Branch data Line data Source code
1 : : // Copyright (c) 2010 Satoshi Nakamoto
2 : : // Copyright (c) 2009-present The Bitcoin Core developers
3 : : // Distributed under the MIT software license, see the accompanying
4 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
5 : :
6 : : #include <base58.h>
7 : : #include <chain.h>
8 : : #include <coins.h>
9 : : #include <consensus/amount.h>
10 : : #include <consensus/validation.h>
11 : : #include <core_io.h>
12 : : #include <index/txindex.h>
13 : : #include <key_io.h>
14 : : #include <node/blockstorage.h>
15 : : #include <node/coin.h>
16 : : #include <node/context.h>
17 : : #include <node/psbt.h>
18 : : #include <node/transaction.h>
19 : : #include <node/types.h>
20 : : #include <policy/packages.h>
21 : : #include <policy/policy.h>
22 : : #include <policy/rbf.h>
23 : : #include <primitives/transaction.h>
24 : : #include <psbt.h>
25 : : #include <random.h>
26 : : #include <rpc/blockchain.h>
27 : : #include <rpc/rawtransaction_util.h>
28 : : #include <rpc/server.h>
29 : : #include <rpc/server_util.h>
30 : : #include <rpc/util.h>
31 : : #include <script/script.h>
32 : : #include <script/sign.h>
33 : : #include <script/signingprovider.h>
34 : : #include <script/solver.h>
35 : : #include <uint256.h>
36 : : #include <undo.h>
37 : : #include <util/bip32.h>
38 : : #include <util/check.h>
39 : : #include <util/strencodings.h>
40 : : #include <util/string.h>
41 : : #include <util/vector.h>
42 : : #include <validation.h>
43 : : #include <validationinterface.h>
44 : :
45 : : #include <cstdint>
46 : : #include <numeric>
47 : :
48 : : #include <univalue.h>
49 : :
50 : : using node::AnalyzePSBT;
51 : : using node::FindCoins;
52 : : using node::GetTransaction;
53 : : using node::NodeContext;
54 : : using node::PSBTAnalysis;
55 : :
56 : 3609 : static void TxToJSON(const CTransaction& tx, const uint256 hashBlock, UniValue& entry,
57 : : Chainstate& active_chainstate, const CTxUndo* txundo = nullptr,
58 : : TxVerbosity verbosity = TxVerbosity::SHOW_DETAILS)
59 : : {
60 : 3609 : CHECK_NONFATAL(verbosity >= TxVerbosity::SHOW_DETAILS);
61 : : // Call into TxToUniv() in bitcoin-common to decode the transaction hex.
62 : : //
63 : : // Blockchain contextual information (confirmations and blocktime) is not
64 : : // available to code in bitcoin-common, so we query them here and push the
65 : : // data into the returned UniValue.
66 : 3609 : TxToUniv(tx, /*block_hash=*/uint256(), entry, /*include_hex=*/true, txundo, verbosity);
67 : :
68 [ + + ]: 3609 : if (!hashBlock.IsNull()) {
69 : 53 : LOCK(cs_main);
70 : :
71 [ + - + - : 106 : entry.pushKV("blockhash", hashBlock.GetHex());
+ - + - ]
72 [ + - ]: 53 : const CBlockIndex* pindex = active_chainstate.m_blockman.LookupBlockIndex(hashBlock);
73 [ + - ]: 53 : if (pindex) {
74 [ + + ]: 53 : if (active_chainstate.m_chain.Contains(pindex)) {
75 [ + - + - : 102 : entry.pushKV("confirmations", 1 + active_chainstate.m_chain.Height() - pindex->nHeight);
+ - ]
76 [ + - + - : 102 : entry.pushKV("time", pindex->GetBlockTime());
+ - ]
77 [ + - + - : 102 : entry.pushKV("blocktime", pindex->GetBlockTime());
+ - ]
78 : : }
79 : : else
80 [ + - + - : 4 : entry.pushKV("confirmations", 0);
+ - ]
81 : : }
82 : 53 : }
83 : 3609 : }
84 : :
85 : 11508 : static std::vector<RPCResult> DecodeTxDoc(const std::string& txid_field_doc)
86 : : {
87 : 11508 : return {
88 : : {RPCResult::Type::STR_HEX, "txid", txid_field_doc},
89 : : {RPCResult::Type::STR_HEX, "hash", "The transaction hash (differs from txid for witness transactions)"},
90 : : {RPCResult::Type::NUM, "size", "The serialized transaction size"},
91 : : {RPCResult::Type::NUM, "vsize", "The virtual transaction size (differs from size for witness transactions)"},
92 : : {RPCResult::Type::NUM, "weight", "The transaction's weight (between vsize*4-3 and vsize*4)"},
93 : : {RPCResult::Type::NUM, "version", "The version"},
94 : : {RPCResult::Type::NUM_TIME, "locktime", "The lock time"},
95 : : {RPCResult::Type::ARR, "vin", "",
96 : : {
97 : : {RPCResult::Type::OBJ, "", "",
98 : : {
99 : : {RPCResult::Type::STR_HEX, "coinbase", /*optional=*/true, "The coinbase value (only if coinbase transaction)"},
100 : : {RPCResult::Type::STR_HEX, "txid", /*optional=*/true, "The transaction id (if not coinbase transaction)"},
101 : : {RPCResult::Type::NUM, "vout", /*optional=*/true, "The output number (if not coinbase transaction)"},
102 : : {RPCResult::Type::OBJ, "scriptSig", /*optional=*/true, "The script (if not coinbase transaction)",
103 : : {
104 : : {RPCResult::Type::STR, "asm", "Disassembly of the signature script"},
105 : : {RPCResult::Type::STR_HEX, "hex", "The raw signature script bytes, hex-encoded"},
106 : : }},
107 : : {RPCResult::Type::ARR, "txinwitness", /*optional=*/true, "",
108 : : {
109 : : {RPCResult::Type::STR_HEX, "hex", "hex-encoded witness data (if any)"},
110 : : }},
111 : : {RPCResult::Type::NUM, "sequence", "The script sequence number"},
112 : : }},
113 : : }},
114 : : {RPCResult::Type::ARR, "vout", "",
115 : : {
116 : : {RPCResult::Type::OBJ, "", "",
117 : : {
118 [ + - ]: 23016 : {RPCResult::Type::STR_AMOUNT, "value", "The value in " + CURRENCY_UNIT},
119 : : {RPCResult::Type::NUM, "n", "index"},
120 [ + - ]: 23016 : {RPCResult::Type::OBJ, "scriptPubKey", "", ScriptPubKeyDoc()},
121 : : }},
122 : : }},
123 [ + - + - : 402780 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + + +
+ + + + +
+ + + + +
+ - - - -
- - - - -
- - - -
- ]
124 [ + - + - : 276192 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - -
- - - - -
- - ]
125 : :
126 : 4830 : static std::vector<RPCArg> CreateTxDoc()
127 : : {
