()]; // Create empty map entry keyed by prevout
166 : : }
167 : 11 : }
168 : :
169 : : // If we still haven't found all of the inputs, look for the missing ones in the utxo set
170 [ + + ]: 19 : if (!coins.empty()) {
171 [ + - ]: 1 : FindCoins(node, coins);
172 [ + + ]: 3 : for (PSBTInput& input : psbtx.inputs) {
173 : : // If there are still missing utxos, add them if they were found in the utxo set
174 [ + - ]: 2 : if (!input.non_witness_utxo) {
175 [ + - + - ]: 2 : const Coin& coin = coins.at(input.GetOutPoint());
176 [ - + - - : 2 : if (!coin.out.IsNull() && IsSegWitOutput(provider, coin.out.scriptPubKey)) {
- - ]
177 : 0 : input.witness_utxo = coin.out;
178 : : }
179 : : }
180 : : }
181 : : }
182 : :
183 [ + - ]: 19 : std::optional<PrecomputedTransactionData> txdata_res = PrecomputePSBTData(psbtx);
184 [ - + ]: 19 : if (!txdata_res) {
185 [ # # ]: 0 : throw JSONRPCPSBTError(common::PSBTError::INVALID_TX);
186 : : }
187 : : const PrecomputedTransactionData& txdata = *txdata_res;
188 : :
189 [ - + + + ]: 37 : for (unsigned int i = 0; i < psbtx.inputs.size(); ++i) {
190 [ + - + - : 25 : if (PSBTInputSigned(psbtx.inputs.at(i))) {
- + ]
191 : 0 : continue;
192 : : }
193 : :
194 : : // Update script/keypath information using descriptor data.
195 : : // Note that SignPSBTInput does a lot more than just constructing ECDSA signatures.
196 : : // We only actually care about those if our signing provider doesn't hide private
197 : : // information, as is the case with `descriptorprocesspsbt`
198 : : // Only error for mismatching sighash types as it is critical that the sighash to sign with matches the PSBT's
199 [ + - + + ]: 25 : if (SignPSBTInput(provider, psbtx, /*index=*/i, &txdata, {.sighash_type = sighash_type, .finalize = finalize}, /*out_sigdata=*/nullptr) == common::PSBTError::SIGHASH_MISMATCH) {
200 [ + - ]: 7 : throw JSONRPCPSBTError(common::PSBTError::SIGHASH_MISMATCH);
201 : : }
202 : : }
203 : :
204 : : // Update script/keypath information using descriptor data.
205 [ - + + + ]: 31 : for (unsigned int i = 0; i < psbtx.outputs.size(); ++i) {
206 [ + - ]: 19 : UpdatePSBTOutput(provider, psbtx, i);
207 : : }
208 : :
209 [ + - ]: 12 : RemoveUnnecessaryTransactions(psbtx);
210 : :
211 : 12 : return psbtx;
212 : 26 : }
213 : :
214 : 6773 : static RPCMethod getrawtransaction()
215 : : {
216 : 6773 : return RPCMethod{
217 : 6773 : "getrawtransaction",
218 : :
219 [ + - ]: 13546 : "By default, this call only returns a transaction if it is in the mempool. If -txindex is enabled\n"
220 : : "and no blockhash argument is passed, it will return the transaction if it is in the mempool or any block.\n"
221 : : "If a blockhash argument is passed, it will return the transaction if\n"
222 : : "the specified block is available and the transaction is in that block.\n\n"
223 : : "Hint: Use gettransaction for wallet transactions.\n\n"
224 : :
225 : : "If verbosity is 0 or omitted, returns the serialized transaction as a hex-encoded string.\n"
226 : : "If verbosity is 1, returns a JSON Object with information about the transaction.\n"
227 : : "If verbosity is 2, returns a JSON Object with information about the transaction, including fee and prevout information.",
228 : : {
229 [ + - + - ]: 13546 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
230 [ + - + - : 20319 : {"verbosity|verbose", RPCArg::Type::NUM, RPCArg::Default{0}, "0 for hex-encoded data, 1 for a JSON object, and 2 for JSON object with fee and prevout",
+ - ]
231 [ + - ]: 13546 : RPCArgOptions{.skip_type_check = true}},
232 [ + - + - ]: 13546 : {"blockhash", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "The block in which to look for the transaction"},
233 : : },
234 : : {
235 [ + - ]: 6773 : RPCResult{"if verbosity is not set or set to 0",
236 [ + - + - ]: 13546 : RPCResult::Type::STR, "data", "The serialized transaction as a hex-encoded string for 'txid'"
237 : 6773 : },
238 [ + - ]: 13546 : RPCResult{"if verbosity is set to 1",
239 [ + - + - ]: 13546 : RPCResult::Type::OBJ, "", "",
240 [ + - + - : 94822 : Cat<std::vector<RPCResult>>(
+ + - - ]
241 : : {
242 [ + - + - ]: 13546 : {RPCResult::Type::BOOL, "in_active_chain", /*optional=*/true, "Whether specified block is in the active chain or not (only present with explicit \"blockhash\" argument)"},
243 [ + - + - ]: 13546 : {RPCResult::Type::STR_HEX, "blockhash", /*optional=*/true, "the block hash"},
244 [ + - + - ]: 13546 : {RPCResult::Type::NUM, "confirmations", /*optional=*/true, "The confirmations"},
245 [ + - + - ]: 13546 : {RPCResult::Type::NUM_TIME, "blocktime", /*optional=*/true, "The block time expressed in " + UNIX_EPOCH_TIME},
246 [ + - + - ]: 13546 : {RPCResult::Type::NUM, "time", /*optional=*/true, "Same as \"blocktime\""},
247 [ + - + - ]: 13546 : {RPCResult::Type::STR_HEX, "hex", "The serialized, hex-encoded data for 'txid'"},
248 : : },
249 : 13546 : TxDoc({.txid_field_doc="The transaction id (same as provided)"})),
250 : : },
251 [ + - ]: 13546 : RPCResult{"for verbosity = 2",
252 [ + - + - ]: 13546 : RPCResult::Type::OBJ, "", "",
253 : : {
254 [ + - + - ]: 13546 : {RPCResult::Type::ELISION, "", "Same output as verbosity = 1"},
255 [ + - + - ]: 13546 : {RPCResult::Type::NUM, "fee", /*optional=*/true, "transaction fee in " + CURRENCY_UNIT + ", omitted if block undo data is not available"},
256 [ + - + - ]: 13546 : {RPCResult::Type::ARR, "vin", "",
257 : : {
258 [ + - + - ]: 13546 : {RPCResult::Type::OBJ, "", "utxo being spent",
259 : : {
260 [ + - + - ]: 13546 : {RPCResult::Type::ELISION, "", "Same output as verbosity = 1"},
261 [ + - + - ]: 13546 : {RPCResult::Type::OBJ, "prevout", /*optional=*/true, "The previous output, omitted if block undo data is not available",
262 : : {
263 [ + - + - ]: 13546 : {RPCResult::Type::BOOL, "generated", "Coinbase or not"},
264 [ + - + - ]: 13546 : {RPCResult::Type::NUM, "height", "The height of the prevout"},
265 [ + - + - ]: 13546 : {RPCResult::Type::STR_AMOUNT, "value", "The value in " + CURRENCY_UNIT},
266 [ + - + - : 13546 : {RPCResult::Type::OBJ, "scriptPubKey", "", ScriptPubKeyDoc()},
+ - ]
267 : : }},
268 : : }},
269 : : }},
270 [ + - + - : 162552 : }},
+ - + - +
+ + + + +
+ + - - -
- - - -
- ]
271 : : },
272 : 6773 : RPCExamples{
273 [ + - + - : 13546 : HelpExampleCli("getrawtransaction", "\"mytxid\"")
+ - ]
274 [ + - + - : 27092 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 1")
+ - + - ]
275 [ + - + - : 27092 : + HelpExampleRpc("getrawtransaction", "\"mytxid\", 1")
+ - + - ]
276 [ + - + - : 27092 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 0 \"myblockhash\"")
+ - + - ]
277 [ + - + - : 27092 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 1 \"myblockhash\"")
+ - + - ]
278 [ + - + - : 27092 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 2 \"myblockhash\"")
+ - ]
279 [ + - ]: 6773 : },
280 : 6773 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
281 : : {
282 : 4381 : const NodeContext& node = EnsureAnyNodeContext(request.context);
283 : 4381 : ChainstateManager& chainman = EnsureChainman(node);
284 : :
285 [ + + ]: 4381 : auto txid{Txid::FromUint256(ParseHashV(request.params[0], "parameter 1"))};
286 : 4380 : const CBlockIndex* blockindex = nullptr;
287 : :
288 [ + + ]: 4380 : if (txid.ToUint256() == chainman.GetParams().GenesisBlock().hashMerkleRoot) {
289 : : // Special exception for the genesis block coinbase transaction
290 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "The genesis block coinbase is not considered an ordinary transaction and cannot be retrieved");
291 : : }
292 : :
293 : 4379 : int verbosity{ParseVerbosity(request.params[1], /*default_verbosity=*/0, /*allow_bool=*/true)};
294 : :
295 [ + + ]: 4367 : if (!request.params[2].isNull()) {
296 : 41 : LOCK(cs_main);
297 : :
298 [ + - + + ]: 41 : uint256 blockhash = ParseHashV(request.params[2], "parameter 3");
299 [ + - ]: 35 : blockindex = chainman.m_blockman.LookupBlockIndex(blockhash);
300 [ + + ]: 35 : if (!blockindex) {
301 [ + - + - ]: 4 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Block hash not found");
302 : : }
303 : 41 : }
304 : :
305 : 4359 : bool f_txindex_ready = false;
306 [ + + + + ]: 4359 : if (g_txindex && !blockindex) {
307 : 33 : f_txindex_ready = g_txindex->BlockUntilSyncedToCurrentChain();
308 : : }
309 : :
310 : 4359 : uint256 hash_block;
311 : 4359 : const CTransactionRef tx = GetTransaction(blockindex, node.mempool.get(), txid, chainman.m_blockman, hash_block);
312 [ + + ]: 4359 : if (!tx) {
313 [ + + ]: 9 : std::string errmsg;
314 [ + + ]: 9 : if (blockindex) {
315 [ + - + - ]: 4 : const bool block_has_data = WITH_LOCK(::cs_main, return blockindex->nStatus & BLOCK_HAVE_DATA);
316 [ - + ]: 2 : if (!block_has_data) {
317 [ # # # # ]: 0 : throw JSONRPCError(RPC_MISC_ERROR, "Block not available");
318 : : }
319 [ + - ]: 2 : errmsg = "No such transaction found in the provided block";
320 [ + - ]: 7 : } else if (!g_txindex) {
321 [ + - ]: 7 : errmsg = "No such mempool transaction. Use -txindex or provide a block hash to enable blockchain transaction queries";
322 [ # # ]: 0 : } else if (!f_txindex_ready) {
323 [ # # ]: 0 : errmsg = "No such mempool transaction. Blockchain transactions are still in the process of being indexed";
324 : : } else {
325 [ # # ]: 0 : errmsg = "No such mempool or blockchain transaction";
326 : : }
327 [ + - + - ]: 18 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, errmsg + ". Use gettransaction for wallet transactions.");
328 : 9 : }
329 : :
330 [ + + ]: 4350 : if (verbosity <= 0) {
331 [ + - + - ]: 90 : return EncodeHexTx(*tx);
332 : : }
333 : :
334 : 4305 : UniValue result(UniValue::VOBJ);
335 [ + + ]: 4305 : if (blockindex) {
336 [ + - ]: 30 : LOCK(cs_main);
337 [ + - + - : 60 : result.pushKV("in_active_chain", chainman.ActiveChain().Contains(*blockindex));
+ - + - +
- ]
338 : 30 : }
339 : : // If request is verbosity >= 1 but no blockhash was given, then look up the blockindex
340 [ + - + + ]: 4305 : if (request.params[2].isNull()) {
341 [ + - ]: 4275 : LOCK(cs_main);
342 [ + - + - ]: 4275 : blockindex = chainman.m_blockman.LookupBlockIndex(hash_block); // May be nullptr for mempool transactions
343 : 4275 : }
344 [ + + ]: 4305 : if (verbosity == 1) {
345 [ + - + - ]: 4298 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate());
346 : 4298 : return result;
347 : : }
348 : :
349 : 7 : CBlockUndo blockUndo;
350 : 7 : CBlock block;
351 : :
352 [ + + + + : 12 : if (tx->IsCoinBase() || !blockindex || WITH_LOCK(::cs_main, return !(blockindex->nStatus & BLOCK_HAVE_MASK))) {
+ - + - +
- ]
353 [ + - + - ]: 2 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate());
354 : 2 : return result;
355 : : }
356 [ + - - + ]: 5 : if (!chainman.m_blockman.ReadBlockUndo(blockUndo, *blockindex)) {
357 [ # # # # ]: 0 : throw JSONRPCError(RPC_INTERNAL_ERROR, "Undo data expected but can't be read. This could be due to disk corruption or a conflict with a pruning event.");
358 : : }
359 [ + - - + ]: 5 : if (!chainman.m_blockman.ReadBlock(block, *blockindex)) {
360 [ # # # # ]: 0 : throw JSONRPCError(RPC_INTERNAL_ERROR, "Block data expected but can't be read. This could be due to disk corruption or a conflict with a pruning event.");
361 : : }
362 : :
363 : 5 : CTxUndo* undoTX {nullptr};
364 [ + - + - : 55 : auto it = std::find_if(block.vtx.begin(), block.vtx.end(), [tx](CTransactionRef t){ return *t == *tx; });
+ - + - +
- + - + -
+ - + - ]
365 [ + - ]: 5 : if (it != block.vtx.end()) {
366 : : // -1 as blockundo does not have coinbase tx
367 [ + - ]: 5 : undoTX = &blockUndo.vtxundo.at(it - block.vtx.begin() - 1);
368 : : }
369 [ + - + - ]: 5 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate(), undoTX, TxVerbosity::SHOW_DETAILS_AND_PREVOUT);
370 : 5 : return result;
371 : 8655 : },
372 [ + - + - : 88049 : };
+ - + - +
+ + + - -
- - ]
373 [ + - + - : 298012 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - -
- - - - -
- - - - -
- ]
374 : :
375 : 2856 : static RPCMethod createrawtransaction()
376 : : {
377 : 2856 : return RPCMethod{
378 : 2856 : "createrawtransaction",
379 [ + - ]: 5712 : "Create a transaction spending the given inputs and creating new outputs.\n"
380 : : "Outputs can be addresses or data.\n"
381 : : "Returns hex-encoded raw transaction.\n"
382 : : "Note that the transaction's inputs are not signed, and\n"
383 : : "it is not stored in the wallet or transmitted to the network.\n",
384 [ + - ]: 5712 : CreateTxDoc(),
385 [ + - ]: 5712 : RPCResult{
386 [ + - + - ]: 5712 : RPCResult::Type::STR_HEX, "transaction", "hex string of the transaction"
387 [ + - ]: 5712 : },
388 : 2856 : RPCExamples{
389 [ + - + - : 5712 : HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"address\\\":0.01}]\"")
+ - ]
390 [ + - + - : 11424 : + HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"data\\\":\\\"00010203\\\"}]\"")
+ - + - ]
391 [ + - + - : 11424 : + HelpExampleRpc("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\", \"[{\\\"address\\\":0.01}]\"")
+ - + - ]
392 [ + - + - : 11424 : + HelpExampleRpc("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\", \"[{\\\"data\\\":\\\"00010203\\\"}]\"")
+ - + - ]
393 [ + - ]: 2856 : },
394 : 2856 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
395 : : {
396 : 458 : std::optional<bool> rbf;
397 [ + + ]: 458 : if (!request.params[3].isNull()) {
398 : 12 : rbf = request.params[3].get_bool();
399 : : }
400 : 458 : CMutableTransaction rawTx = ConstructTransaction(request.params[0], request.params[1], request.params[2], rbf, self.Arg<uint32_t>("version"));
401 : :
402 [ + - + - : 1290 : return EncodeHexTx(CTransaction(rawTx));
+ - ]
403 : 430 : },
404 [ + - ]: 5712 : };
405 : : }
406 : :
407 : 6537 : static RPCMethod decoderawtransaction()
408 : : {
409 : 6537 : return RPCMethod{"decoderawtransaction",
410 [ + - ]: 13074 : "Return a JSON object representing the serialized, hex-encoded transaction.",
411 : : {
412 [ + - + - ]: 13074 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction hex string"},
413 [ + - + - : 19611 : {"iswitness", RPCArg::Type::BOOL, RPCArg::DefaultHint{"depends on heuristic tests"}, "Whether the transaction hex is a serialized witness transaction.\n"
+ - ]
414 : : "If iswitness is not present, heuristic tests will be used in decoding.\n"
415 : : "If true, only witness deserialization will be tried.\n"
416 : : "If false, only non-witness deserialization will be tried.\n"
417 : : "This boolean should reflect whether the transaction has inputs\n"
418 : : "(e.g. fully valid, or on-chain transactions), if known by the caller."
419 : : },
420 : : },
421 [ + - ]: 13074 : RPCResult{
422 [ + - + - ]: 13074 : RPCResult::Type::OBJ, "", "",
423 : 13074 : TxDoc(),
424 [ + - ]: 13074 : },
425 : 6537 : RPCExamples{
426 [ + - + - : 13074 : HelpExampleCli("decoderawtransaction", "\"hexstring\"")
+ - ]
427 [ + - + - : 26148 : + HelpExampleRpc("decoderawtransaction", "\"hexstring\"")
+ - + - ]
428 [ + - ]: 6537 : },
429 : 6537 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
430 : : {
431 : 4146 : CMutableTransaction mtx;
432 : :
433 [ + - + + : 4146 : bool try_witness = request.params[1].isNull() ? true : request.params[1].get_bool();
+ - + - ]
434 [ + - + + : 4146 : bool try_no_witness = request.params[1].isNull() ? true : !request.params[1].get_bool();
+ - + - ]
435 : :
436 [ + - + - : 4146 : if (!DecodeHexTx(mtx, request.params[0].get_str(), try_no_witness, try_witness)) {
+ - + + ]
437 [ + - + - ]: 14 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed");
438 : : }
439 : :
440 : 4139 : UniValue result(UniValue::VOBJ);
441 [ + - + - ]: 8278 : TxToUniv(CTransaction(std::move(mtx)), /*block_hash=*/uint256(), /*entry=*/result, /*include_hex=*/false);
442 : :
443 : 4139 : return result;
444 : 4139 : },
445 [ + - + - : 39222 : };
+ + - - ]
446 [ + - + - : 32685 : }
+ - + - -
- ]
447 : :
448 : 2420 : static RPCMethod decodescript()
449 : : {
450 : 2420 : return RPCMethod{
451 : 2420 : "decodescript",
452 [ + - ]: 4840 : "Decode a hex-encoded script.\n",
453 : : {
454 [ + - + - ]: 4840 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "the hex-encoded script"},
455 : : },
456 [ + - ]: 4840 : RPCResult{
457 [ + - + - ]: 4840 : RPCResult::Type::OBJ, "", "",
458 : : {
459 [ + - + - ]: 4840 : {RPCResult::Type::STR, "asm", "Disassembly of the script"},
460 [ + - + - ]: 4840 : {RPCResult::Type::STR, "desc", "Inferred descriptor for the script"},
461 [ + - + - : 4840 : {RPCResult::Type::STR, "type", "The output type (e.g. " + GetAllOutputTypes() + ")"},
+ - ]
462 [ + - + - ]: 4840 : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
463 [ + - ]: 4840 : {RPCResult::Type::STR, "p2sh", /*optional=*/true,
464 [ + - ]: 4840 : "address of P2SH script wrapping this redeem script (not returned for types that should not be wrapped)"},
465 [ + - ]: 4840 : {RPCResult::Type::OBJ, "segwit", /*optional=*/true,
466 [ + - ]: 4840 : "Result of a witness output script wrapping this redeem script (not returned for types that should not be wrapped)",
467 : : {
468 [ + - + - ]: 4840 : {RPCResult::Type::STR, "asm", "Disassembly of the output script"},
469 [ + - + - ]: 4840 : {RPCResult::Type::STR_HEX, "hex", "The raw output script bytes, hex-encoded"},
470 [ + - + - ]: 4840 : {RPCResult::Type::STR, "type", "The type of the output script (e.g. witness_v0_keyhash or witness_v0_scripthash)"},
471 [ + - + - ]: 4840 : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
472 [ + - + - ]: 4840 : {RPCResult::Type::STR, "desc", "Inferred descriptor for the script"},
473 [ + - + - ]: 4840 : {RPCResult::Type::STR, "p2sh-segwit", "address of the P2SH script wrapping this witness redeem script"},
474 : : }},
475 : : },
476 [ + - + - : 65340 : },
+ - + + +
+ - - -
- ]
477 : 2420 : RPCExamples{
478 [ + - + - : 4840 : HelpExampleCli("decodescript", "\"hexstring\"")
+ - ]
479 [ + - + - : 9680 : + HelpExampleRpc("decodescript", "\"hexstring\"")
+ - + - ]
480 [ + - ]: 2420 : },
481 : 2420 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
482 : : {
483 : 31 : UniValue r(UniValue::VOBJ);
484 : 31 : CScript script;
485 [ + - + - : 31 : if (request.params[0].get_str().size() > 0){
- + + - ]
486 [ + - + - ]: 31 : std::vector<unsigned char> scriptData(ParseHexV(request.params[0], "argument"));
487 : 31 : script = CScript(scriptData.begin(), scriptData.end());
488 : 31 : } else {
489 : : // Empty scripts are valid
490 : : }
491 [ + - ]: 31 : ScriptToUniv(script, /*out=*/r, /*include_hex=*/false, /*include_address=*/true);
492 : :
493 : 31 : std::vector<std::vector<unsigned char>> solutions_data;
494 [ + - ]: 31 : const TxoutType which_type{Solver(script, solutions_data)};
495 : :
496 : 62 : const bool can_wrap{[&] {
497 [ + + ]: 31 : switch (which_type) {
498 : : case TxoutType::MULTISIG:
499 : : case TxoutType::NONSTANDARD:
500 : : case TxoutType::PUBKEY:
501 : : case TxoutType::PUBKEYHASH:
502 : : case TxoutType::WITNESS_V0_KEYHASH:
503 : : case TxoutType::WITNESS_V0_SCRIPTHASH:
504 : : // Can be wrapped if the checks below pass
505 : : break;
506 : : case TxoutType::NULL_DATA:
507 : : case TxoutType::SCRIPTHASH:
508 : : case TxoutType::WITNESS_UNKNOWN:
509 : : case TxoutType::WITNESS_V1_TAPROOT:
510 : : case TxoutType::ANCHOR:
511 : : // Should not be wrapped
512 : : return false;
513 : : } // no default case, so the compiler can warn about missing cases
514 [ + + + - ]: 21 : if (!script.HasValidOps() || script.IsUnspendable()) {
515 : : return false;
516 : : }
517 [ + + + + ]: 130 : for (CScript::const_iterator it{script.begin()}; it != script.end();) {
518 : 95 : opcodetype op;
519 : 95 : CHECK_NONFATAL(script.GetOp(it, op));
520 [ + - + + : 96 : if (op == OP_CHECKSIGADD || IsOpSuccess(op)) {
+ + ]
521 : : return false;
522 : : }
523 : : }
524 : : return true;
525 [ + - ]: 31 : }()};
526 : :
527 [ + + ]: 31 : if (can_wrap) {
528 [ + - + - : 34 : r.pushKV("p2sh", EncodeDestination(ScriptHash(script)));
+ - + - +
- ]
529 : : // P2SH and witness programs cannot be wrapped in P2WSH, if this script
530 : : // is a witness program, don't return addresses for a segwit programs.
531 : 34 : const bool can_wrap_P2WSH{[&] {
532 [ + + - + ]: 17 : switch (which_type) {
533 : 4 : case TxoutType::MULTISIG:
534 : 4 : case TxoutType::PUBKEY:
535 : : // Uncompressed pubkeys cannot be used with segwit checksigs.
536 : : // If the script contains an uncompressed pubkey, skip encoding of a segwit program.
537 [ + + ]: 12 : for (const auto& solution : solutions_data) {
538 [ - + + + : 10 : if ((solution.size() != 1) && !CPubKey(solution).IsCompressed()) {
+ + ]
539 : : return false;
540 : : }
541 : : }
542 : : return true;
543 : : case TxoutType::NONSTANDARD:
544 : : case TxoutType::PUBKEYHASH:
545 : : // Can be P2WSH wrapped
546 : : return true;
547 : 3 : case TxoutType::NULL_DATA:
548 : 3 : case TxoutType::SCRIPTHASH:
549 : 3 : case TxoutType::WITNESS_UNKNOWN:
550 : 3 : case TxoutType::WITNESS_V0_KEYHASH:
551 : 3 : case TxoutType::WITNESS_V0_SCRIPTHASH:
552 : 3 : case TxoutType::WITNESS_V1_TAPROOT:
553 : 3 : case TxoutType::ANCHOR:
554 : : // Should not be wrapped
555 : 3 : return false;
556 : : } // no default case, so the compiler can warn about missing cases
557 [ # # ]: 0 : NONFATAL_UNREACHABLE();
558 [ + - ]: 17 : }()};
559 [ + + ]: 17 : if (can_wrap_P2WSH) {
560 : 12 : UniValue sr(UniValue::VOBJ);
561 : 12 : CScript segwitScr;
562 : 12 : FlatSigningProvider provider;
563 [ + + ]: 12 : if (which_type == TxoutType::PUBKEY) {
564 [ + - + - ]: 2 : segwitScr = GetScriptForDestination(WitnessV0KeyHash(Hash160(solutions_data[0])));
565 [ + + ]: 11 : } else if (which_type == TxoutType::PUBKEYHASH) {
566 [ - + + - ]: 2 : segwitScr = GetScriptForDestination(WitnessV0KeyHash(uint160{solutions_data[0]}));
567 : : } else {
568 : : // Scripts that are not fit for P2WPKH are encoded as P2WSH.
569 [ + - + - ]: 10 : provider.scripts[CScriptID(script)] = script;
570 [ + - + - ]: 20 : segwitScr = GetScriptForDestination(WitnessV0ScriptHash(script));
571 : : }
572 [ + - ]: 12 : ScriptToUniv(segwitScr, /*out=*/sr, /*include_hex=*/true, /*include_address=*/true, /*provider=*/&provider);
573 [ + - + - : 24 : sr.pushKV("p2sh-segwit", EncodeDestination(ScriptHash(segwitScr)));
+ - + - +
- ]
574 [ + - + - ]: 24 : r.pushKV("segwit", std::move(sr));
575 : 12 : }
576 : : }
577 : :
578 : 62 : return r;
579 : 31 : },
580 [ + - + - : 12100 : };
+ + - - ]
581 [ + - + - : 62920 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- ]
582 : :
583 : 2469 : static RPCMethod combinerawtransaction()
584 : : {
585 : 2469 : return RPCMethod{
586 : 2469 : "combinerawtransaction",
587 [ + - ]: 4938 : "Combine multiple partially signed transactions into one transaction.\n"
588 : : "The combined transaction may be another partially signed transaction or a \n"
589 : : "fully signed transaction.",
590 : : {
591 [ + - + - ]: 4938 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The hex strings of partially signed transactions",
592 : : {
593 [ + - + - ]: 4938 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "A hex-encoded raw transaction"},
594 : : },
595 : : },
596 : : },
597 [ + - ]: 4938 : RPCResult{
598 [ + - + - ]: 4938 : RPCResult::Type::STR, "", "The hex-encoded raw transaction with signature(s)"
599 [ + - ]: 4938 : },
600 : 2469 : RPCExamples{
601 [ + - + - : 4938 : HelpExampleCli("combinerawtransaction", R"('["myhex1", "myhex2", "myhex3"]')")
+ - ]
602 [ + - ]: 2469 : },
603 : 2469 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
604 : : {
605 : :
606 : 80 : UniValue txs = request.params[0].get_array();
607 [ - + + - ]: 80 : std::vector<CMutableTransaction> txVariants(txs.size());
608 : :
609 [ - + + + ]: 180 : for (unsigned int idx = 0; idx < txs.size(); idx++) {
610 [ + - + - : 120 : if (!DecodeHexTx(txVariants[idx], txs[idx].get_str())) {
+ - + + ]
611 [ + - + - ]: 40 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed for tx %d. Make sure the tx has at least one input.", idx));
612 : : }
613 : : }
614 : :
615 [ + + ]: 60 : if (txVariants.empty()) {
616 [ + - + - ]: 40 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "Missing transactions");
617 : : }
618 : :
619 : : // mergedTx will end up with all the signatures; it
620 : : // starts as a clone of the rawtx:
621 [ + - ]: 40 : CMutableTransaction mergedTx(txVariants[0]);
622 : :
623 : : // Fetch previous transactions (inputs):
624 [ + - + - ]: 40 : CCoinsViewCache view{&CoinsViewEmpty::Get()};
625 : 40 : {
626 [ + - ]: 40 : NodeContext& node = EnsureAnyNodeContext(request.context);
627 [ + - ]: 40 : const CTxMemPool& mempool = EnsureMemPool(node);
628 [ + - ]: 40 : ChainstateManager& chainman = EnsureChainman(node);
629 [ + - + - ]: 40 : LOCK2(cs_main, mempool.cs);
630 [ + - + - ]: 40 : CCoinsViewCache &viewChain = chainman.ActiveChainstate().CoinsTip();
631 [ + - ]: 40 : CCoinsViewMemPool viewMempool(&viewChain, mempool);
632 : 40 : view.SetBackend(viewMempool); // temporarily switch cache backend to db+mempool view
633 : :
634 [ + + ]: 80 : for (const CTxIn& txin : mergedTx.vin) {
635 [ + - ]: 40 : view.AccessCoin(txin.prevout); // Load entries from viewChain into view; can fail.
636 : : }
637 : :
638 [ + - ]: 40 : view.SetBackend(CoinsViewEmpty::Get()); // switch back to avoid locking mempool for too long
639 [ + - + - ]: 80 : }
640 : :
641 : : // Use CTransaction for the constant parts of the
642 : : // transaction to avoid rehashing.