128 : 4830 : return {
129 [ + - ]: 4830 : {"inputs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The inputs",
130 : : {
131 [ + - ]: 4830 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
132 : : {
133 [ + - ]: 4830 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
134 [ + - ]: 4830 : {"vout", RPCArg::Type::NUM, RPCArg::Optional::NO, "The output number"},
135 [ + - ]: 9660 : {"sequence", RPCArg::Type::NUM, RPCArg::DefaultHint{"depends on the value of the 'replaceable' and 'locktime' arguments"}, "The sequence number"},
136 : : },
137 : : },
138 : : },
139 : : },
140 [ + - ]: 4830 : {"outputs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The outputs specified as key-value pairs.\n"
141 : : "Each key may only appear once, i.e. there can only be one 'data' output, and no address may be duplicated.\n"
142 : : "At least one output of either type must be specified.\n"
143 : : "For compatibility reasons, a dictionary, which holds the key-value pairs directly, is also\n"
144 : : " accepted as second parameter.",
145 : : {
146 [ + - ]: 4830 : {"", RPCArg::Type::OBJ_USER_KEYS, RPCArg::Optional::OMITTED, "",
147 : : {
148 [ + - ]: 9660 : {"address", RPCArg::Type::AMOUNT, RPCArg::Optional::NO, "A key-value pair. The key (string) is the bitcoin address, the value (float or string) is the amount in " + CURRENCY_UNIT},
149 : : },
150 : : },
151 [ + - ]: 4830 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
152 : : {
153 [ + - ]: 4830 : {"data", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "A key-value pair. The key must be \"data\", the value is hex-encoded data that becomes a part of an OP_RETURN output"},
154 : : },
155 : : },
156 : : },
157 [ + - ]: 4830 : RPCArgOptions{.skip_type_check = true}},
158 [ + - ]: 9660 : {"locktime", RPCArg::Type::NUM, RPCArg::Default{0}, "Raw locktime. Non-0 value also locktime-activates inputs"},
159 [ + - ]: 9660 : {"replaceable", RPCArg::Type::BOOL, RPCArg::Default{true}, "Marks this transaction as BIP125-replaceable.\n"
160 : : "Allows this transaction to be replaced by a transaction with higher fees. If provided, it is an error if explicit sequence numbers are incompatible."},
161 [ + - + - : 217350 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + +
+ + + + +
+ + + + +
- - - - -
- - - - -
- - ]
162 [ + - + - : 115920 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - - - -
- - - ]
163 : :
164 : : // Update PSBT with information from the mempool, the UTXO set, the txindex, and the provided descriptors.
165 : : // Optionally, sign the inputs that we can using information from the descriptors.
166 : 14 : PartiallySignedTransaction ProcessPSBT(const std::string& psbt_string, const std::any& context, const HidingSigningProvider& provider, std::optional<int> sighash_type, bool finalize)
167 : : {
168 : : // Unserialize the transactions
169 : 14 : PartiallySignedTransaction psbtx;
170 [ + - ]: 14 : std::string error;
171 [ + - - + ]: 14 : if (!DecodeBase64PSBT(psbtx, psbt_string, error)) {
172 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
173 : : }
174 : :
175 [ - + - - ]: 14 : if (g_txindex) g_txindex->BlockUntilSyncedToCurrentChain();
176 [ + - ]: 14 : const NodeContext& node = EnsureAnyNodeContext(context);
177 : :
178 : : // If we can't find the corresponding full transaction for all of our inputs,
179 : : // this will be used to find just the utxos for the segwit inputs for which
180 : : // the full transaction isn't found
181 : 14 : std::map<COutPoint, Coin> coins;
182 : :
183 : : // Fetch previous transactions:
184 : : // First, look in the txindex and the mempool
185 [ + + ]: 33 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
186 [ + - ]: 19 : PSBTInput& psbt_input = psbtx.inputs.at(i);
187 [ + - ]: 19 : const CTxIn& tx_in = psbtx.tx->vin.at(i);
188 : :
189 : : // The `non_witness_utxo` is the whole previous transaction
190 [ + + ]: 19 : if (psbt_input.non_witness_utxo) continue;
191 : :
192 : 9 : CTransactionRef tx;
193 : :
194 : : // Look in the txindex
195 [ - + ]: 9 : if (g_txindex) {
196 : 0 : uint256 block_hash;
197 [ # # ]: 0 : g_txindex->FindTx(tx_in.prevout.hash, block_hash, tx);
198 : : }
199 : : // If we still don't have it look in the mempool
200 [ + - ]: 9 : if (!tx) {
201 [ + - - + ]: 18 : tx = node.mempool->get(tx_in.prevout.hash);
202 : : }
203 [ + - ]: 9 : if (tx) {
204 : 9 : psbt_input.non_witness_utxo = tx;
205 : : } else {
206 [ # # ]: 0 : coins[tx_in.prevout]; // Create empty map entry keyed by prevout
207 : : }
208 : 9 : }
209 : :
210 : : // If we still haven't found all of the inputs, look for the missing ones in the utxo set
211 [ - + ]: 14 : if (!coins.empty()) {
212 [ # # ]: 0 : FindCoins(node, coins);
213 [ # # ]: 0 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
214 [ # # ]: 0 : PSBTInput& input = psbtx.inputs.at(i);
215 : :
216 : : // If there are still missing utxos, add them if they were found in the utxo set
217 [ # # ]: 0 : if (!input.non_witness_utxo) {
218 [ # # ]: 0 : const CTxIn& tx_in = psbtx.tx->vin.at(i);
219 [ # # ]: 0 : const Coin& coin = coins.at(tx_in.prevout);
220 [ # # # # : 0 : if (!coin.out.IsNull() && IsSegWitOutput(provider, coin.out.scriptPubKey)) {
# # ]
221 : 0 : input.witness_utxo = coin.out;
222 : : }
223 : : }
224 : : }
225 : : }
226 : :
227 [ + - ]: 14 : const PrecomputedTransactionData& txdata = PrecomputePSBTData(psbtx);
228 : :
229 [ + + ]: 26 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
230 [ + - + - : 19 : if (PSBTInputSigned(psbtx.inputs.at(i))) {
- + ]
231 : 0 : continue;
232 : : }
233 : :
234 : : // Update script/keypath information using descriptor data.