643 [ + - ]: 40 : const CTransaction txConst(mergedTx);
644 : : // Sign what we can:
645 [ - + + + ]: 60 : for (unsigned int i = 0; i < mergedTx.vin.size(); i++) {
646 [ + - ]: 40 : CTxIn& txin = mergedTx.vin[i];
647 [ + - ]: 40 : const Coin& coin = view.AccessCoin(txin.prevout);
648 [ + + ]: 40 : if (coin.IsSpent()) {
649 [ + - + - ]: 40 : throw JSONRPCError(RPC_VERIFY_ERROR, "Input not found or already spent");
650 : : }
651 : 20 : SignatureData sigdata;
652 : :
653 : : // ... and merge in other signatures:
654 [ + + ]: 60 : for (const CMutableTransaction& txv : txVariants) {
655 [ - + + - ]: 40 : if (txv.vin.size() > i) {
656 [ + - + - ]: 40 : sigdata.MergeSignatureData(DataFromTransaction(txv, i, coin.out));
657 : : }
658 : : }
659 [ + - + - ]: 20 : ProduceSignature(DUMMY_SIGNING_PROVIDER, MutableTransactionSignatureCreator(mergedTx, i, coin.out.nValue, {.sighash_type = SIGHASH_ALL}), coin.out.scriptPubKey, sigdata);
660 : :
661 [ + - ]: 20 : UpdateInput(txin, sigdata);
662 : 20 : }
663 : :
664 [ + - + - : 80 : return EncodeHexTx(CTransaction(mergedTx));
+ - ]
665 : 180 : },
666 [ + - + - : 19752 : };
+ - + + +
+ - - -
- ]
667 [ + - + - ]: 9876 : }
668 : :
669 : 2567 : static RPCMethod signrawtransactionwithkey()
670 : : {
671 : 2567 : return RPCMethod{
672 : 2567 : "signrawtransactionwithkey",
673 [ + - ]: 5134 : "Sign inputs for raw transaction (serialized, hex-encoded).\n"
674 : : "The second argument is an array of base58-encoded private\n"
675 : : "keys that will be the only keys used to sign the transaction.\n"
676 : : "The third optional argument (may be null) is an array of previous transaction outputs that\n"
677 : : "this transaction depends on but may not yet be in the block chain.\n",
678 : : {
679 [ + - + - ]: 5134 : {"hexstring", RPCArg::Type::STR, RPCArg::Optional::NO, "The transaction hex string"},
680 [ + - + - ]: 5134 : {"privkeys", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base58-encoded private keys for signing",
681 : : {
682 [ + - + - ]: 5134 : {"privatekey", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "private key in base58-encoding"},
683 : : },
684 : : },
685 [ + - + - ]: 5134 : {"prevtxs", RPCArg::Type::ARR, RPCArg::Optional::OMITTED, "The previous dependent transaction outputs",
686 : : {
687 [ + - + - ]: 5134 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
688 : : {
689 [ + - + - ]: 5134 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
690 [ + - + - ]: 5134 : {"vout", RPCArg::Type::NUM, RPCArg::Optional::NO, "The output number"},
691 [ + - + - ]: 5134 : {"scriptPubKey", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "output script"},
692 [ + - + - ]: 5134 : {"redeemScript", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "(required for P2SH) redeem script"},
693 [ + - + - ]: 5134 : {"witnessScript", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "(required for P2WSH or P2SH-P2WSH) witness script"},
694 [ + - + - ]: 5134 : {"amount", RPCArg::Type::AMOUNT, RPCArg::Optional::OMITTED, "(required for Segwit inputs) the amount spent"},
695 : : },
696 : : },
697 : : },
698 : : },
699 [ + - + - : 7701 : {"sighashtype", RPCArg::Type::STR, RPCArg::Default{"DEFAULT for Taproot, ALL otherwise"}, "The signature hash type. Must be one of:\n"
+ - ]
700 : : " \"DEFAULT\"\n"
701 : : " \"ALL\"\n"
702 : : " \"NONE\"\n"
703 : : " \"SINGLE\"\n"
704 : : " \"ALL|ANYONECANPAY\"\n"
705 : : " \"NONE|ANYONECANPAY\"\n"
706 : : " \"SINGLE|ANYONECANPAY\"\n"
707 : : },
708 : : },
709 [ + - ]: 5134 : RPCResult{
710 [ + - + - ]: 5134 : RPCResult::Type::OBJ, "", "",
711 : : {
712 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "hex", "The hex-encoded raw transaction with signature(s)"},
713 [ + - + - ]: 5134 : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
714 [ + - + - ]: 5134 : {RPCResult::Type::ARR, "errors", /*optional=*/true, "Script verification errors (if there are any)",
715 : : {
716 [ + - + - ]: 5134 : {RPCResult::Type::OBJ, "", "",
717 : : {
718 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "txid", "The hash of the referenced, previous transaction"},
719 [ + - + - ]: 5134 : {RPCResult::Type::NUM, "vout", "The index of the output to spent and used as input"},
720 [ + - + - ]: 5134 : {RPCResult::Type::ARR, "witness", "",
721 : : {
722 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "witness", ""},
723 : : }},
724 [ + - + - ]: 5134 : {RPCResult::Type::STR_HEX, "scriptSig", "The hex-encoded signature script"},
725 [ + - + - ]: 5134 : {RPCResult::Type::NUM, "sequence", "Script sequence number"},
726 [ + - + - ]: 5134 : {RPCResult::Type::STR, "error", "Verification or signing error related to the input"},
727 : : }},
728 : : }},
729 : : }
730 [ + - + - : 69309 : },
+ - + - +
- + + + +
+ + + + -
- - - - -
- - ]
731 : 2567 : RPCExamples{
732 [ + - + - : 5134 : HelpExampleCli("signrawtransactionwithkey", "\"myhex\" \"[\\\"key1\\\",\\\"key2\\\"]\"")
+ - ]
733 [ + - + - : 10268 : + HelpExampleRpc("signrawtransactionwithkey", "\"myhex\", \"[\\\"key1\\\",\\\"key2\\\"]\"")
+ - + - ]
734 [ + - ]: 2567 : },
735 : 2567 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
736 : : {
737 : 178 : CMutableTransaction mtx;
738 [ + - + - : 178 : if (!DecodeHexTx(mtx, request.params[0].get_str())) {
+ - + + ]
739 [ + - + - ]: 2 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed. Make sure the tx has at least one input.");
740 : : }
741 : :
742 : 177 : FlatSigningProvider keystore;
743 [ + - + - ]: 177 : const UniValue& keys = request.params[1].get_array();
744 [ - + + + ]: 1032 : for (unsigned int idx = 0; idx < keys.size(); ++idx) {
745 [ + - + - ]: 856 : UniValue k = keys[idx];
746 [ + - + - ]: 856 : CKey key = DecodeSecret(k.get_str());
747 [ + + ]: 856 : if (!key.IsValid()) {
748 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Invalid private key");
749 : : }
750 : :
751 [ + - ]: 855 : CPubKey pubkey = key.GetPubKey();
752 [ + - ]: 855 : CKeyID key_id = pubkey.GetID();
753 [ + - ]: 855 : keystore.pubkeys.emplace(key_id, pubkey);
754 [ + - ]: 855 : keystore.keys.emplace(key_id, key);
755 : 856 : }
756 : :
757 : : // Fetch previous transactions (inputs):
758 : 176 : std::map<COutPoint, Coin> coins;
759 [ + + ]: 356 : for (const CTxIn& txin : mtx.vin) {
760 [ + - ]: 180 : coins[txin.prevout]; // Create empty map entry keyed by prevout.
761 : : }
762 [ + - ]: 176 : NodeContext& node = EnsureAnyNodeContext(request.context);
763 [ + - ]: 176 : FindCoins(node, coins);
764 : :
765 : : // Parse the prevtxs array
766 [ + - + + ]: 176 : ParsePrevouts(request.params[2], &keystore, coins);
767 : :
768 : 96 : UniValue result(UniValue::VOBJ);
769 [ + - + + ]: 96 : SignTransaction(mtx, &keystore, coins, request.params[3], result);
770 : 95 : return result;
771 : 273 : },
772 [ + - + - : 56474 : };
+ - + - +
- + + + +
+ + + + -
- - - - -
- - ]
773 [ + - + - : 118082 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - -
- ]
774 : :
775 : 2862 : const RPCResult& DecodePSBTInputs()
776 : : {
777 : 2862 : static const RPCResult decodepsbt_inputs{
778 [ + - + - ]: 2378 : RPCResult::Type::ARR, "inputs", "",
779 : : {
780 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
781 : : {
782 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "non_witness_utxo", /*optional=*/true, "Decoded network transaction for non-witness UTXOs",
783 : 2378 : TxDoc({.elision_description="The layout is the same as the output of decoderawtransaction."})
784 : : },
785 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "witness_utxo", /*optional=*/true, "Transaction output for witness UTXOs",
786 : : {
787 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "amount", "The value in " + CURRENCY_UNIT},
788 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "scriptPubKey", "",
789 : : {
790 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the output script"},
791 [ + - + - ]: 2378 : {RPCResult::Type::STR, "desc", "Inferred descriptor for the output"},
792 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw output script bytes, hex-encoded"},
793 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
794 [ + - + - ]: 2378 : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
795 : : }},
796 : : }},
797 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "partial_signatures", /*optional=*/true, "",
798 : : {
799 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The public key and signature that corresponds to it."},
800 : : }},
801 [ + - + - ]: 2378 : {RPCResult::Type::STR, "sighash", /*optional=*/true, "The sighash type to be used"},
802 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "redeem_script", /*optional=*/true, "",
803 : : {
804 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the redeem script"},
805 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw redeem script bytes, hex-encoded"},
806 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
807 : : }},
808 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "witness_script", /*optional=*/true, "",
809 : : {
810 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the witness script"},
811 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw witness script bytes, hex-encoded"},
812 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
813 : : }},
814 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "bip32_derivs", /*optional=*/true, "",
815 : : {
816 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
817 : : {
818 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The public key with the derivation path as the value."},
819 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
820 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
821 : : }},
822 : : }},
823 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "final_scriptSig", /*optional=*/true, "",
824 : : {
825 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the final signature script"},
826 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw final signature script bytes, hex-encoded"},
827 : : }},
828 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "final_scriptwitness", /*optional=*/true, "",
829 : : {
830 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "", "hex-encoded witness data (if any)"},
831 : : }},
832 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "ripemd160_preimages", /*optional=*/ true, "",
833 : : {
834 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
835 : : }},
836 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "sha256_preimages", /*optional=*/ true, "",
837 : : {
838 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
839 : : }},
840 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "hash160_preimages", /*optional=*/ true, "",
841 : : {
842 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
843 : : }},
844 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "hash256_preimages", /*optional=*/ true, "",
845 : : {
846 [ + - + - ]: 2378 : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
847 : : }},
848 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "previous_txid", /*optional=*/true, "TXID of the transaction containing the output being spent by this input"},
849 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "previous_vout", /*optional=*/true, "Index of the output being spent"},
850 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "sequence", /*optional=*/true, "Sequence number for this input"},
851 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "time_locktime", /*optional=*/true, "Time-based locktime required for this input"},
852 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "height_locktime", /*optional=*/true, "Height-based locktime required for this input"},
853 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_key_path_sig", /*optional=*/ true, "hex-encoded signature for the Taproot key path spend"},
854 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_script_path_sigs", /*optional=*/ true, "",
855 : : {
856 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "signature", /*optional=*/ true, "The signature for the pubkey and leaf hash combination",
857 : : {
858 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The x-only pubkey for this signature"},
859 [ + - + - ]: 2378 : {RPCResult::Type::STR, "leaf_hash", "The leaf hash for this signature"},
860 [ + - + - ]: 2378 : {RPCResult::Type::STR, "sig", "The signature itself"},
861 : : }},
862 : : }},
863 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_scripts", /*optional=*/ true, "",
864 : : {
865 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
866 : : {
867 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "script", "A leaf script"},
868 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "leaf_ver", "The version number for the leaf script"},
869 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "control_blocks", "The control blocks for this script",
870 : : {
871 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "control_block", "A hex-encoded control block for this script"},
872 : : }},
873 : : }},
874 : : }},
875 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_bip32_derivs", /*optional=*/ true, "",
876 : : {
877 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
878 : : {
879 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The x-only public key this path corresponds to"},
880 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
881 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
882 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "leaf_hashes", "The hashes of the leaves this pubkey appears in",
883 : : {
884 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hash", "The hash of a leaf this pubkey appears in"},
885 : : }},
886 : : }},
887 : : }},
888 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_internal_key", /*optional=*/ true, "The hex-encoded Taproot x-only internal key"},
889 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_merkle_root", /*optional=*/ true, "The hex-encoded Taproot merkle root"},
890 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_participant_pubkeys", /*optional=*/true, "",
891 : : {
892 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
893 : : {
894 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which the participants create."},
895 [ + - + - ]: 3567 : {RPCResult::Type::ARR, "participant_pubkeys", "",
896 : : {
897 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "pubkey", "The compressed public keys that are aggregated for aggregate_pubkey."},
898 : : }},
899 : : }},
900 : : }},
901 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_pubnonces", /*optional=*/true, "",
902 : : {
903 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
904 : : {
905 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "participant_pubkey", "The compressed public key of the participant that created this pubnonce."},
906 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which this pubnonce is for."},
907 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "leaf_hash", /*optional=*/true, "The hash of the leaf script that contains the aggregate pubkey being signed for. Omitted when signing for the internal key."},
908 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "pubnonce", "The public nonce itself."},
909 : : }},
910 : : }},
911 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_partial_sigs", /*optional=*/true, "",
912 : : {
913 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
914 : : {
915 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "participant_pubkey", "The compressed public key of the participant that created this partial signature."},
916 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which this partial signature is for."},
917 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "leaf_hash", /*optional=*/true, "The hash of the leaf script that contains the aggregate pubkey being signed for. Omitted when signing for the internal key."},
918 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "partial_sig", "The partial signature itself."},
919 : : }},
920 : : }},
921 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "unknown", /*optional=*/ true, "The unknown input fields",
922 : : {
923 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
924 : : }},
925 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "proprietary", /*optional=*/true, "The input proprietary map",
926 : : {
927 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
928 : : {
929 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
930 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
931 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
932 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
933 : : }},
934 : : }},
935 : : }},
936 : : }
937 [ + + + - : 257308 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - -
- ]
938 : 2862 : return decodepsbt_inputs;
939 [ + - + - : 214020 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - -
- ]
940 : :
941 : 2862 : const RPCResult& DecodePSBTOutputs()
942 : : {
943 : 2862 : static const RPCResult decodepsbt_outputs{
944 [ + - + - ]: 2378 : RPCResult::Type::ARR, "outputs", "",
945 : : {
946 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
947 : : {
948 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "redeem_script", /*optional=*/true, "",
949 : : {
950 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the redeem script"},
951 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw redeem script bytes, hex-encoded"},
952 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
953 : : }},
954 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "witness_script", /*optional=*/true, "",
955 : : {
956 [ + - + - ]: 2378 : {RPCResult::Type::STR, "asm", "Disassembly of the witness script"},
957 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hex", "The raw witness script bytes, hex-encoded"},
958 [ + - + - ]: 2378 : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
959 : : }},
960 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "bip32_derivs", /*optional=*/true, "",
961 : : {
962 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
963 : : {
964 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The public key this path corresponds to"},
965 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
966 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
967 : : }},
968 : : }},
969 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "amount", /* optional=*/ true, "The amount (nValue) for this output"},
970 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "script", /* optional=*/ true, "The output script (scriptPubKey) for this output",
971 [ + - + - ]: 2378 : {{RPCResult::Type::ELISION, "", "The layout is the same as the output of scriptPubKeys in decoderawtransaction."}},
972 : : },
973 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "taproot_internal_key", /*optional=*/ true, "The hex-encoded Taproot x-only internal key"},
974 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_tree", /*optional=*/ true, "The tuples that make up the Taproot tree, in depth first search order",
975 : : {
976 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "tuple", /*optional=*/ true, "A single leaf script in the taproot tree",
977 : : {
978 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "depth", "The depth of this element in the tree"},
979 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "leaf_ver", "The version of this leaf"},
980 [ + - + - ]: 2378 : {RPCResult::Type::STR, "script", "The hex-encoded script itself"},
981 : : }},
982 : : }},
983 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "taproot_bip32_derivs", /*optional=*/ true, "",
984 : : {
985 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
986 : : {
987 [ + - + - ]: 2378 : {RPCResult::Type::STR, "pubkey", "The x-only public key this path corresponds to"},
988 [ + - + - ]: 2378 : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
989 [ + - + - ]: 2378 : {RPCResult::Type::STR, "path", "The path"},
990 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "leaf_hashes", "The hashes of the leaves this pubkey appears in",
991 : : {
992 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "hash", "The hash of a leaf this pubkey appears in"},
993 : : }},
994 : : }},
995 : : }},
996 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "musig2_participant_pubkeys", /*optional=*/true, "",
997 : : {
998 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
999 : : {
1000 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which the participants create."},
1001 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "participant_pubkeys", "",
1002 : : {
1003 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "pubkey", "The compressed public keys that are aggregated for aggregate_pubkey."},
1004 : : }},
1005 : : }},
1006 : : }},
1007 [ + - + - ]: 2378 : {RPCResult::Type::OBJ_DYN, "unknown", /*optional=*/true, "The unknown output fields",
1008 : : {
1009 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
1010 : : }},
1011 [ + - + - ]: 2378 : {RPCResult::Type::ARR, "proprietary", /*optional=*/true, "The output proprietary map",
1012 : : {
1013 [ + - + - ]: 2378 : {RPCResult::Type::OBJ, "", "",
1014 : : {
1015 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
1016 [ + - + - ]: 2378 : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
1017 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
1018 [ + - + - ]: 2378 : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
1019 : : }},
1020 : : }},
1021 : : }},
1022 : : }
1023 [ + + + - : 127707 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + +
+ + + + -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - - -
- - - -
- ]
1024 : 2862 : return decodepsbt_outputs;
1025 [ + - + - : 102254 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - - -
- - - - -
- - - ]
1026 : :
1027 : 2862 : static RPCMethod decodepsbt()
1028 : : {
1029 : 2862 : return RPCMethod{
1030 : 2862 : "decodepsbt",
1031 [ + - ]: 5724 : "Return a JSON object representing the serialized, base64-encoded partially signed Bitcoin transaction.",
1032 : : {
1033 [ + - + - ]: 5724 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "The PSBT base64 string"},
1034 : : },
1035 [ + - ]: 5724 : RPCResult{
1036 [ + - + - ]: 5724 : RPCResult::Type::OBJ, "", "",
1037 : : {
1038 [ + - + - ]: 5724 : {RPCResult::Type::OBJ, "tx", /*optional=*/true, "The decoded network-serialized unsigned transaction.",
1039 : 5724 : TxDoc({.elision_description="The layout is the same as the output of decoderawtransaction."})
1040 : : },
1041 [ + - + - ]: 5724 : {RPCResult::Type::ARR, "global_xpubs", "",
1042 : : {
1043 [ + - + - ]: 5724 : {RPCResult::Type::OBJ, "", "",
1044 : : {
1045 [ + - + - ]: 5724 : {RPCResult::Type::STR, "xpub", "The extended public key this path corresponds to"},
1046 [ + - + - ]: 5724 : {RPCResult::Type::STR_HEX, "master_fingerprint", "The fingerprint of the master key"},
1047 [ + - + - ]: 5724 : {RPCResult::Type::STR, "path", "The path"},
1048 : : }},
1049 : : }},
1050 [ + - + - ]: 5724 : {RPCResult::Type::NUM, "tx_version", /* optional */ true, "The version number of the unsigned transaction. Not to be confused with PSBT version"},
1051 [ + - + - ]: 5724 : {RPCResult::Type::NUM, "fallback_locktime", /* optional */ true, "The locktime to fallback to if no inputs specify a required locktime."},
1052 [ + - + - ]: 5724 : {RPCResult::Type::NUM, "input_count", /* optional */ true, "The number of inputs in this psbt"},
1053 [ + - + - ]: 5724 : {RPCResult::Type::NUM, "output_count", /* optional */ true, "The number of outputs in this psbt."},
1054 [ + - + - ]: 5724 : {RPCResult::Type::BOOL, "inputs_modifiable", /* optional */ true, "Whether inputs can be modified"},
1055 [ + - + - ]: 5724 : {RPCResult::Type::BOOL, "outputs_modifiable", /* optional */ true, "Whether outputs can be modified"},
1056 [ + - + - ]: 5724 : {RPCResult::Type::BOOL, "has_sighash_single", /* optional */ true, "Whether this PSBT has SIGHASH_SINGLE inputs"},
1057 [ + - + - ]: 5724 : {RPCResult::Type::NUM, "psbt_version", /* optional */ true, "The PSBT version number. Not to be confused with the unsigned transaction version"},
1058 [ + - + - ]: 5724 : {RPCResult::Type::ARR, "proprietary", "The global proprietary map",
1059 : : {
1060 [ + - + - ]: 5724 : {RPCResult::Type::OBJ, "", "",
1061 : : {
1062 [ + - + - ]: 5724 : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
1063 [ + - + - ]: 5724 : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
1064 [ + - + - ]: 5724 : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
1065 [ + - + - ]: 5724 : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
1066 : : }},
1067 : : }},
1068 [ + - + - ]: 5724 : {RPCResult::Type::OBJ_DYN, "unknown", "The unknown global fields",
1069 : : {
1070 [ + - + - ]: 5724 : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
1071 : : }},
1072 : : DecodePSBTInputs(),
1073 : : DecodePSBTOutputs(),
1074 [ + - + - ]: 5724 : {RPCResult::Type::STR_AMOUNT, "fee", /*optional=*/true, "The transaction fee paid if all UTXOs slots in the PSBT have been filled."},
1075 : : }
1076 [ + - + - : 154548 : },
+ - + - +
- + - + -
+ + + + +
+ + + + +
+ + - - -
- - - - -
- - - - ]
1077 : 2862 : RPCExamples{
1078 [ + - + - : 5724 : HelpExampleCli("decodepsbt", "\"psbt\"")
+ - ]
1079 [ + - ]: 2862 : },
1080 : 2862 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1081 : : {
1082 : : // Unserialize the transactions
1083 : 473 : util::Result<PartiallySignedTransaction> psbt_res = DecodeBase64PSBT(request.params[0].get_str());
1084 [ + + ]: 473 : if (!psbt_res) {
1085 [ + - + - : 261 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", util::ErrorString(psbt_res).original));
+ - ]
1086 : : }
1087 [ + - ]: 386 : PartiallySignedTransaction psbtx = *psbt_res;
1088 : :
1089 : 386 : UniValue result(UniValue::VOBJ);
1090 : :
1091 [ + - + + ]: 386 : if (psbtx.GetVersion() < 2) {
1092 : : // Add the decoded tx
1093 : 44 : UniValue tx_univ(UniValue::VOBJ);
1094 [ + - + - : 132 : TxToUniv(CTransaction(*CHECK_NONFATAL(psbtx.GetUnsignedTx())), /*block_hash=*/uint256(), /*entry=*/tx_univ, /*include_hex=*/false);
+ - + - +
- ]
1095 [ + - + - ]: 88 : result.pushKV("tx", std::move(tx_univ));
1096 : 44 : }
1097 : :
1098 : : // Add the global xpubs
1099 : 386 : UniValue global_xpubs(UniValue::VARR);
1100 [ + - + + ]: 389 : for (std::pair<KeyOriginInfo, std::set<CExtPubKey>> xpub_pair : psbtx.m_xpubs) {
1101 [ + + ]: 6 : for (auto& xpub : xpub_pair.second) {
1102 : 3 : std::vector<unsigned char> ser_xpub;
1103 [ + - ]: 3 : ser_xpub.assign(BIP32_EXTKEY_WITH_VERSION_SIZE, 0);
1104 [ + - ]: 3 : xpub.EncodeWithVersion(ser_xpub.data());
1105 : :
1106 : 3 : UniValue keypath(UniValue::VOBJ);
1107 [ - + + - : 6 : keypath.pushKV("xpub", EncodeBase58Check(ser_xpub));
+ - + - +
- ]
1108 [ + - + - : 6 : keypath.pushKV("master_fingerprint", HexStr(std::span<unsigned char>(xpub_pair.first.fingerprint, xpub_pair.first.fingerprint + 4)));
+ - + - ]
1109 [ + - + - : 6 : keypath.pushKV("path", WriteHDKeypath(xpub_pair.first.path));
+ - + - ]
1110 [ + - ]: 3 : global_xpubs.push_back(std::move(keypath));
1111 : 3 : }
1112 : 3 : }
1113 [ + - + - ]: 772 : result.pushKV("global_xpubs", std::move(global_xpubs));
1114 : :
1115 : : // Add PSBTv2 stuff
1116 [ + - + + ]: 386 : if (psbtx.GetVersion() >= 2) {
1117 [ + - + - : 684 : result.pushKV("tx_version", psbtx.tx_version);
+ - ]
1118 [ + + ]: 342 : if (psbtx.fallback_locktime.has_value()) {
1119 [ + - + - : 660 : result.pushKV("fallback_locktime", static_cast<uint64_t>(*psbtx.fallback_locktime));
+ - ]
1120 : : }
1121 [ - + + - : 684 : result.pushKV("input_count", (uint64_t)psbtx.inputs.size());
+ - + - ]
1122 [ - + + - : 1026 : result.pushKV("output_count", (uint64_t)psbtx.outputs.size());
+ - ]
1123 [ + + ]: 342 : if (psbtx.m_tx_modifiable.has_value()) {
1124 [ + - + - : 20 : result.pushKV("inputs_modifiable", psbtx.m_tx_modifiable->test(0));
+ - ]
1125 [ + - + - : 20 : result.pushKV("outputs_modifiable", psbtx.m_tx_modifiable->test(1));
+ - ]
1126 [ + - + - : 20 : result.pushKV("has_sighash_single", psbtx.m_tx_modifiable->test(2));
+ - ]
1127 : : }
1128 : : }
1129 : :
1130 : : // PSBT version
1131 [ + - + - : 772 : result.pushKV("psbt_version", psbtx.GetVersion());
+ - + - ]
1132 : :
1133 : : // Proprietary
1134 : 386 : UniValue proprietary(UniValue::VARR);
1135 [ + + ]: 388 : for (const auto& entry : psbtx.m_proprietary) {
1136 : 2 : UniValue this_prop(UniValue::VOBJ);
1137 [ - + + - : 4 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - +
- ]
1138 [ + - + - : 4 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1139 [ - + + - : 4 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - +
- ]
1140 [ - + + - : 4 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - +
- ]
1141 [ + - ]: 2 : proprietary.push_back(std::move(this_prop));
1142 : 2 : }
1143 [ + - + - ]: 772 : result.pushKV("proprietary", std::move(proprietary));
1144 : :
1145 : : // Unknown data
1146 : 386 : UniValue unknowns(UniValue::VOBJ);
1147 [ - - - + ]: 386 : for (auto entry : psbtx.unknown) {
1148 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # #
# ]
1149 : 0 : }
1150 [ + - + - ]: 772 : result.pushKV("unknown", std::move(unknowns));
1151 : :
1152 : : // inputs
1153 : 386 : CAmount total_in = 0;
1154 : 386 : bool have_all_utxos = true;