235 : : // Note that SignPSBTInput does a lot more than just constructing ECDSA signatures.
236 : : // We only actually care about those if our signing provider doesn't hide private
237 : : // information, as is the case with `descriptorprocesspsbt`
238 : : // Only error for mismatching sighash types as it is critical that the sighash to sign with matches the PSBT's
239 [ + - + + ]: 19 : if (SignPSBTInput(provider, psbtx, /*index=*/i, &txdata, sighash_type, /*out_sigdata=*/nullptr, finalize) == common::PSBTError::SIGHASH_MISMATCH) {
240 [ + - ]: 7 : throw JSONRPCPSBTError(common::PSBTError::SIGHASH_MISMATCH);
241 : : }
242 : : }
243 : :
244 : : // Update script/keypath information using descriptor data.
245 [ + + ]: 16 : for (unsigned int i = 0; i < psbtx.tx->vout.size(); ++i) {
246 [ + - ]: 9 : UpdatePSBTOutput(provider, psbtx, i);
247 : : }
248 : :
249 [ + - ]: 7 : RemoveUnnecessaryTransactions(psbtx);
250 : :
251 : 7 : return psbtx;
252 : 28 : }
253 : :
254 : 6174 : static RPCHelpMan getrawtransaction()
255 : : {
256 : 6174 : return RPCHelpMan{
257 : : "getrawtransaction",
258 : :
259 : : "By default, this call only returns a transaction if it is in the mempool. If -txindex is enabled\n"
260 : : "and no blockhash argument is passed, it will return the transaction if it is in the mempool or any block.\n"
261 : : "If a blockhash argument is passed, it will return the transaction if\n"
262 : : "the specified block is available and the transaction is in that block.\n\n"
263 : : "Hint: Use gettransaction for wallet transactions.\n\n"
264 : :
265 : : "If verbosity is 0 or omitted, returns the serialized transaction as a hex-encoded string.\n"
266 : : "If verbosity is 1, returns a JSON Object with information about the transaction.\n"
267 : : "If verbosity is 2, returns a JSON Object with information about the transaction, including fee and prevout information.",
268 : : {
269 [ + - ]: 6174 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
270 [ + - ]: 12348 : {"verbosity|verbose", RPCArg::Type::NUM, RPCArg::Default{0}, "0 for hex-encoded data, 1 for a JSON object, and 2 for JSON object with fee and prevout",
271 [ + - ]: 12348 : RPCArgOptions{.skip_type_check = true}},
272 [ + - ]: 6174 : {"blockhash", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "The block in which to look for the transaction"},
273 : : },
274 : : {
275 : : RPCResult{"if verbosity is not set or set to 0",
276 : : RPCResult::Type::STR, "data", "The serialized transaction as a hex-encoded string for 'txid'"
277 [ + - + - : 12348 : },
+ - + - ]
278 : : RPCResult{"if verbosity is set to 1",
279 : : RPCResult::Type::OBJ, "", "",
280 [ + - + - : 61740 : Cat<std::vector<RPCResult>>(
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
+ - - ]
281 : : {
282 : : {RPCResult::Type::BOOL, "in_active_chain", /*optional=*/true, "Whether specified block is in the active chain or not (only present with explicit \"blockhash\" argument)"},
283 : : {RPCResult::Type::STR_HEX, "blockhash", /*optional=*/true, "the block hash"},
284 : : {RPCResult::Type::NUM, "confirmations", /*optional=*/true, "The confirmations"},
285 [ + - ]: 12348 : {RPCResult::Type::NUM_TIME, "blocktime", /*optional=*/true, "The block time expressed in " + UNIX_EPOCH_TIME},
286 : : {RPCResult::Type::NUM, "time", /*optional=*/true, "Same as \"blocktime\""},
287 : : {RPCResult::Type::STR_HEX, "hex", "The serialized, hex-encoded data for 'txid'"},
288 : : },
289 [ + - + - ]: 12348 : DecodeTxDoc(/*txid_field_doc=*/"The transaction id (same as provided)")),
290 [ + - + - : 12348 : },
+ - ]
291 : : RPCResult{"for verbosity = 2",
292 : : RPCResult::Type::OBJ, "", "",
293 : : {
294 : : {RPCResult::Type::ELISION, "", "Same output as verbosity = 1"},
295 [ + - ]: 12348 : {RPCResult::Type::NUM, "fee", /*optional=*/true, "transaction fee in " + CURRENCY_UNIT + ", omitted if block undo data is not available"},
296 : : {RPCResult::Type::ARR, "vin", "",
297 : : {
298 : : {RPCResult::Type::OBJ, "", "utxo being spent",
299 : : {
300 : : {RPCResult::Type::ELISION, "", "Same output as verbosity = 1"},
301 : : {RPCResult::Type::OBJ, "prevout", /*optional=*/true, "The previous output, omitted if block undo data is not available",
302 : : {
303 : : {RPCResult::Type::BOOL, "generated", "Coinbase or not"},
304 : : {RPCResult::Type::NUM, "height", "The height of the prevout"},
305 [ + - ]: 12348 : {RPCResult::Type::STR_AMOUNT, "value", "The value in " + CURRENCY_UNIT},
306 [ + - ]: 12348 : {RPCResult::Type::OBJ, "scriptPubKey", "", ScriptPubKeyDoc()},
307 : : }},
308 : : }},
309 : : }},
310 [ + - + - : 129654 : }},
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + +
+ + + + +
+ - - - -
- - - - ]
311 : : },
312 : 6174 : RPCExamples{
313 [ + - + - : 12348 : HelpExampleCli("getrawtransaction", "\"mytxid\"")
+ - ]
314 [ + - + - : 24696 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 1")
+ - + - ]
315 [ + - + - : 24696 : + HelpExampleRpc("getrawtransaction", "\"mytxid\", 1")
+ - + - ]
316 [ + - + - : 24696 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 0 \"myblockhash\"")
+ - + - ]
317 [ + - + - : 24696 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 1 \"myblockhash\"")
+ - + - ]
318 [ + - + - : 24696 : + HelpExampleCli("getrawtransaction", "\"mytxid\" 2 \"myblockhash\"")
+ - + - ]
319 [ + - ]: 6174 : },
320 : 3985 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
321 : : {
322 : 3985 : const NodeContext& node = EnsureAnyNodeContext(request.context);
323 : 3985 : ChainstateManager& chainman = EnsureChainman(node);
324 : :
325 : 3985 : uint256 hash = ParseHashV(request.params[0], "parameter 1");
326 : 3984 : const CBlockIndex* blockindex = nullptr;
327 : :
328 [ + + ]: 3984 : if (hash == chainman.GetParams().GenesisBlock().hashMerkleRoot) {
329 : : // Special exception for the genesis block coinbase transaction
330 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "The genesis block coinbase is not considered an ordinary transaction and cannot be retrieved");
331 : : }
332 : :
333 : 3983 : int verbosity{ParseVerbosity(request.params[1], /*default_verbosity=*/0, /*allow_bool=*/true)};
334 : :
335 [ + + ]: 3971 : if (!request.params[2].isNull()) {
336 : 40 : LOCK(cs_main);
337 : :
338 [ + - + + ]: 40 : uint256 blockhash = ParseHashV(request.params[2], "parameter 3");
339 [ + - ]: 34 : blockindex = chainman.m_blockman.LookupBlockIndex(blockhash);
340 [ + + ]: 34 : if (!blockindex) {
341 [ + - + - ]: 4 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Block hash not found");
342 : : }
343 : 40 : }
344 : :
345 : 3963 : bool f_txindex_ready = false;
346 [ + + + + ]: 3963 : if (g_txindex && !blockindex) {
347 : 33 : f_txindex_ready = g_txindex->BlockUntilSyncedToCurrentChain();
348 : : }
349 : :
350 : 3963 : uint256 hash_block;
351 : 3963 : const CTransactionRef tx = GetTransaction(blockindex, node.mempool.get(), hash, hash_block, chainman.m_blockman);
352 [ + + ]: 3963 : if (!tx) {
353 [ + + ]: 8 : std::string errmsg;
354 [ + + ]: 8 : if (blockindex) {
355 [ + - + - ]: 4 : const bool block_has_data = WITH_LOCK(::cs_main, return blockindex->nStatus & BLOCK_HAVE_DATA);
356 [ - + ]: 2 : if (!block_has_data) {
357 [ # # # # ]: 0 : throw JSONRPCError(RPC_MISC_ERROR, "Block not available");
358 : : }
359 [ + - ]: 2 : errmsg = "No such transaction found in the provided block";
360 [ + - ]: 6 : } else if (!g_txindex) {
361 [ + - ]: 6 : errmsg = "No such mempool transaction. Use -txindex or provide a block hash to enable blockchain transaction queries";
362 [ # # ]: 0 : } else if (!f_txindex_ready) {
363 [ # # ]: 0 : errmsg = "No such mempool transaction. Blockchain transactions are still in the process of being indexed";
364 : : } else {
365 [ # # ]: 0 : errmsg = "No such mempool or blockchain transaction";
366 : : }
367 [ + - + - ]: 16 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, errmsg + ". Use gettransaction for wallet transactions.");
368 : 8 : }
369 : :
370 [ + + ]: 3955 : if (verbosity <= 0) {
371 [ + - + - ]: 692 : return EncodeHexTx(*tx);
372 : : }
373 : :
374 : 3609 : UniValue result(UniValue::VOBJ);
375 [ + + ]: 3609 : if (blockindex) {
376 [ + - ]: 29 : LOCK(cs_main);
377 [ + - + - : 58 : result.pushKV("in_active_chain", chainman.ActiveChain().Contains(blockindex));
+ - + - +
- ]
378 : 29 : }
379 : : // If request is verbosity >= 1 but no blockhash was given, then look up the blockindex
380 [ + - + + ]: 3609 : if (request.params[2].isNull()) {
381 [ + - ]: 3580 : LOCK(cs_main);
382 [ + - + - ]: 3580 : blockindex = chainman.m_blockman.LookupBlockIndex(hash_block); // May be nullptr for mempool transactions
383 : 3580 : }
384 [ + + ]: 3609 : if (verbosity == 1) {
385 [ + - + - ]: 3602 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate());
386 : 3602 : return result;
387 : : }
388 : :
389 : 7 : CBlockUndo blockUndo;
390 : 7 : CBlock block;
391 : :
392 [ + + + + : 12 : if (tx->IsCoinBase() || !blockindex || WITH_LOCK(::cs_main, return !(blockindex->nStatus & BLOCK_HAVE_MASK))) {
+ - + - +
- ]
393 [ + - + - ]: 2 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate());
394 : 2 : return result;
395 : : }
396 [ + - - + ]: 5 : if (!chainman.m_blockman.ReadBlockUndo(blockUndo, *blockindex)) {
397 [ # # # # ]: 0 : throw JSONRPCError(RPC_INTERNAL_ERROR, "Undo data expected but can't be read. This could be due to disk corruption or a conflict with a pruning event.");
398 : : }
399 [ + - - + ]: 5 : if (!chainman.m_blockman.ReadBlock(block, *blockindex)) {
400 [ # # # # ]: 0 : throw JSONRPCError(RPC_INTERNAL_ERROR, "Block data expected but can't be read. This could be due to disk corruption or a conflict with a pruning event.");
401 : : }
402 : :
403 : 5 : CTxUndo* undoTX {nullptr};
404 [ + - + - : 65 : auto it = std::find_if(block.vtx.begin(), block.vtx.end(), [tx](CTransactionRef t){ return *t == *tx; });
+ - + - +
- + - + -
+ - + - +
- + - ]
405 [ + - ]: 5 : if (it != block.vtx.end()) {
406 : : // -1 as blockundo does not have coinbase tx
407 [ + - ]: 5 : undoTX = &blockUndo.vtxundo.at(it - block.vtx.begin() - 1);
408 : : }
409 [ + - + - ]: 5 : TxToJSON(*tx, hash_block, result, chainman.ActiveChainstate(), undoTX, TxVerbosity::SHOW_DETAILS_AND_PREVOUT);
410 : 5 : return result;
411 : 7564 : },
412 [ + - + - : 129654 : };
+ - + - +
- + - + -
+ - + - +
- + - + +
+ + - - -
- ]
413 [ + - + - : 160524 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - -
- - - - -
- - - - -
- ]
414 : :
415 : 2585 : static RPCHelpMan createrawtransaction()
416 : : {
417 : 2585 : return RPCHelpMan{
418 : : "createrawtransaction",
419 : : "Create a transaction spending the given inputs and creating new outputs.\n"
420 : : "Outputs can be addresses or data.\n"
421 : : "Returns hex-encoded raw transaction.\n"
422 : : "Note that the transaction's inputs are not signed, and\n"
423 : : "it is not stored in the wallet or transmitted to the network.\n",
424 [ + - ]: 5170 : CreateTxDoc(),
425 : 0 : RPCResult{
426 : : RPCResult::Type::STR_HEX, "transaction", "hex string of the transaction"
427 [ + - + - : 5170 : },
+ - ]
428 : 2585 : RPCExamples{
429 [ + - + - : 5170 : HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"address\\\":0.01}]\"")
+ - ]
430 [ + - + - : 10340 : + HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"data\\\":\\\"00010203\\\"}]\"")
+ - + - ]
431 [ + - + - : 10340 : + HelpExampleRpc("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\", \"[{\\\"address\\\":0.01}]\"")
+ - + - ]
432 [ + - + - : 10340 : + HelpExampleRpc("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\", \"[{\\\"data\\\":\\\"00010203\\\"}]\"")
+ - + - ]
433 [ + - ]: 2585 : },
434 : 390 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
435 : : {
436 : 390 : std::optional<bool> rbf;
437 [ + + ]: 390 : if (!request.params[3].isNull()) {
438 : 10 : rbf = request.params[3].get_bool();
439 : : }
440 : 390 : CMutableTransaction rawTx = ConstructTransaction(request.params[0], request.params[1], request.params[2], rbf);
441 : :
442 [ + - + - : 1092 : return EncodeHexTx(CTransaction(rawTx));
+ - ]
443 : 364 : },
444 [ + - + - : 15510 : };
+ - ]
445 : : }
446 : :
447 : 5334 : static RPCHelpMan decoderawtransaction()
448 : : {
449 : 5334 : return RPCHelpMan{"decoderawtransaction",