1155 : 386 : UniValue inputs(UniValue::VARR);
1156 [ - + + + ]: 844 : for (unsigned int i = 0; i < psbtx.inputs.size(); ++i) {
1157 : 458 : const PSBTInput& input = psbtx.inputs[i];
1158 : 458 : UniValue in(UniValue::VOBJ);
1159 : : // UTXOs
1160 : 458 : bool have_a_utxo = false;
1161 : 458 : CTxOut txout;
1162 [ + + ]: 458 : if (!input.witness_utxo.IsNull()) {
1163 : 388 : txout = input.witness_utxo;
1164 : :
1165 : 388 : UniValue o(UniValue::VOBJ);
1166 [ + - ]: 388 : ScriptToUniv(txout.scriptPubKey, /*out=*/o, /*include_hex=*/true, /*include_address=*/true);
1167 : :
1168 : 388 : UniValue out(UniValue::VOBJ);
1169 [ + - + - : 776 : out.pushKV("amount", ValueFromAmount(txout.nValue));
+ - ]
1170 [ + - + - ]: 776 : out.pushKV("scriptPubKey", std::move(o));
1171 : :
1172 [ + - + - ]: 776 : in.pushKV("witness_utxo", std::move(out));
1173 : :
1174 : 388 : have_a_utxo = true;
1175 : 388 : }
1176 [ + + ]: 458 : if (input.non_witness_utxo) {
1177 : 161 : txout = input.non_witness_utxo->vout[input.prev_out];
1178 : :
1179 : 161 : UniValue non_wit(UniValue::VOBJ);
1180 [ + - ]: 161 : TxToUniv(*input.non_witness_utxo, /*block_hash=*/uint256(), /*entry=*/non_wit, /*include_hex=*/false);
1181 [ + - + - ]: 322 : in.pushKV("non_witness_utxo", std::move(non_wit));
1182 : :
1183 : 161 : have_a_utxo = true;
1184 : 0 : }
1185 [ + + ]: 458 : if (have_a_utxo) {
1186 [ + - - + ]: 428 : if (MoneyRange(txout.nValue) && MoneyRange(total_in + txout.nValue)) {
1187 : : total_in += txout.nValue;
1188 : : } else {
1189 : : // Hack to just not show fee later
1190 : : have_all_utxos = false;
1191 : : }
1192 : : } else {
1193 : : have_all_utxos = false;
1194 : : }
1195 : :
1196 : : // Partial sigs
1197 [ + + ]: 458 : if (!input.partial_sigs.empty()) {
1198 : 36 : UniValue partial_sigs(UniValue::VOBJ);
1199 [ + + ]: 90 : for (const auto& sig : input.partial_sigs) {
1200 [ - + + - : 108 : partial_sigs.pushKV(HexStr(sig.second.first), HexStr(sig.second.second));
+ - + - +
- ]
1201 : : }
1202 [ + - + - ]: 72 : in.pushKV("partial_signatures", std::move(partial_sigs));
1203 : 36 : }
1204 : :
1205 : : // Sighash
1206 [ + + ]: 458 : if (input.sighash_type != std::nullopt) {
1207 [ + - + - : 14 : in.pushKV("sighash", SighashToStr((unsigned char)*input.sighash_type));
+ - + - ]
1208 : : }
1209 : :
1210 : : // Redeem script and witness script
1211 [ - + + + ]: 458 : if (!input.redeem_script.empty()) {
1212 : 21 : UniValue r(UniValue::VOBJ);
1213 [ + - ]: 21 : ScriptToUniv(input.redeem_script, /*out=*/r);
1214 [ + - + - ]: 42 : in.pushKV("redeem_script", std::move(r));
1215 : 21 : }
1216 [ + + + + ]: 487 : if (!input.witness_script.empty()) {
1217 : 31 : UniValue r(UniValue::VOBJ);
1218 [ + - ]: 31 : ScriptToUniv(input.witness_script, /*out=*/r);
1219 [ + - + - ]: 62 : in.pushKV("witness_script", std::move(r));
1220 : 31 : }
1221 : :
1222 : : // keypaths
1223 [ + + ]: 458 : if (!input.hd_keypaths.empty()) {
1224 : 104 : UniValue keypaths(UniValue::VARR);
1225 [ + - + + ]: 251 : for (auto entry : input.hd_keypaths) {
1226 : 147 : UniValue keypath(UniValue::VOBJ);
1227 [ + - + - : 294 : keypath.pushKV("pubkey", HexStr(entry.first));
+ - + - ]
1228 : :
1229 [ + - + - : 294 : keypath.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(entry.second.fingerprint)));
+ - + - ]
1230 [ + - + - : 294 : keypath.pushKV("path", WriteHDKeypath(entry.second.path));
+ - + - ]
1231 [ + - ]: 147 : keypaths.push_back(std::move(keypath));
1232 : 147 : }
1233 [ + - + - ]: 208 : in.pushKV("bip32_derivs", std::move(keypaths));
1234 : 104 : }
1235 : :
1236 : : // Final scriptSig and scriptwitness
1237 [ + + + + ]: 471 : if (!input.final_script_sig.empty()) {
1238 : 17 : UniValue scriptsig(UniValue::VOBJ);
1239 [ + - + - : 34 : scriptsig.pushKV("asm", ScriptToAsmStr(input.final_script_sig, true));
+ - + - ]
1240 [ + + + - : 51 : scriptsig.pushKV("hex", HexStr(input.final_script_sig));
+ - + - +
- ]
1241 [ + - + - ]: 34 : in.pushKV("final_scriptSig", std::move(scriptsig));
1242 : 17 : }
1243 [ + + ]: 458 : if (!input.final_script_witness.IsNull()) {
1244 : 32 : UniValue txinwitness(UniValue::VARR);
1245 [ + + ]: 99 : for (const auto& item : input.final_script_witness.stack) {
1246 [ - + + - : 67 : txinwitness.push_back(HexStr(item));
+ - + - ]
1247 : : }
1248 [ + - + - ]: 64 : in.pushKV("final_scriptwitness", std::move(txinwitness));
1249 : 32 : }
1250 : :
1251 : : // Ripemd160 hash preimages
1252 [ + + ]: 458 : if (!input.ripemd160_preimages.empty()) {
1253 : 2 : UniValue ripemd160_preimages(UniValue::VOBJ);
1254 [ - + + + ]: 5 : for (const auto& [hash, preimage] : input.ripemd160_preimages) {
1255 [ - + + - : 6 : ripemd160_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1256 : : }
1257 [ + - + - ]: 4 : in.pushKV("ripemd160_preimages", std::move(ripemd160_preimages));
1258 : 2 : }
1259 : :
1260 : : // Sha256 hash preimages
1261 [ + + ]: 458 : if (!input.sha256_preimages.empty()) {
1262 : 3 : UniValue sha256_preimages(UniValue::VOBJ);
1263 [ - + + + ]: 7 : for (const auto& [hash, preimage] : input.sha256_preimages) {
1264 [ - + + - : 8 : sha256_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1265 : : }
1266 [ + - + - ]: 6 : in.pushKV("sha256_preimages", std::move(sha256_preimages));
1267 : 3 : }
1268 : :
1269 : : // Hash160 hash preimages
1270 [ + + ]: 458 : if (!input.hash160_preimages.empty()) {
1271 : 2 : UniValue hash160_preimages(UniValue::VOBJ);
1272 [ - + + + ]: 5 : for (const auto& [hash, preimage] : input.hash160_preimages) {
1273 [ - + + - : 6 : hash160_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1274 : : }
1275 [ + - + - ]: 4 : in.pushKV("hash160_preimages", std::move(hash160_preimages));
1276 : 2 : }
1277 : :
1278 : : // Hash256 hash preimages
1279 [ + + ]: 458 : if (!input.hash256_preimages.empty()) {
1280 : 2 : UniValue hash256_preimages(UniValue::VOBJ);
1281 [ - + + + ]: 5 : for (const auto& [hash, preimage] : input.hash256_preimages) {
1282 [ - + + - : 6 : hash256_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - +
- ]
1283 : : }
1284 [ + - + - ]: 4 : in.pushKV("hash256_preimages", std::move(hash256_preimages));
1285 : 2 : }
1286 : :
1287 : : // PSBTv2
1288 [ + - + + ]: 458 : if (psbtx.GetVersion() >= 2) {
1289 [ + - + - : 808 : in.pushKV("previous_txid", input.prev_txid.GetHex());
+ - + - ]
1290 [ + - + - : 808 : in.pushKV("previous_vout", static_cast<uint64_t>(input.prev_out));
+ - ]
1291 [ + + ]: 404 : if (input.sequence.has_value()) {
1292 [ + - + - : 786 : in.pushKV("sequence", static_cast<uint64_t>(*input.sequence));
+ - ]
1293 : : }
1294 [ + + ]: 404 : if (input.time_locktime.has_value()) {
1295 [ + - + - : 4 : in.pushKV("time_locktime", static_cast<uint64_t>(*input.time_locktime));
+ - ]
1296 : : }
1297 [ + + ]: 404 : if (input.height_locktime.has_value()) {
1298 [ + - + - : 4 : in.pushKV("height_locktime", static_cast<uint64_t>(*input.height_locktime));
+ - ]
1299 : : }
1300 : : }
1301 : :
1302 : : // Taproot key path signature
1303 [ + + ]: 458 : if (!input.m_tap_key_sig.empty()) {
1304 [ - + + - : 162 : in.pushKV("taproot_key_path_sig", HexStr(input.m_tap_key_sig));
+ - + - +
- ]
1305 : : }
1306 : :
1307 : : // Taproot script path signatures
1308 [ + + ]: 458 : if (!input.m_tap_script_sigs.empty()) {
1309 : 107 : UniValue script_sigs(UniValue::VARR);
1310 [ + + ]: 272 : for (const auto& [pubkey_leaf, sig] : input.m_tap_script_sigs) {
1311 : 165 : const auto& [xonly, leaf_hash] = pubkey_leaf;
1312 : 165 : UniValue sigobj(UniValue::VOBJ);
1313 [ + - + - : 330 : sigobj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1314 [ + - + - : 330 : sigobj.pushKV("leaf_hash", HexStr(leaf_hash));
+ - + - ]
1315 [ - + + - : 330 : sigobj.pushKV("sig", HexStr(sig));
+ - + - +
- ]
1316 [ + - ]: 165 : script_sigs.push_back(std::move(sigobj));
1317 : 165 : }
1318 [ + - + - ]: 214 : in.pushKV("taproot_script_path_sigs", std::move(script_sigs));
1319 : 107 : }
1320 : :
1321 : : // Taproot leaf scripts
1322 [ + + ]: 458 : if (!input.m_tap_scripts.empty()) {
1323 : 178 : UniValue tap_scripts(UniValue::VARR);
1324 [ + + ]: 456 : for (const auto& [leaf, control_blocks] : input.m_tap_scripts) {
1325 : 278 : const auto& [script, leaf_ver] = leaf;
1326 : 278 : UniValue script_info(UniValue::VOBJ);
1327 [ - + + - : 556 : script_info.pushKV("script", HexStr(script));
+ - + - +
- ]
1328 [ + - + - : 556 : script_info.pushKV("leaf_ver", leaf_ver);
+ - ]
1329 : 278 : UniValue control_blocks_univ(UniValue::VARR);
1330 [ + + ]: 634 : for (const auto& control_block : control_blocks) {
1331 [ - + + - : 356 : control_blocks_univ.push_back(HexStr(control_block));
+ - + - ]
1332 : : }
1333 [ + - + - ]: 556 : script_info.pushKV("control_blocks", std::move(control_blocks_univ));
1334 [ + - ]: 278 : tap_scripts.push_back(std::move(script_info));
1335 : 278 : }
1336 [ + - + - ]: 356 : in.pushKV("taproot_scripts", std::move(tap_scripts));
1337 : 178 : }
1338 : :
1339 : : // Taproot bip32 keypaths
1340 [ + + ]: 458 : if (!input.m_tap_bip32_paths.empty()) {
1341 : 248 : UniValue keypaths(UniValue::VARR);
1342 [ + + ]: 1083 : for (const auto& [xonly, leaf_origin] : input.m_tap_bip32_paths) {
1343 : 835 : const auto& [leaf_hashes, origin] = leaf_origin;
1344 : 835 : UniValue path_obj(UniValue::VOBJ);
1345 [ + - + - : 1670 : path_obj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1346 [ + - + - : 1670 : path_obj.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(origin.fingerprint)));
+ - + - ]
1347 [ + - + - : 1670 : path_obj.pushKV("path", WriteHDKeypath(origin.path));
+ - + - ]
1348 : 835 : UniValue leaf_hashes_arr(UniValue::VARR);
1349 [ + + ]: 1391 : for (const auto& leaf_hash : leaf_hashes) {
1350 [ + - + - : 556 : leaf_hashes_arr.push_back(HexStr(leaf_hash));
+ - ]
1351 : : }
1352 [ + - + - ]: 1670 : path_obj.pushKV("leaf_hashes", std::move(leaf_hashes_arr));
1353 [ + - ]: 835 : keypaths.push_back(std::move(path_obj));
1354 : 835 : }
1355 [ + - + - ]: 496 : in.pushKV("taproot_bip32_derivs", std::move(keypaths));
1356 : 248 : }
1357 : :
1358 : : // Taproot internal key
1359 [ + + ]: 916 : if (!input.m_tap_internal_key.IsNull()) {
1360 [ + - + - : 438 : in.pushKV("taproot_internal_key", HexStr(input.m_tap_internal_key));
+ - + - ]
1361 : : }
1362 : :
1363 : : // Write taproot merkle root
1364 [ + + ]: 916 : if (!input.m_tap_merkle_root.IsNull()) {
1365 [ + - + - : 356 : in.pushKV("taproot_merkle_root", HexStr(input.m_tap_merkle_root));
+ - + - ]
1366 : : }
1367 : :
1368 : : // Write MuSig2 fields
1369 [ + + ]: 458 : if (!input.m_musig2_participants.empty()) {
1370 : 77 : UniValue musig_pubkeys(UniValue::VARR);
1371 [ + + ]: 175 : for (const auto& [agg, parts] : input.m_musig2_participants) {
1372 : 98 : UniValue musig_part(UniValue::VOBJ);
1373 [ + - + - : 196 : musig_part.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1374 : 98 : UniValue part_pubkeys(UniValue::VARR);
1375 [ + + ]: 369 : for (const auto& pub : parts) {
1376 [ + - + - : 271 : part_pubkeys.push_back(HexStr(pub));
+ - ]
1377 : : }
1378 [ + - + - : 196 : musig_part.pushKV("participant_pubkeys", part_pubkeys);
+ - ]
1379 [ + - + - ]: 98 : musig_pubkeys.push_back(musig_part);
1380 : 98 : }
1381 [ + - + - : 154 : in.pushKV("musig2_participant_pubkeys", musig_pubkeys);
+ - ]
1382 : 77 : }
1383 [ + + ]: 458 : if (!input.m_musig2_pubnonces.empty()) {
1384 : 53 : UniValue musig_pubnonces(UniValue::VARR);
1385 [ + + ]: 120 : for (const auto& [agg_lh, part_pubnonce] : input.m_musig2_pubnonces) {
1386 : 67 : const auto& [agg, lh] = agg_lh;
1387 [ + + ]: 245 : for (const auto& [part, pubnonce] : part_pubnonce) {
1388 : 178 : UniValue info(UniValue::VOBJ);
1389 [ + - + - : 356 : info.pushKV("participant_pubkey", HexStr(part));
+ - + - ]
1390 [ + - + - : 356 : info.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1391 [ + + + - : 443 : if (!lh.IsNull()) info.pushKV("leaf_hash", HexStr(lh));
+ - + - +
- ]
1392 [ - + + - : 356 : info.pushKV("pubnonce", HexStr(pubnonce));
+ - + - +
- ]
1393 [ + - + - ]: 178 : musig_pubnonces.push_back(info);
1394 : 178 : }
1395 : : }
1396 [ + - + - : 106 : in.pushKV("musig2_pubnonces", musig_pubnonces);
+ - ]
1397 : 53 : }
1398 [ + + ]: 458 : if (!input.m_musig2_partial_sigs.empty()) {
1399 : 26 : UniValue musig_partial_sigs(UniValue::VARR);
1400 [ + + ]: 57 : for (const auto& [agg_lh, part_psig] : input.m_musig2_partial_sigs) {
1401 : 31 : const auto& [agg, lh] = agg_lh;
1402 [ + + ]: 115 : for (const auto& [part, psig] : part_psig) {
1403 : 84 : UniValue info(UniValue::VOBJ);
1404 [ + - + - : 168 : info.pushKV("participant_pubkey", HexStr(part));
+ - + - ]
1405 [ + - + - : 168 : info.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1406 [ + + + - : 211 : if (!lh.IsNull()) info.pushKV("leaf_hash", HexStr(lh));
+ - + - +
- ]
1407 [ + - + - : 168 : info.pushKV("partial_sig", HexStr(psig));
+ - + - ]
1408 [ + - + - ]: 84 : musig_partial_sigs.push_back(info);
1409 : 84 : }
1410 : : }
1411 [ + - + - : 52 : in.pushKV("musig2_partial_sigs", musig_partial_sigs);
+ - ]
1412 : 26 : }
1413 : :
1414 : : // Proprietary
1415 [ + + ]: 458 : if (!input.m_proprietary.empty()) {
1416 : 1 : UniValue proprietary(UniValue::VARR);
1417 [ + + ]: 2 : for (const auto& entry : input.m_proprietary) {
1418 : 1 : UniValue this_prop(UniValue::VOBJ);
1419 [ - + + - : 2 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - +
- ]
1420 [ + - + - : 2 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1421 [ - + + - : 2 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - +
- ]
1422 [ - + + - : 2 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - +
- ]
1423 [ + - ]: 1 : proprietary.push_back(std::move(this_prop));
1424 : 1 : }
1425 [ + - + - ]: 2 : in.pushKV("proprietary", std::move(proprietary));
1426 : 1 : }
1427 : :
1428 : : // Unknown data
1429 [ - + ]: 458 : if (input.unknown.size() > 0) {
1430 : 0 : UniValue unknowns(UniValue::VOBJ);
1431 [ # # # # ]: 0 : for (auto entry : input.unknown) {
1432 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # #
# ]
1433 : 0 : }
1434 [ # # # # ]: 0 : in.pushKV("unknown", std::move(unknowns));
1435 : 0 : }
1436 : :
1437 [ + - ]: 458 : inputs.push_back(std::move(in));
1438 : 458 : }
1439 [ + - + - ]: 772 : result.pushKV("inputs", std::move(inputs));
1440 : :
1441 : : // outputs
1442 : 386 : CAmount output_value = 0;
1443 : 386 : UniValue outputs(UniValue::VARR);
1444 [ - + + + ]: 1064 : for (unsigned int i = 0; i < psbtx.outputs.size(); ++i) {
1445 : 678 : const PSBTOutput& output = psbtx.outputs[i];
1446 : 678 : UniValue out(UniValue::VOBJ);
1447 : : // Redeem script and witness script
1448 [ - + + + ]: 678 : if (!output.redeem_script.empty()) {
1449 : 16 : UniValue r(UniValue::VOBJ);