450 : : "Return a JSON object representing the serialized, hex-encoded transaction.",
451 : : {
452 [ + - ]: 5334 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction hex string"},
453 [ + - ]: 10668 : {"iswitness", RPCArg::Type::BOOL, RPCArg::DefaultHint{"depends on heuristic tests"}, "Whether the transaction hex is a serialized witness transaction.\n"
454 : : "If iswitness is not present, heuristic tests will be used in decoding.\n"
455 : : "If true, only witness deserialization will be tried.\n"
456 : : "If false, only non-witness deserialization will be tried.\n"
457 : : "This boolean should reflect whether the transaction has inputs\n"
458 : : "(e.g. fully valid, or on-chain transactions), if known by the caller."
459 : : },
460 : : },
461 : 0 : RPCResult{
462 : : RPCResult::Type::OBJ, "", "",
463 [ + - + - ]: 10668 : DecodeTxDoc(/*txid_field_doc=*/"The transaction id"),
464 [ + - + - : 16002 : },
+ - ]
465 : 5334 : RPCExamples{
466 [ + - + - : 10668 : HelpExampleCli("decoderawtransaction", "\"hexstring\"")
+ - ]
467 [ + - + - : 21336 : + HelpExampleRpc("decoderawtransaction", "\"hexstring\"")
+ - + - ]
468 [ + - ]: 5334 : },
469 : 3146 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
470 : : {
471 : 3146 : CMutableTransaction mtx;
472 : :
473 [ + - + + : 3146 : bool try_witness = request.params[1].isNull() ? true : request.params[1].get_bool();
+ - + - ]
474 [ + - + + : 3146 : bool try_no_witness = request.params[1].isNull() ? true : !request.params[1].get_bool();
+ - + - ]
475 : :
476 [ + - + - : 3146 : if (!DecodeHexTx(mtx, request.params[0].get_str(), try_no_witness, try_witness)) {
+ - + + ]
477 [ + - + - ]: 14 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed");
478 : : }
479 : :
480 : 3139 : UniValue result(UniValue::VOBJ);
481 [ + - + - ]: 3139 : TxToUniv(CTransaction(std::move(mtx)), /*block_hash=*/uint256(), /*entry=*/result, /*include_hex=*/false);
482 : :
483 : 3139 : return result;
484 : 3139 : },
485 [ + - + - : 74676 : };
+ - + - +
- + - + -
+ - + + -
- ]
486 [ + - + - : 26670 : }
+ - - - ]
487 : :
488 : 2217 : static RPCHelpMan decodescript()
489 : : {
490 : 2217 : return RPCHelpMan{
491 : : "decodescript",
492 : : "Decode a hex-encoded script.\n",
493 : : {
494 [ + - ]: 2217 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "the hex-encoded script"},
495 : : },
496 : 0 : RPCResult{
497 : : RPCResult::Type::OBJ, "", "",
498 : : {
499 : : {RPCResult::Type::STR, "asm", "Disassembly of the script"},
500 : : {RPCResult::Type::STR, "desc", "Inferred descriptor for the script"},
501 [ + - + - ]: 4434 : {RPCResult::Type::STR, "type", "The output type (e.g. " + GetAllOutputTypes() + ")"},
502 : : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
503 : : {RPCResult::Type::STR, "p2sh", /*optional=*/true,
504 : : "address of P2SH script wrapping this redeem script (not returned for types that should not be wrapped)"},
505 : : {RPCResult::Type::OBJ, "segwit", /*optional=*/true,
506 : : "Result of a witness output script wrapping this redeem script (not returned for types that should not be wrapped)",
507 : : {
508 : : {RPCResult::Type::STR, "asm", "Disassembly of the output script"},
509 : : {RPCResult::Type::STR_HEX, "hex", "The raw output script bytes, hex-encoded"},
510 : : {RPCResult::Type::STR, "type", "The type of the output script (e.g. witness_v0_keyhash or witness_v0_scripthash)"},
511 : : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
512 : : {RPCResult::Type::STR, "desc", "Inferred descriptor for the script"},
513 : : {RPCResult::Type::STR, "p2sh-segwit", "address of the P2SH script wrapping this witness redeem script"},
514 : : }},
515 : : },
516 [ + - + - : 37689 : },
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
+ + + - -
- - ]
517 : 2217 : RPCExamples{
518 [ + - + - : 4434 : HelpExampleCli("decodescript", "\"hexstring\"")
+ - ]
519 [ + - + - : 8868 : + HelpExampleRpc("decodescript", "\"hexstring\"")
+ - + - ]
520 [ + - ]: 2217 : },
521 : 31 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
522 : : {
523 : 31 : UniValue r(UniValue::VOBJ);
524 : 31 : CScript script;
525 [ + - + - : 31 : if (request.params[0].get_str().size() > 0){
+ - ]
526 [ + - + - ]: 31 : std::vector<unsigned char> scriptData(ParseHexV(request.params[0], "argument"));
527 : 31 : script = CScript(scriptData.begin(), scriptData.end());
528 : 31 : } else {
529 : : // Empty scripts are valid
530 : : }
531 [ + - ]: 31 : ScriptToUniv(script, /*out=*/r, /*include_hex=*/false, /*include_address=*/true);
532 : :
533 : 31 : std::vector<std::vector<unsigned char>> solutions_data;
534 [ + - ]: 31 : const TxoutType which_type{Solver(script, solutions_data)};
535 : :
536 : 62 : const bool can_wrap{[&] {
537 [ + + ]: 31 : switch (which_type) {
538 : : case TxoutType::MULTISIG:
539 : : case TxoutType::NONSTANDARD:
540 : : case TxoutType::PUBKEY:
541 : : case TxoutType::PUBKEYHASH:
542 : : case TxoutType::WITNESS_V0_KEYHASH:
543 : : case TxoutType::WITNESS_V0_SCRIPTHASH:
544 : : // Can be wrapped if the checks below pass
545 : : break;
546 : : case TxoutType::NULL_DATA:
547 : : case TxoutType::SCRIPTHASH:
548 : : case TxoutType::WITNESS_UNKNOWN:
549 : : case TxoutType::WITNESS_V1_TAPROOT:
550 : : case TxoutType::ANCHOR:
551 : : // Should not be wrapped
552 : : return false;
553 : : } // no default case, so the compiler can warn about missing cases
554 [ + + + - ]: 21 : if (!script.HasValidOps() || script.IsUnspendable()) {
555 : : return false;
556 : : }
557 [ + + + + ]: 130 : for (CScript::const_iterator it{script.begin()}; it != script.end();) {
558 : 95 : opcodetype op;
559 : 95 : CHECK_NONFATAL(script.GetOp(it, op));
560 [ + - + + : 96 : if (op == OP_CHECKSIGADD || IsOpSuccess(op)) {
+ + ]
561 : : return false;
562 : : }
563 : : }
564 : : return true;
565 [ + - ]: 31 : }()};
566 : :
567 [ + + ]: 31 : if (can_wrap) {
568 [ + - + - : 34 : r.pushKV("p2sh", EncodeDestination(ScriptHash(script)));
+ - + - +
- ]
569 : : // P2SH and witness programs cannot be wrapped in P2WSH, if this script
570 : : // is a witness program, don't return addresses for a segwit programs.
571 : 34 : const bool can_wrap_P2WSH{[&] {
572 [ + + - + ]: 17 : switch (which_type) {
573 : 4 : case TxoutType::MULTISIG:
574 : 4 : case TxoutType::PUBKEY:
575 : : // Uncompressed pubkeys cannot be used with segwit checksigs.
576 : : // If the script contains an uncompressed pubkey, skip encoding of a segwit program.
577 [ + + ]: 12 : for (const auto& solution : solutions_data) {
578 [ + + + + ]: 10 : if ((solution.size() != 1) && !CPubKey(solution).IsCompressed()) {
579 : : return false;
580 : : }
581 : : }
582 : : return true;
583 : : case TxoutType::NONSTANDARD:
584 : : case TxoutType::PUBKEYHASH:
585 : : // Can be P2WSH wrapped
586 : : return true;
587 : 3 : case TxoutType::NULL_DATA:
588 : 3 : case TxoutType::SCRIPTHASH:
589 : 3 : case TxoutType::WITNESS_UNKNOWN:
590 : 3 : case TxoutType::WITNESS_V0_KEYHASH:
591 : 3 : case TxoutType::WITNESS_V0_SCRIPTHASH:
592 : 3 : case TxoutType::WITNESS_V1_TAPROOT:
593 : 3 : case TxoutType::ANCHOR:
594 : : // Should not be wrapped
595 : 3 : return false;
596 : : } // no default case, so the compiler can warn about missing cases
597 [ # # ]: 0 : NONFATAL_UNREACHABLE();
598 [ + - ]: 17 : }()};
599 [ + + ]: 17 : if (can_wrap_P2WSH) {
600 : 12 : UniValue sr(UniValue::VOBJ);
601 : 12 : CScript segwitScr;
602 : 12 : FlatSigningProvider provider;
603 [ + + ]: 12 : if (which_type == TxoutType::PUBKEY) {
604 [ + - + - ]: 2 : segwitScr = GetScriptForDestination(WitnessV0KeyHash(Hash160(solutions_data[0])));
605 [ + + ]: 11 : } else if (which_type == TxoutType::PUBKEYHASH) {
606 [ + - ]: 2 : segwitScr = GetScriptForDestination(WitnessV0KeyHash(uint160{solutions_data[0]}));
607 : : } else {
608 : : // Scripts that are not fit for P2WPKH are encoded as P2WSH.
609 [ + - + - ]: 10 : provider.scripts[CScriptID(script)] = script;
610 [ + - + - ]: 20 : segwitScr = GetScriptForDestination(WitnessV0ScriptHash(script));
611 : : }
612 [ + - ]: 12 : ScriptToUniv(segwitScr, /*out=*/sr, /*include_hex=*/true, /*include_address=*/true, /*provider=*/&provider);
613 [ + - + - : 24 : sr.pushKV("p2sh-segwit", EncodeDestination(ScriptHash(segwitScr)));
+ - + - +
- ]
614 [ + - + - ]: 24 : r.pushKV("segwit", std::move(sr));
615 : 12 : }
616 : : }
617 : :
618 : 62 : return r;
619 : 31 : },
620 [ + - + - : 19953 : };
+ - + - +
- + - + +
- - ]
621 [ + - + - : 35472 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- - - -
- ]
622 : :
623 : 2266 : static RPCHelpMan combinerawtransaction()
624 : : {
625 : 2266 : return RPCHelpMan{
626 : : "combinerawtransaction",
627 : : "Combine multiple partially signed transactions into one transaction.\n"
628 : : "The combined transaction may be another partially signed transaction or a \n"
629 : : "fully signed transaction.",
630 : : {
631 [ + - ]: 2266 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The hex strings of partially signed transactions",
632 : : {
633 [ + - ]: 2266 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "A hex-encoded raw transaction"},
634 : : },
635 : : },
636 : : },
637 : 0 : RPCResult{
638 : : RPCResult::Type::STR, "", "The hex-encoded raw transaction with signature(s)"
639 [ + - + - : 4532 : },
+ - ]
640 : 2266 : RPCExamples{
641 [ + - + - : 4532 : HelpExampleCli("combinerawtransaction", R"('["myhex1", "myhex2", "myhex3"]')")
+ - ]
642 [ + - ]: 2266 : },
643 : 80 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
644 : : {
645 : :
646 : 80 : UniValue txs = request.params[0].get_array();
647 [ + - ]: 80 : std::vector<CMutableTransaction> txVariants(txs.size());
648 : :
649 [ + + ]: 180 : for (unsigned int idx = 0; idx < txs.size(); idx++) {
650 [ + - + - : 120 : if (!DecodeHexTx(txVariants[idx], txs[idx].get_str())) {
+ - + + ]
651 [ + - + - ]: 40 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed for tx %d. Make sure the tx has at least one input.", idx));
652 : : }
653 : : }
654 : :
655 [ + + ]: 60 : if (txVariants.empty()) {
656 [ + - + - ]: 40 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "Missing transactions");
657 : : }
658 : :
659 : : // mergedTx will end up with all the signatures; it
660 : : // starts as a clone of the rawtx:
661 [ + - ]: 40 : CMutableTransaction mergedTx(txVariants[0]);
662 : :
663 : : // Fetch previous transactions (inputs):
664 : 40 : CCoinsView viewDummy;
665 [ + - ]: 40 : CCoinsViewCache view(&viewDummy);
666 : 40 : {
667 [ + - ]: 40 : NodeContext& node = EnsureAnyNodeContext(request.context);
668 [ + - ]: 40 : const CTxMemPool& mempool = EnsureMemPool(node);
669 [ + - ]: 40 : ChainstateManager& chainman = EnsureChainman(node);
670 [ + - + - ]: 40 : LOCK2(cs_main, mempool.cs);
671 [ + - + - ]: 40 : CCoinsViewCache &viewChain = chainman.ActiveChainstate().CoinsTip();
672 [ + - ]: 40 : CCoinsViewMemPool viewMempool(&viewChain, mempool);
673 [ + - ]: 40 : view.SetBackend(viewMempool); // temporarily switch cache backend to db+mempool view
674 : :
675 [ + + ]: 80 : for (const CTxIn& txin : mergedTx.vin) {
676 [ + - ]: 40 : view.AccessCoin(txin.prevout); // Load entries from viewChain into view; can fail.