1450 [ + - ]: 16 : ScriptToUniv(output.redeem_script, /*out=*/r);
1451 [ + - + - ]: 32 : out.pushKV("redeem_script", std::move(r));
1452 : 16 : }
1453 [ + + + + ]: 690 : if (!output.witness_script.empty()) {
1454 : 12 : UniValue r(UniValue::VOBJ);
1455 [ + - ]: 12 : ScriptToUniv(output.witness_script, /*out=*/r);
1456 [ + - + - ]: 24 : out.pushKV("witness_script", std::move(r));
1457 : 12 : }
1458 : :
1459 : : // keypaths
1460 [ + + ]: 678 : if (!output.hd_keypaths.empty()) {
1461 : 129 : UniValue keypaths(UniValue::VARR);
1462 [ + - + + ]: 274 : for (auto entry : output.hd_keypaths) {
1463 : 145 : UniValue keypath(UniValue::VOBJ);
1464 [ + - + - : 290 : keypath.pushKV("pubkey", HexStr(entry.first));
+ - + - ]
1465 [ + - + - : 290 : keypath.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(entry.second.fingerprint)));
+ - + - ]
1466 [ + - + - : 290 : keypath.pushKV("path", WriteHDKeypath(entry.second.path));
+ - + - ]
1467 [ + - ]: 145 : keypaths.push_back(std::move(keypath));
1468 : 145 : }
1469 [ + - + - ]: 258 : out.pushKV("bip32_derivs", std::move(keypaths));
1470 : 129 : }
1471 : :
1472 : : // PSBTv2 stuff
1473 [ + - + + ]: 678 : if (psbtx.GetVersion() >= 2) {
1474 [ + - + - : 1232 : out.pushKV("amount", ValueFromAmount(output.amount));
+ - ]
1475 : 616 : UniValue spk(UniValue::VOBJ);
1476 [ + - ]: 616 : ScriptToUniv(output.script, spk, /*include_hex=*/true, /*include_address=*/true);
1477 [ + - + - : 1232 : out.pushKV("script", spk);
+ - ]
1478 : 616 : }
1479 : :
1480 : : // Taproot internal key
1481 [ + + ]: 1356 : if (!output.m_tap_internal_key.IsNull()) {
1482 [ + - + - : 370 : out.pushKV("taproot_internal_key", HexStr(output.m_tap_internal_key));
+ - + - ]
1483 : : }
1484 : :
1485 : : // Taproot tree
1486 [ + + ]: 678 : if (!output.m_tap_tree.empty()) {
1487 : 146 : UniValue tree(UniValue::VARR);
1488 [ + + ]: 478 : for (const auto& [depth, leaf_ver, script] : output.m_tap_tree) {
1489 : 332 : UniValue elem(UniValue::VOBJ);
1490 [ + - + - : 664 : elem.pushKV("depth", depth);
+ - ]
1491 [ + - + - : 664 : elem.pushKV("leaf_ver", leaf_ver);
+ - ]
1492 [ - + + - : 664 : elem.pushKV("script", HexStr(script));
+ - + - +
- ]
1493 [ + - ]: 332 : tree.push_back(std::move(elem));
1494 : 332 : }
1495 [ + - + - ]: 292 : out.pushKV("taproot_tree", std::move(tree));
1496 : 146 : }
1497 : :
1498 : : // Taproot bip32 keypaths
1499 [ + + ]: 678 : if (!output.m_tap_bip32_paths.empty()) {
1500 : 211 : UniValue keypaths(UniValue::VARR);
1501 [ + + ]: 923 : for (const auto& [xonly, leaf_origin] : output.m_tap_bip32_paths) {
1502 : 712 : const auto& [leaf_hashes, origin] = leaf_origin;
1503 : 712 : UniValue path_obj(UniValue::VOBJ);
1504 [ + - + - : 1424 : path_obj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1505 [ + - + - : 1424 : path_obj.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(origin.fingerprint)));
+ - + - ]
1506 [ + - + - : 1424 : path_obj.pushKV("path", WriteHDKeypath(origin.path));
+ - + - ]
1507 : 712 : UniValue leaf_hashes_arr(UniValue::VARR);
1508 [ + + ]: 1196 : for (const auto& leaf_hash : leaf_hashes) {
1509 [ + - + - : 484 : leaf_hashes_arr.push_back(HexStr(leaf_hash));
+ - ]
1510 : : }
1511 [ + - + - ]: 1424 : path_obj.pushKV("leaf_hashes", std::move(leaf_hashes_arr));
1512 [ + - ]: 712 : keypaths.push_back(std::move(path_obj));
1513 : 712 : }
1514 [ + - + - ]: 422 : out.pushKV("taproot_bip32_derivs", std::move(keypaths));
1515 : 211 : }
1516 : :
1517 : : // Write MuSig2 fields
1518 [ + + ]: 678 : if (!output.m_musig2_participants.empty()) {
1519 : 75 : UniValue musig_pubkeys(UniValue::VARR);
1520 [ + + ]: 174 : for (const auto& [agg, parts] : output.m_musig2_participants) {
1521 : 99 : UniValue musig_part(UniValue::VOBJ);
1522 [ + - + - : 198 : musig_part.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1523 : 99 : UniValue part_pubkeys(UniValue::VARR);
1524 [ + + ]: 374 : for (const auto& pub : parts) {
1525 [ + - + - : 275 : part_pubkeys.push_back(HexStr(pub));
+ - ]
1526 : : }
1527 [ + - + - : 198 : musig_part.pushKV("participant_pubkeys", part_pubkeys);
+ - ]
1528 [ + - + - ]: 99 : musig_pubkeys.push_back(musig_part);
1529 : 99 : }
1530 [ + - + - : 150 : out.pushKV("musig2_participant_pubkeys", musig_pubkeys);
+ - ]
1531 : 75 : }
1532 : :
1533 : : // Proprietary
1534 [ + + ]: 678 : if (!output.m_proprietary.empty()) {
1535 : 1 : UniValue proprietary(UniValue::VARR);
1536 [ + + ]: 2 : for (const auto& entry : output.m_proprietary) {
1537 : 1 : UniValue this_prop(UniValue::VOBJ);
1538 [ - + + - : 2 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - +
- ]
1539 [ + - + - : 2 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1540 [ - + + - : 2 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - +
- ]
1541 [ - + + - : 2 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - +
- ]
1542 [ + - ]: 1 : proprietary.push_back(std::move(this_prop));
1543 : 1 : }
1544 [ + - + - ]: 2 : out.pushKV("proprietary", std::move(proprietary));
1545 : 1 : }
1546 : :
1547 : : // Unknown data
1548 [ - + ]: 678 : if (output.unknown.size() > 0) {
1549 : 0 : UniValue unknowns(UniValue::VOBJ);
1550 [ # # # # ]: 0 : for (auto entry : output.unknown) {
1551 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # #
# ]
1552 : 0 : }
1553 [ # # # # ]: 0 : out.pushKV("unknown", std::move(unknowns));
1554 : 0 : }
1555 : :
1556 [ + - ]: 678 : outputs.push_back(std::move(out));
1557 : :
1558 : : // Fee calculation
1559 [ + - - + ]: 678 : if (MoneyRange(output.amount) && MoneyRange(output_value + output.amount)) {
1560 : : output_value += output.amount;
1561 : : } else {
1562 : : // Hack to just not show fee later
1563 : : have_all_utxos = false;
1564 : : }
1565 : 678 : }
1566 [ + - + - ]: 772 : result.pushKV("outputs", std::move(outputs));
1567 [ + + ]: 386 : if (have_all_utxos) {
1568 [ + - + - : 734 : result.pushKV("fee", ValueFromAmount(total_in - output_value));
+ - ]
1569 : : }
1570 : :
1571 : 772 : return result;
1572 : 386 : },
1573 [ + - + - : 14310 : };
+ + - - ]
1574 [ + - + - : 137376 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - - -
- - - - ]
1575 : :
1576 : 2445 : static RPCMethod combinepsbt()
1577 : : {
1578 : 2445 : return RPCMethod{
1579 : 2445 : "combinepsbt",
1580 [ + - ]: 4890 : "Combine multiple partially signed Bitcoin transactions into one transaction.\n"
1581 : : "Implements the Combiner role.\n",
1582 : : {
1583 [ + - + - ]: 4890 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base64 strings of partially signed transactions",
1584 : : {
1585 [ + - + - ]: 4890 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "A base64 string of a PSBT"},
1586 : : },
1587 : : },
1588 : : },
1589 [ + - ]: 4890 : RPCResult{
1590 [ + - + - ]: 4890 : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction"
1591 [ + - ]: 4890 : },
1592 : 2445 : RPCExamples{
1593 [ + - + - : 4890 : HelpExampleCli("combinepsbt", R"('["mybase64_1", "mybase64_2", "mybase64_3"]')")
+ - ]
1594 [ + - ]: 2445 : },
1595 : 2445 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1596 : : {
1597 : : // Unserialize the transactions
1598 : 56 : std::vector<PartiallySignedTransaction> psbtxs;
1599 [ + - + - : 56 : UniValue txs = request.params[0].get_array();
+ - ]
1600 [ - + + + ]: 56 : if (txs.empty()) {
1601 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "Parameter 'txs' cannot be empty");
1602 : : }
1603 [ - + + + ]: 210 : for (unsigned int i = 0; i < txs.size(); ++i) {
1604 [ + - + - : 155 : util::Result<PartiallySignedTransaction> psbt_res = DecodeBase64PSBT(txs[i].get_str());
+ - ]
1605 [ - + ]: 155 : if (!psbt_res) {
1606 [ # # # # : 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", util::ErrorString(psbt_res).original));
# # ]
1607 : : }
1608 [ + - ]: 155 : psbtxs.push_back(*psbt_res);
1609 : 155 : }
1610 : :
1611 [ + - ]: 55 : std::optional<PartiallySignedTransaction> merged_psbt = CombinePSBTs(psbtxs);
1612 [ + + ]: 55 : if (!merged_psbt) {
1613 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "PSBTs not compatible (different transactions)");
1614 : : }
1615 : :
1616 : 54 : DataStream ssTx{};
1617 [ + - ]: 54 : ssTx << *merged_psbt;
1618 [ - + + - : 162 : return EncodeBase64(ssTx);
+ - ]
1619 : 58 : },
1620 [ + - + - : 19560 : };
+ - + + +
+ - - -
- ]
1621 [ + - + - ]: 9780 : }
1622 : :
1623 : 2619 : static RPCMethod finalizepsbt()
1624 : : {
1625 : 2619 : return RPCMethod{"finalizepsbt",
1626 [ + - ]: 5238 : "Finalize the inputs of a PSBT. If the transaction is fully signed, it will produce a\n"
1627 : : "network serialized transaction which can be broadcast with sendrawtransaction. Otherwise a PSBT will be\n"
1628 : : "created which has the final_scriptSig and final_scriptwitness fields filled for inputs that are complete.\n"
1629 : : "Implements the Finalizer and Extractor roles.\n",
1630 : : {
1631 [ + - + - ]: 5238 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"},
1632 [ + - + - : 7857 : {"extract", RPCArg::Type::BOOL, RPCArg::Default{true}, "If true and the transaction is complete,\n"
+ - ]
1633 : : " extract and return the complete transaction in normal network serialization instead of the PSBT."},
1634 : : },
1635 [ + - ]: 5238 : RPCResult{
1636 [ + - + - ]: 5238 : RPCResult::Type::OBJ, "", "",
1637 : : {
1638 [ + - + - ]: 5238 : {RPCResult::Type::STR, "psbt", /*optional=*/true, "The base64-encoded partially signed transaction if not extracted"},
1639 [ + - + - ]: 5238 : {RPCResult::Type::STR_HEX, "hex", /*optional=*/true, "The hex-encoded network transaction if extracted"},
1640 [ + - + - ]: 5238 : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
1641 : : }
1642 [ + - + - : 20952 : },
+ + - - ]
1643 : 2619 : RPCExamples{
1644 [ + - + - : 5238 : HelpExampleCli("finalizepsbt", "\"psbt\"")
+ - ]
1645 [ + - ]: 2619 : },
1646 : 2619 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1647 : : {
1648 : : // Unserialize the transactions
1649 : 230 : util::Result<PartiallySignedTransaction> psbt_res = DecodeBase64PSBT(request.params[0].get_str());
1650 [ + + ]: 230 : if (!psbt_res) {
1651 [ + - + - : 3 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", util::ErrorString(psbt_res).original));
+ - ]
1652 : : }
1653 [ + - ]: 229 : PartiallySignedTransaction psbtx = *psbt_res;
1654 : :
1655 [ + - + + : 229 : bool extract = request.params[1].isNull() || (!request.params[1].isNull() && request.params[1].get_bool());
+ - + - +
- + - +
+ ]
1656 : :
1657 [ + - ]: 229 : CMutableTransaction mtx;
1658 [ + - ]: 229 : bool complete = FinalizeAndExtractPSBT(psbtx, mtx);
1659 : :
1660 : 229 : UniValue result(UniValue::VOBJ);
1661 : 229 : DataStream ssTx{};
1662 [ + + ]: 229 : std::string result_str;
1663 : :
1664 [ + + + + ]: 229 : if (complete && extract) {
1665 [ + - ]: 197 : ssTx << TX_WITH_WITNESS(mtx);
1666 [ - + + - ]: 197 : result_str = HexStr(ssTx);
1667 [ + - + - : 394 : result.pushKV("hex", result_str);
+ - ]
1668 : : } else {
1669 [ + - ]: 32 : ssTx << psbtx;
1670 [ + - + - ]: 64 : result_str = EncodeBase64(ssTx.str());
1671 [ + - + - : 64 : result.pushKV("psbt", result_str);
+ - ]
1672 : : }
1673 [ + - + - : 458 : result.pushKV("complete", complete);
+ - ]
1674 : :
1675 : 229 : return result;
1676 : 458 : },
1677 [ + - + - : 15714 : };
+ + - - ]
1678 [ + - + - : 26190 : }
+ - + - +
- - - -
- ]
1679 : :
1680 : 2455 : static RPCMethod createpsbt()
1681 : : {
1682 : 2455 : return RPCMethod{
1683 : 2455 : "createpsbt",
1684 [ + - ]: 4910 : "Creates a transaction in the Partially Signed Transaction format.\n"
1685 : : "Implements the Creator role.\n"
1686 : : "Note that the transaction's inputs are not signed, and\n"
1687 : : "it is not stored in the wallet or transmitted to the network.\n",
1688 [ + - + - : 9820 : Cat<std::vector<RPCArg>>(
+ + - - ]
1689 [ + - ]: 4910 : CreateTxDoc(),
1690 : : {
1691 [ + - + - : 7365 : {"psbt_version", RPCArg::Type::NUM, RPCArg::Default{2}, "The PSBT version number to use."},
+ - ]
1692 : : }
1693 : : ),
1694 [ + - ]: 4910 : RPCResult{
1695 [ + - + - ]: 4910 : RPCResult::Type::STR, "", "The resulting raw transaction (base64-encoded string)"
1696 [ + - ]: 4910 : },
1697 : 2455 : RPCExamples{
1698 [ + - + - : 4910 : HelpExampleCli("createpsbt", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"address\\\":0.01}]\"")
+ - ]
1699 [ + - ]: 2455 : },
1700 : 2455 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1701 : : {
1702 : 66 : std::optional<bool> rbf;
1703 [ + + ]: 66 : if (!request.params[3].isNull()) {
1704 : 1 : rbf = request.params[3].get_bool();
1705 : : }
1706 : 66 : CMutableTransaction rawTx = ConstructTransaction(request.params[0], request.params[1], request.params[2], rbf, self.Arg<uint32_t>("version"));
1707 : :
1708 : : // Make a blank psbt
1709 : 66 : uint32_t psbt_version = 2;
1710 [ + - + + ]: 66 : if (!request.params[5].isNull()) {
1711 [ + - + - ]: 9 : psbt_version = request.params[5].getInt<uint32_t>();
1712 : : }
1713 [ + + ]: 66 : if (psbt_version != 2 && psbt_version != 0) {
1714 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "The PSBT version can only be 2 or 0");
1715 : : }
1716 [ + - ]: 65 : PartiallySignedTransaction psbtx(rawTx, psbt_version);
1717 : :
1718 : : // Serialize the PSBT
1719 : 65 : DataStream ssTx{};
1720 [ + - ]: 65 : ssTx << psbtx;
1721 : :
1722 [ - + + - : 130 : return EncodeBase64(ssTx);
+ - ]
1723 : 130 : },
1724 [ + - ]: 4910 : };
1725 [ + - ]: 4910 : }
1726 : :
1727 : 2398 : static RPCMethod converttopsbt()
1728 : : {
1729 : 2398 : return RPCMethod{
1730 : 2398 : "converttopsbt",
1731 [ + - ]: 4796 : "Converts a network serialized transaction to a PSBT. This should be used only with createrawtransaction and fundrawtransaction\n"
1732 : : "createpsbt and walletcreatefundedpsbt should be used for new applications.\n",
1733 : : {
1734 [ + - + - ]: 4796 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The hex string of a raw transaction"},
1735 [ + - + - : 7194 : {"permitsigdata", RPCArg::Type::BOOL, RPCArg::Default{false}, "If true, any signatures in the input will be discarded and conversion\n"
+ - ]
1736 : : " will continue. If false, RPC will fail if any signatures are present."},
1737 [ + - + - : 7194 : {"iswitness", RPCArg::Type::BOOL, RPCArg::DefaultHint{"depends on heuristic tests"}, "Whether the transaction hex is a serialized witness transaction.\n"
+ - ]
1738 : : "If iswitness is not present, heuristic tests will be used in decoding.\n"
1739 : : "If true, only witness deserialization will be tried.\n"
1740 : : "If false, only non-witness deserialization will be tried.\n"
1741 : : "This boolean should reflect whether the transaction has inputs\n"
1742 : : "(e.g. fully valid, or on-chain transactions), if known by the caller."
1743 : : },
1744 [ + - + - : 7194 : {"psbt_version", RPCArg::Type::NUM, RPCArg::Default{2}, "The PSBT version number to use."},
+ - ]
1745 : : },
1746 [ + - ]: 4796 : RPCResult{
1747 [ + - + - ]: 4796 : RPCResult::Type::STR, "", "The resulting raw transaction (base64-encoded string)"
1748 [ + - ]: 4796 : },
1749 : 2398 : RPCExamples{
1750 : : "\nCreate a transaction\n"
1751 [ + - + - : 4796 : + HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"data\\\":\\\"00010203\\\"}]\"") +
+ - + - ]
1752 : 2398 : "\nConvert the transaction to a PSBT\n"
1753 [ + - + - : 9592 : + HelpExampleCli("converttopsbt", "\"rawtransaction\"")
+ - + - ]
1754 [ + - ]: 2398 : },
1755 : 2398 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1756 : : {
1757 : : // parse hex string from parameter
1758 : 9 : CMutableTransaction tx;
1759 [ + - + + : 9 : bool permitsigdata = request.params[1].isNull() ? false : request.params[1].get_bool();
+ - + - ]
1760 [ + - + + ]: 9 : bool witness_specified = !request.params[2].isNull();
1761 [ + + + - : 9 : bool iswitness = witness_specified ? request.params[2].get_bool() : false;
+ - ]
1762 : 1 : const bool try_witness = witness_specified ? iswitness : true;
1763 : 1 : const bool try_no_witness = witness_specified ? !iswitness : true;
1764 [ + - + - : 9 : if (!DecodeHexTx(tx, request.params[0].get_str(), try_no_witness, try_witness)) {
+ - - + ]
1765 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed");
1766 : : }
1767 : :
1768 : : // Remove all scriptSigs and scriptWitnesses from inputs
1769 [ + + ]: 15 : for (CTxIn& input : tx.vin) {
1770 [ - + + - : 9 : if ((!input.scriptSig.empty() || !input.scriptWitness.IsNull()) && !permitsigdata) {
+ + + + ]
1771 [ + - + - ]: 6 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "Inputs must not have scriptSigs and scriptWitnesses");
1772 : : }
1773 : 6 : input.scriptSig.clear();
1774 : 6 : input.scriptWitness.SetNull();
1775 : : }
1776 : :
1777 : : // Make a blank psbt
1778 : 6 : uint32_t psbt_version = 2;
1779 [ + - + + ]: 6 : if (!request.params[3].isNull()) {
1780 [ + - + - ]: 3 : psbt_version = request.params[3].getInt<uint32_t>();
1781 : : }
1782 [ + + ]: 6 : if (psbt_version != 2 && psbt_version != 0) {
1783 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "The PSBT version can only be 2 or 0");
1784 : : }
1785 [ + - ]: 5 : PartiallySignedTransaction psbtx(tx, psbt_version);
1786 : :
1787 : : // Serialize the PSBT
1788 : 5 : DataStream ssTx{};
1789 [ + - ]: 5 : ssTx << psbtx;
1790 : :
1791 [ - + + - : 10 : return EncodeBase64(ssTx);
+ - ]
1792 : 10 : },
1793 [ + - + - : 19184 : };
+ + - - ]
1794 [ + - + - : 19184 : }
+ - + - -
- ]
1795 : :
1796 : 2394 : static RPCMethod utxoupdatepsbt()
1797 : : {
1798 : 2394 : return RPCMethod{
1799 : 2394 : "utxoupdatepsbt",
1800 [ + - ]: 4788 : "Updates all segwit inputs and outputs in a PSBT with data from output descriptors, the UTXO set, txindex, or the mempool.\n",
1801 : : {
1802 [ + - + - ]: 4788 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"},
1803 [ + - + - ]: 4788 : {"descriptors", RPCArg::Type::ARR, RPCArg::Optional::OMITTED, "An array of either strings or objects", {
1804 [ + - + - ]: 4788 : {"", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "An output descriptor"},
1805 [ + - + - ]: 4788 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "An object with an output descriptor and extra information", {
1806 [ + - + - ]: 4788 : {"desc", RPCArg::Type::STR, RPCArg::Optional::NO, "An output descriptor"},
1807 [ + - + - : 7182 : {"range", RPCArg::Type::RANGE, RPCArg::Default{1000}, "Up to what index HD chains should be explored (either end or [begin,end])"},
+ - ]
1808 : : }},
1809 : : }},
1810 : : },
1811 [ + - ]: 4788 : RPCResult {
1812 [ + - + - ]: 4788 : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction with inputs updated"
1813 [ + - ]: 4788 : },
1814 : 2394 : RPCExamples {
1815 [ + - + - : 4788 : HelpExampleCli("utxoupdatepsbt", "\"psbt\"")
+ - ]
1816 [ + - ]: 2394 : },
1817 : 2394 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1818 : : {
1819 : : // Parse descriptors, if any.
1820 : 5 : FlatSigningProvider provider;
1821 [ + - + + ]: 5 : if (!request.params[1].isNull()) {
1822 [ + - + - : 1 : auto descs = request.params[1].get_array();
+ - ]
1823 [ - + + + ]: 4 : for (size_t i = 0; i < descs.size(); ++i) {
1824 [ + - + - ]: 3 : EvalDescriptorStringOrObject(descs[i], provider);
1825 : : }
1826 : 1 : }
1827 : :
1828 : : // We don't actually need private keys further on; hide them as a precaution.
1829 : 5 : const PartiallySignedTransaction& psbtx = ProcessPSBT(
1830 : 5 : request.params[0].get_str(),
1831 : 5 : request.context,
1832 [ + - ]: 5 : HidingSigningProvider(&provider, /*hide_secret=*/true, /*hide_origin=*/false),
1833 : : /*sighash_type=*/std::nullopt,
1834 [ + - + - : 5 : /*finalize=*/false);
+ - + - ]
1835 : :
1836 : 5 : DataStream ssTx{};
1837 [ + - ]: 5 : ssTx << psbtx;
1838 [ - + + - : 15 : return EncodeBase64(ssTx);
+ - ]
1839 : 5 : },
1840 [ + - + - : 33516 : };
+ - + - +
+ + + + +
- - - - -
- ]
1841 [ + - + - : 28728 : }
+ - + - +
- + - - -
- - - - ]
1842 : :
1843 : 2393 : static RPCMethod joinpsbts()
1844 : : {
1845 : 2393 : return RPCMethod{
1846 : 2393 : "joinpsbts",
1847 [ + - ]: 4786 : "Joins multiple distinct version 0 PSBTs with different inputs and outputs into one version 0 PSBT with inputs and outputs from all of the PSBTs\n"
1848 : : "No input in any of the PSBTs can be in more than one of the PSBTs.\n",
1849 : : {
1850 [ + - + - ]: 4786 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base64 strings of partially signed transactions",
1851 : : {
1852 [ + - + - ]: 4786 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"}
1853 : : }}
1854 : : },
1855 [ + - ]: 4786 : RPCResult {
1856 [ + - + - ]: 4786 : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction"
1857 [ + - ]: 4786 : },
1858 : 2393 : RPCExamples {
1859 [ + - + - : 4786 : HelpExampleCli("joinpsbts", "\"psbt\"")
+ - ]
1860 [ + - ]: 2393 : },
1861 : 2393 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1862 : : {
1863 : : // Unserialize the transactions
1864 : 4 : std::vector<PartiallySignedTransaction> psbtxs;
1865 [ + - + - : 4 : UniValue txs = request.params[0].get_array();
+ - ]
1866 : :
1867 [ - + - + ]: 4 : if (txs.size() <= 1) {
1868 [ # # # # ]: 0 : throw JSONRPCError(RPC_INVALID_PARAMETER, "At least two PSBTs are required to join PSBTs.");
1869 : : }
1870 : :
1871 : : uint32_t best_version = 1;
1872 : : uint32_t best_locktime = 0xffffffff;
1873 [ - + + + ]: 11 : for (unsigned int i = 0; i < txs.size(); ++i) {
1874 [ + - + - : 8 : util::Result<PartiallySignedTransaction> psbt_res = DecodeBase64PSBT(txs[i].get_str());
+ - ]
1875 [ - + ]: 8 : if (!psbt_res) {
1876 [ # # # # : 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", util::ErrorString(psbt_res).original));
# # ]
1877 : : }
1878 [ + - ]: 8 : psbtxs.push_back(*psbt_res);
1879 : 8 : const PartiallySignedTransaction& psbtx = psbtxs.back();
1880 [ + - + + ]: 8 : if (psbtx.GetVersion() != 0) {
1881 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "joinpsbts only operates on version 0 PSBTs");
1882 : : }
1883 : : // Choose the highest version number
1884 [ + + ]: 7 : if (psbtx.tx_version > best_version) {
1885 : 4 : best_version = psbtx.tx_version;
1886 : : }
1887 : : // Choose the lowest lock time
1888 [ + - ]: 7 : uint32_t psbt_locktime = psbtx.fallback_locktime.value_or(0);
1889 [ + + ]: 7 : if (psbt_locktime < best_locktime) {
1890 : 4 : best_locktime = psbt_locktime;
1891 : : }
1892 : 8 : }
1893 : :
1894 : : // Create a blank psbt where everything will be added
1895 [ + - ]: 3 : CMutableTransaction tx;
1896 : 3 : tx.version = best_version;
1897 : 3 : tx.nLockTime = best_locktime;
1898 [ + - + - : 3 : PartiallySignedTransaction merged_psbt(tx, psbtxs.at(0).GetVersion());
+ - ]
1899 : :
1900 : : // Merge
1901 [ + + ]: 8 : for (auto& psbt : psbtxs) {
1902 [ + + ]: 15 : for (const PSBTInput& input : psbt.inputs) {
1903 [ + - + + ]: 10 : if (!merged_psbt.AddInput(input)) {
1904 [ + - + - : 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, strprintf("Input %s:%d exists in multiple PSBTs", input.prev_txid.ToString(), input.prev_out));
+ - ]
1905 : : }
1906 : : }
1907 [ + + ]: 10 : for (const PSBTOutput& output : psbt.outputs) {
1908 [ + - ]: 5 : merged_psbt.AddOutput(output);
1909 : : }
1910 [ - + ]: 5 : for (auto& xpub_pair : psbt.m_xpubs) {
1911 [ # # ]: 0 : if (!merged_psbt.m_xpubs.contains(xpub_pair.first)) {
1912 [ # # # # ]: 0 : merged_psbt.m_xpubs[xpub_pair.first] = xpub_pair.second;
1913 : : } else {
1914 [ # # # # ]: 0 : merged_psbt.m_xpubs[xpub_pair.first].insert(xpub_pair.second.begin(), xpub_pair.second.end());
1915 : : }
1916 : : }
1917 [ + - ]: 5 : merged_psbt.unknown.insert(psbt.unknown.begin(), psbt.unknown.end());
1918 : : }
1919 : :
1920 : : // Generate list of shuffled indices for shuffling inputs and outputs of the merged PSBT
1921 [ - + + - ]: 2 : std::vector<int> input_indices(merged_psbt.inputs.size());
1922 : 2 : std::iota(input_indices.begin(), input_indices.end(), 0);
1923 [ - + + - ]: 2 : std::vector<int> output_indices(merged_psbt.outputs.size());
1924 : 2 : std::iota(output_indices.begin(), output_indices.end(), 0);
1925 : :
1926 : : // Shuffle input and output indices lists
1927 : 2 : std::shuffle(input_indices.begin(), input_indices.end(), FastRandomContext());
1928 : 2 : std::shuffle(output_indices.begin(), output_indices.end(), FastRandomContext());
1929 : :
1930 [ + - + - ]: 2 : PartiallySignedTransaction shuffled_psbt(tx, merged_psbt.GetVersion());
1931 [ + + ]: 10 : for (int i : input_indices) {
1932 [ + - ]: 8 : shuffled_psbt.AddInput(merged_psbt.inputs[i]);
1933 : : }
1934 [ + + ]: 6 : for (int i : output_indices) {
1935 [ + - ]: 4 : shuffled_psbt.AddOutput(merged_psbt.outputs[i]);
1936 : : }
1937 [ + - ]: 2 : shuffled_psbt.unknown.insert(merged_psbt.unknown.begin(), merged_psbt.unknown.end());
1938 : :
1939 : 2 : DataStream ssTx{};
1940 [ + - ]: 2 : ssTx << shuffled_psbt;
1941 [ - + + - : 6 : return EncodeBase64(ssTx);
+ - ]
1942 : 9 : },
1943 [ + - + - : 19144 : };
+ - + + +
+ - - -
- ]
1944 [ + - + - ]: 9572 : }
1945 : :
1946 : 2398 : static RPCMethod analyzepsbt()
1947 : : {
1948 : 2398 : return RPCMethod{
1949 : 2398 : "analyzepsbt",
1950 [ + - ]: 4796 : "Analyzes and provides information about the current status of a PSBT and its inputs\n",
1951 : : {
1952 [ + - + - ]: 4796 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"}
1953 : : },
1954 [ + - ]: 4796 : RPCResult {
1955 [ + - + - ]: 4796 : RPCResult::Type::OBJ, "", "",
1956 : : {
1957 [ + - + - ]: 4796 : {RPCResult::Type::ARR, "inputs", /*optional=*/true, "",
1958 : : {
1959 [ + - + - ]: 4796 : {RPCResult::Type::OBJ, "", "",
1960 : : {
1961 [ + - + - ]: 4796 : {RPCResult::Type::BOOL, "has_utxo", "Whether a UTXO is provided"},
1962 [ + - + - ]: 4796 : {RPCResult::Type::BOOL, "is_final", "Whether the input is finalized"},
1963 [ + - + - ]: 4796 : {RPCResult::Type::OBJ, "missing", /*optional=*/true, "Things that are missing that are required to complete this input",
1964 : : {
1965 [ + - + - ]: 4796 : {RPCResult::Type::ARR, "pubkeys", /*optional=*/true, "",
1966 : : {