677 : : }
678 : :
679 [ + - ]: 40 : view.SetBackend(viewDummy); // switch back to avoid locking mempool for too long
680 [ + - + - ]: 80 : }
681 : :
682 : : // Use CTransaction for the constant parts of the
683 : : // transaction to avoid rehashing.
684 [ + - ]: 40 : const CTransaction txConst(mergedTx);
685 : : // Sign what we can:
686 [ + + ]: 60 : for (unsigned int i = 0; i < mergedTx.vin.size(); i++) {
687 [ + - ]: 40 : CTxIn& txin = mergedTx.vin[i];
688 [ + - ]: 40 : const Coin& coin = view.AccessCoin(txin.prevout);
689 [ + + ]: 40 : if (coin.IsSpent()) {
690 [ + - + - ]: 40 : throw JSONRPCError(RPC_VERIFY_ERROR, "Input not found or already spent");
691 : : }
692 : 20 : SignatureData sigdata;
693 : :
694 : : // ... and merge in other signatures:
695 [ + + ]: 60 : for (const CMutableTransaction& txv : txVariants) {
696 [ + - ]: 40 : if (txv.vin.size() > i) {
697 [ + - + - ]: 40 : sigdata.MergeSignatureData(DataFromTransaction(txv, i, coin.out));
698 : : }
699 : : }
700 [ + - + - ]: 20 : ProduceSignature(DUMMY_SIGNING_PROVIDER, MutableTransactionSignatureCreator(mergedTx, i, coin.out.nValue, 1), coin.out.scriptPubKey, sigdata);
701 : :
702 [ + - ]: 20 : UpdateInput(txin, sigdata);
703 : 20 : }
704 : :
705 [ + - + - : 80 : return EncodeHexTx(CTransaction(mergedTx));
+ - ]
706 : 200 : },
707 [ + - + - : 27192 : };
+ - + - +
- + - + -
+ - + - +
+ + + - -
- - ]
708 [ + - + - : 11330 : }
+ - ]
709 : :
710 : 2365 : static RPCHelpMan signrawtransactionwithkey()
711 : : {
712 : 2365 : return RPCHelpMan{
713 : : "signrawtransactionwithkey",
714 : : "Sign inputs for raw transaction (serialized, hex-encoded).\n"
715 : : "The second argument is an array of base58-encoded private\n"
716 : : "keys that will be the only keys used to sign the transaction.\n"
717 : : "The third optional argument (may be null) is an array of previous transaction outputs that\n"
718 : : "this transaction depends on but may not yet be in the block chain.\n",
719 : : {
720 [ + - ]: 2365 : {"hexstring", RPCArg::Type::STR, RPCArg::Optional::NO, "The transaction hex string"},
721 [ + - ]: 2365 : {"privkeys", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base58-encoded private keys for signing",
722 : : {
723 [ + - ]: 2365 : {"privatekey", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "private key in base58-encoding"},
724 : : },
725 : : },
726 [ + - ]: 2365 : {"prevtxs", RPCArg::Type::ARR, RPCArg::Optional::OMITTED, "The previous dependent transaction outputs",
727 : : {
728 [ + - ]: 2365 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
729 : : {
730 [ + - ]: 2365 : {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The transaction id"},
731 [ + - ]: 2365 : {"vout", RPCArg::Type::NUM, RPCArg::Optional::NO, "The output number"},
732 [ + - ]: 2365 : {"scriptPubKey", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "output script"},
733 [ + - ]: 2365 : {"redeemScript", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "(required for P2SH) redeem script"},
734 [ + - ]: 2365 : {"witnessScript", RPCArg::Type::STR_HEX, RPCArg::Optional::OMITTED, "(required for P2WSH or P2SH-P2WSH) witness script"},
735 [ + - ]: 2365 : {"amount", RPCArg::Type::AMOUNT, RPCArg::Optional::OMITTED, "(required for Segwit inputs) the amount spent"},
736 : : },
737 : : },
738 : : },
739 : : },
740 [ + - ]: 4730 : {"sighashtype", RPCArg::Type::STR, RPCArg::Default{"DEFAULT for Taproot, ALL otherwise"}, "The signature hash type. Must be one of:\n"
741 : : " \"DEFAULT\"\n"
742 : : " \"ALL\"\n"
743 : : " \"NONE\"\n"
744 : : " \"SINGLE\"\n"
745 : : " \"ALL|ANYONECANPAY\"\n"
746 : : " \"NONE|ANYONECANPAY\"\n"
747 : : " \"SINGLE|ANYONECANPAY\"\n"
748 : : },
749 : : },
750 : 0 : RPCResult{
751 : : RPCResult::Type::OBJ, "", "",
752 : : {
753 : : {RPCResult::Type::STR_HEX, "hex", "The hex-encoded raw transaction with signature(s)"},
754 : : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
755 : : {RPCResult::Type::ARR, "errors", /*optional=*/true, "Script verification errors (if there are any)",
756 : : {
757 : : {RPCResult::Type::OBJ, "", "",
758 : : {
759 : : {RPCResult::Type::STR_HEX, "txid", "The hash of the referenced, previous transaction"},
760 : : {RPCResult::Type::NUM, "vout", "The index of the output to spent and used as input"},
761 : : {RPCResult::Type::ARR, "witness", "",
762 : : {
763 : : {RPCResult::Type::STR_HEX, "witness", ""},
764 : : }},
765 : : {RPCResult::Type::STR_HEX, "scriptSig", "The hex-encoded signature script"},
766 : : {RPCResult::Type::NUM, "sequence", "Script sequence number"},
767 : : {RPCResult::Type::STR, "error", "Verification or signing error related to the input"},
768 : : }},
769 : : }},
770 : : }
771 [ + - + - : 37840 : },
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ + + + +
+ + + - -
- - - - -
- ]