1967 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "keyid", "Public key ID, hash160 of the public key, of a public key whose BIP 32 derivation path is missing"},
1968 : : }},
1969 [ + - + - ]: 4796 : {RPCResult::Type::ARR, "signatures", /*optional=*/true, "",
1970 : : {
1971 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "keyid", "Public key ID, hash160 of the public key, of a public key whose signature is missing"},
1972 : : }},
1973 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "redeemscript", /*optional=*/true, "Hash160 of the redeem script that is missing"},
1974 [ + - + - ]: 4796 : {RPCResult::Type::STR_HEX, "witnessscript", /*optional=*/true, "SHA256 of the witness script that is missing"},
1975 : : }},
1976 [ + - + - ]: 4796 : {RPCResult::Type::STR, "next", /*optional=*/true, "Role of the next person that this input needs to go to"},
1977 : : }},
1978 : : }},
1979 [ + - + - ]: 4796 : {RPCResult::Type::NUM, "estimated_vsize", /*optional=*/true, "Estimated vsize of the final signed transaction"},
1980 [ + - + - ]: 4796 : {RPCResult::Type::STR_AMOUNT, "estimated_feerate", /*optional=*/true, "Estimated feerate of the final signed transaction in " + CURRENCY_UNIT + "/kvB. Shown only if all UTXO slots in the PSBT have been filled"},
1981 [ + - + - ]: 4796 : {RPCResult::Type::STR_AMOUNT, "fee", /*optional=*/true, "The transaction fee paid. Shown only if all UTXO slots in the PSBT have been filled"},
1982 [ + - + - ]: 4796 : {RPCResult::Type::STR, "next", "Role of the next person that this psbt needs to go to"},
1983 [ + - + - ]: 4796 : {RPCResult::Type::STR, "error", /*optional=*/true, "Error message (if there is one)"},
1984 : : }
1985 [ + - + - : 98318 : },
+ - + - +
- + - + -
+ + + + +
+ + + + +
+ + - - -
- - - - -
- - - - ]
1986 : 2398 : RPCExamples {
1987 [ + - + - : 4796 : HelpExampleCli("analyzepsbt", "\"psbt\"")
+ - ]
1988 [ + - ]: 2398 : },
1989 : 2398 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
1990 : : {
1991 : : // Unserialize the transaction
1992 : 9 : util::Result<PartiallySignedTransaction> psbt_res = DecodeBase64PSBT(request.params[0].get_str());
1993 [ + + ]: 9 : if (!psbt_res) {
1994 [ + - + - : 3 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", util::ErrorString(psbt_res).original));
+ - ]
1995 : : }
1996 : 8 : const PartiallySignedTransaction& psbtx = *psbt_res;
1997 : :
1998 [ + - + - ]: 8 : PSBTAnalysis psbta = AnalyzePSBT(psbtx);
1999 : :
2000 : 8 : UniValue result(UniValue::VOBJ);
2001 : 8 : UniValue inputs_result(UniValue::VARR);
2002 [ + + ]: 14 : for (const auto& input : psbta.inputs) {
2003 : 6 : UniValue input_univ(UniValue::VOBJ);
2004 : 6 : UniValue missing(UniValue::VOBJ);
2005 : :
2006 [ + - + - : 12 : input_univ.pushKV("has_utxo", input.has_utxo);
+ - ]
2007 [ + - + - : 12 : input_univ.pushKV("is_final", input.is_final);
+ - ]
2008 [ + - + - : 12 : input_univ.pushKV("next", PSBTRoleName(input.next));
+ - + - ]
2009 : :
2010 [ - + ]: 6 : if (!input.missing_pubkeys.empty()) {
2011 : 0 : UniValue missing_pubkeys_univ(UniValue::VARR);
2012 [ # # ]: 0 : for (const CKeyID& pubkey : input.missing_pubkeys) {
2013 [ # # # # : 0 : missing_pubkeys_univ.push_back(HexStr(pubkey));
# # ]
2014 : : }
2015 [ # # # # ]: 0 : missing.pushKV("pubkeys", std::move(missing_pubkeys_univ));
2016 : 0 : }
2017 [ - + ]: 12 : if (!input.missing_redeem_script.IsNull()) {
2018 [ # # # # : 0 : missing.pushKV("redeemscript", HexStr(input.missing_redeem_script));
# # # # ]
2019 : : }
2020 [ - + ]: 12 : if (!input.missing_witness_script.IsNull()) {
2021 [ # # # # : 0 : missing.pushKV("witnessscript", HexStr(input.missing_witness_script));
# # # # ]
2022 : : }
2023 [ + + ]: 6 : if (!input.missing_sigs.empty()) {
2024 : 1 : UniValue missing_sigs_univ(UniValue::VARR);
2025 [ + + ]: 2 : for (const CKeyID& pubkey : input.missing_sigs) {
2026 [ + - + - : 1 : missing_sigs_univ.push_back(HexStr(pubkey));
+ - ]
2027 : : }
2028 [ + - + - ]: 2 : missing.pushKV("signatures", std::move(missing_sigs_univ));
2029 : 1 : }
2030 [ + - + + ]: 6 : if (!missing.getKeys().empty()) {
2031 [ + - + - ]: 2 : input_univ.pushKV("missing", std::move(missing));
2032 : : }
2033 [ + - ]: 6 : inputs_result.push_back(std::move(input_univ));
2034 : 6 : }
2035 [ - + + + : 13 : if (!inputs_result.empty()) result.pushKV("inputs", std::move(inputs_result));
+ - + - ]
2036 : :
2037 [ + + ]: 8 : if (psbta.estimated_vsize != std::nullopt) {
2038 [ + - + - : 6 : result.pushKV("estimated_vsize", *psbta.estimated_vsize);
+ - ]
2039 : : }
2040 [ + + ]: 8 : if (psbta.estimated_feerate != std::nullopt) {
2041 [ + - + - : 6 : result.pushKV("estimated_feerate", ValueFromAmount(psbta.estimated_feerate->GetFeePerK()));
+ - ]
2042 : : }
2043 [ + + ]: 8 : if (psbta.fee != std::nullopt) {
2044 [ + - + - : 6 : result.pushKV("fee", ValueFromAmount(*psbta.fee));
+ - ]
2045 : : }
2046 [ + - + - : 16 : result.pushKV("next", PSBTRoleName(psbta.next));
+ - + - ]
2047 [ + + ]: 8 : if (!psbta.error.empty()) {
2048 [ + - + - : 6 : result.pushKV("error", psbta.error);
+ - ]
2049 : : }
2050 : :
2051 : 16 : return result;
2052 : 16 : },
2053 [ + - + - : 11990 : };
+ + - - ]
2054 [ + - + - : 86328 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - ]
2055 : :
2056 : 2404 : RPCMethod descriptorprocesspsbt()
2057 : : {
2058 : 2404 : return RPCMethod{
2059 : 2404 : "descriptorprocesspsbt",
2060 [ + - ]: 4808 : "Update all segwit inputs in a PSBT with information from output descriptors, the UTXO set or the mempool. \n"
2061 : : "Then, sign the inputs we are able to with information from the output descriptors. ",
2062 : : {
2063 [ + - + - ]: 4808 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "The transaction base64 string"},
2064 [ + - + - ]: 4808 : {"descriptors", RPCArg::Type::ARR, RPCArg::Optional::NO, "An array of either strings or objects", {
2065 [ + - + - ]: 4808 : {"", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "An output descriptor"},
2066 [ + - + - ]: 4808 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "An object with an output descriptor and extra information", {
2067 [ + - + - ]: 4808 : {"desc", RPCArg::Type::STR, RPCArg::Optional::NO, "An output descriptor"},
2068 [ + - + - : 7212 : {"range", RPCArg::Type::RANGE, RPCArg::Default{1000}, "Up to what index HD chains should be explored (either end or [begin,end])"},
+ - ]
2069 : : }},
2070 : : }},
2071 [ + - + - : 7212 : {"sighashtype", RPCArg::Type::STR, RPCArg::Default{"DEFAULT for Taproot, ALL otherwise"}, "The signature hash type to sign with if not specified by the PSBT. Must be one of\n"
+ - ]
2072 : : " \"DEFAULT\"\n"
2073 : : " \"ALL\"\n"
2074 : : " \"NONE\"\n"
2075 : : " \"SINGLE\"\n"
2076 : : " \"ALL|ANYONECANPAY\"\n"
2077 : : " \"NONE|ANYONECANPAY\"\n"
2078 : : " \"SINGLE|ANYONECANPAY\""},
2079 [ + - + - : 7212 : {"bip32derivs", RPCArg::Type::BOOL, RPCArg::Default{true}, "Include BIP 32 derivation paths for public keys if we know them"},
+ - ]
2080 [ + - + - : 7212 : {"finalize", RPCArg::Type::BOOL, RPCArg::Default{true}, "Also finalize inputs if possible"},
+ - ]
2081 : : },
2082 [ + - ]: 4808 : RPCResult{
2083 [ + - + - ]: 4808 : RPCResult::Type::OBJ, "", "",
2084 : : {
2085 [ + - + - ]: 4808 : {RPCResult::Type::STR, "psbt", "The base64-encoded partially signed transaction"},
2086 [ + - + - ]: 4808 : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
2087 [ + - + - ]: 4808 : {RPCResult::Type::STR_HEX, "hex", /*optional=*/true, "The hex-encoded network transaction if complete"},
2088 : : }
2089 [ + - + - : 19232 : },
+ + - - ]
2090 : 2404 : RPCExamples{
2091 [ + - + - : 4808 : HelpExampleCli("descriptorprocesspsbt", "\"psbt\" \"[\\\"descriptor1\\\", \\\"descriptor2\\\"]\"") +
+ - ]
2092 [ + - + - : 7212 : HelpExampleCli("descriptorprocesspsbt", "\"psbt\" \"[{\\\"desc\\\":\\\"mydescriptor\\\", \\\"range\\\":21}]\"")
+ - + - ]
2093 [ + - ]: 2404 : },
2094 : 2404 : [](const RPCMethod& self, const JSONRPCRequest& request) -> UniValue
2095 : : {
2096 : : // Add descriptor information to a signing provider
2097 : 15 : FlatSigningProvider provider;
2098 : :
2099 [ + - + - : 15 : auto descs = request.params[1].get_array();
+ - ]
2100 [ - + + + ]: 91 : for (size_t i = 0; i < descs.size(); ++i) {
2101 [ + - + - ]: 76 : EvalDescriptorStringOrObject(descs[i], provider, /*expand_priv=*/true);
2102 : : }
2103 : :
2104 [ + - + + ]: 15 : std::optional<int> sighash_type = ParseSighashString(request.params[2]);
2105 [ + - + + : 14 : bool bip32derivs = request.params[3].isNull() ? true : request.params[3].get_bool();
+ - + - ]
2106 [ + - + + : 14 : bool finalize = request.params[4].isNull() ? true : request.params[4].get_bool();
+ - + - ]
2107 : :
2108 : 14 : const PartiallySignedTransaction& psbtx = ProcessPSBT(
2109 : 14 : request.params[0].get_str(),
2110 [ + - ]: 14 : request.context,
2111 : 7 : HidingSigningProvider(&provider, /*hide_secret=*/false, !bip32derivs),
2112 : : sighash_type,
2113 [ + - + - : 14 : finalize);
+ + ]
2114 : :
2115 : : // Check whether or not all of the inputs are now signed
2116 : 7 : bool complete = true;
2117 [ + + ]: 15 : for (const auto& input : psbtx.inputs) {
2118 [ + - ]: 8 : complete &= PSBTInputSigned(input);
2119 : : }
2120 : :
2121 : 7 : DataStream ssTx{};
2122 [ + - ]: 7 : ssTx << psbtx;
2123 : :
2124 : 7 : UniValue result(UniValue::VOBJ);
2125 : :
2126 [ - + + - : 14 : result.pushKV("psbt", EncodeBase64(ssTx));
+ - + - +
- ]
2127 [ + - + - : 14 : result.pushKV("complete", complete);
+ - ]
2128 [ + + ]: 7 : if (complete) {
2129 [ + - ]: 2 : CMutableTransaction mtx;
2130 [ + - ]: 2 : PartiallySignedTransaction psbtx_copy = psbtx;
2131 [ + - + - ]: 2 : CHECK_NONFATAL(FinalizeAndExtractPSBT(psbtx_copy, mtx));
2132 : 2 : DataStream ssTx_final;
2133 [ + - ]: 2 : ssTx_final << TX_WITH_WITNESS(mtx);
2134 [ - + + - : 4 : result.pushKV("hex", HexStr(ssTx_final));
+ - + - +
- ]
2135 : 4 : }
2136 : 14 : return result;
2137 : 23 : },
2138 [ + - + - : 40868 : };
+ - + - +
+ + + + +
- - - - -
- ]
2139 [ + - + - : 57696 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
- - - - -
- - - ]
2140 : :
2141 : 1302 : void RegisterRawTransactionRPCCommands(CRPCTable& t)
2142 : : {
2143 : 1302 : static const CRPCCommand commands[]{
2144 [ + - ]: 2378 : {"rawtransactions", &getrawtransaction},
2145 [ + - ]: 2378 : {"rawtransactions", &createrawtransaction},
2146 [ + - ]: 2378 : {"rawtransactions", &decoderawtransaction},
2147 [ + - ]: 2378 : {"rawtransactions", &decodescript},
2148 [ + - ]: 2378 : {"rawtransactions", &combinerawtransaction},
2149 [ + - ]: 2378 : {"rawtransactions", &signrawtransactionwithkey},
2150 [ + - ]: 2378 : {"rawtransactions", &decodepsbt},
2151 [ + - ]: 2378 : {"rawtransactions", &combinepsbt},
2152 [ + - ]: 2378 : {"rawtransactions", &finalizepsbt},
2153 [ + - ]: 2378 : {"rawtransactions", &createpsbt},
2154 [ + - ]: 2378 : {"rawtransactions", &converttopsbt},
2155 [ + - ]: 2378 : {"rawtransactions", &utxoupdatepsbt},
2156 [ + - ]: 2378 : {"rawtransactions", &descriptorprocesspsbt},
2157 [ + - ]: 2378 : {"rawtransactions", &joinpsbts},
2158 [ + - ]: 2378 : {"rawtransactions", &analyzepsbt},
2159 [ + + + - : 20326 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
- - ]
2160 [ + + ]: 20832 : for (const auto& c : commands) {
2161 : 19530 : t.appendCommand(c.name, &c);
2162 : : }
2163 : 1302 : }
|