772 : 2365 : RPCExamples{
773 [ + - + - : 4730 : HelpExampleCli("signrawtransactionwithkey", "\"myhex\" \"[\\\"key1\\\",\\\"key2\\\"]\"")
+ - ]
774 [ + - + - : 9460 : + HelpExampleRpc("signrawtransactionwithkey", "\"myhex\", \"[\\\"key1\\\",\\\"key2\\\"]\"")
+ - + - ]
775 [ + - ]: 2365 : },
776 : 179 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
777 : : {
778 : 179 : CMutableTransaction mtx;
779 [ + - + - : 179 : if (!DecodeHexTx(mtx, request.params[0].get_str())) {
+ - + + ]
780 [ + - + - ]: 2 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed. Make sure the tx has at least one input.");
781 : : }
782 : :
783 : 178 : FlatSigningProvider keystore;
784 [ + - + - ]: 178 : const UniValue& keys = request.params[1].get_array();
785 [ + + ]: 1034 : for (unsigned int idx = 0; idx < keys.size(); ++idx) {
786 [ + - + - ]: 857 : UniValue k = keys[idx];
787 [ + - + - ]: 857 : CKey key = DecodeSecret(k.get_str());
788 [ + + ]: 857 : if (!key.IsValid()) {
789 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Invalid private key");
790 : : }
791 : :
792 [ + - ]: 856 : CPubKey pubkey = key.GetPubKey();
793 [ + - ]: 856 : CKeyID key_id = pubkey.GetID();
794 [ + - ]: 856 : keystore.pubkeys.emplace(key_id, pubkey);
795 [ + - ]: 856 : keystore.keys.emplace(key_id, key);
796 : 857 : }
797 : :
798 : : // Fetch previous transactions (inputs):
799 : 177 : std::map<COutPoint, Coin> coins;
800 [ + + ]: 358 : for (const CTxIn& txin : mtx.vin) {
801 [ + - ]: 181 : coins[txin.prevout]; // Create empty map entry keyed by prevout.
802 : : }
803 [ + - ]: 177 : NodeContext& node = EnsureAnyNodeContext(request.context);
804 [ + - ]: 177 : FindCoins(node, coins);
805 : :
806 : : // Parse the prevtxs array
807 [ + - + + ]: 177 : ParsePrevouts(request.params[2], &keystore, coins);
808 : :
809 : 97 : UniValue result(UniValue::VOBJ);
810 [ + - + + ]: 97 : SignTransaction(mtx, &keystore, coins, request.params[3], result);
811 : 96 : return result;
812 : 275 : },
813 [ + - + - : 104060 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + +
+ + + + +
+ - - - -
- - - - ]
814 [ + - + - : 87505 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- - - - -
- - - - ]
815 : :
816 : : const RPCResult decodepsbt_inputs{
817 : : RPCResult::Type::ARR, "inputs", "",
818 : : {
819 : : {RPCResult::Type::OBJ, "", "",
820 : : {
821 : : {RPCResult::Type::OBJ, "non_witness_utxo", /*optional=*/true, "Decoded network transaction for non-witness UTXOs",
822 : : {
823 : : {RPCResult::Type::ELISION, "",""},
824 : : }},
825 : : {RPCResult::Type::OBJ, "witness_utxo", /*optional=*/true, "Transaction output for witness UTXOs",
826 : : {
827 : : {RPCResult::Type::NUM, "amount", "The value in " + CURRENCY_UNIT},
828 : : {RPCResult::Type::OBJ, "scriptPubKey", "",
829 : : {
830 : : {RPCResult::Type::STR, "asm", "Disassembly of the output script"},
831 : : {RPCResult::Type::STR, "desc", "Inferred descriptor for the output"},
832 : : {RPCResult::Type::STR_HEX, "hex", "The raw output script bytes, hex-encoded"},
833 : : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
834 : : {RPCResult::Type::STR, "address", /*optional=*/true, "The Bitcoin address (only if a well-defined address exists)"},
835 : : }},
836 : : }},
837 : : {RPCResult::Type::OBJ_DYN, "partial_signatures", /*optional=*/true, "",
838 : : {
839 : : {RPCResult::Type::STR, "pubkey", "The public key and signature that corresponds to it."},
840 : : }},
841 : : {RPCResult::Type::STR, "sighash", /*optional=*/true, "The sighash type to be used"},
842 : : {RPCResult::Type::OBJ, "redeem_script", /*optional=*/true, "",
843 : : {
844 : : {RPCResult::Type::STR, "asm", "Disassembly of the redeem script"},
845 : : {RPCResult::Type::STR_HEX, "hex", "The raw redeem script bytes, hex-encoded"},
846 : : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
847 : : }},
848 : : {RPCResult::Type::OBJ, "witness_script", /*optional=*/true, "",
849 : : {
850 : : {RPCResult::Type::STR, "asm", "Disassembly of the witness script"},
851 : : {RPCResult::Type::STR_HEX, "hex", "The raw witness script bytes, hex-encoded"},
852 : : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
853 : : }},
854 : : {RPCResult::Type::ARR, "bip32_derivs", /*optional=*/true, "",
855 : : {
856 : : {RPCResult::Type::OBJ, "", "",
857 : : {
858 : : {RPCResult::Type::STR, "pubkey", "The public key with the derivation path as the value."},
859 : : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
860 : : {RPCResult::Type::STR, "path", "The path"},
861 : : }},
862 : : }},
863 : : {RPCResult::Type::OBJ, "final_scriptSig", /*optional=*/true, "",
864 : : {
865 : : {RPCResult::Type::STR, "asm", "Disassembly of the final signature script"},
866 : : {RPCResult::Type::STR_HEX, "hex", "The raw final signature script bytes, hex-encoded"},
867 : : }},
868 : : {RPCResult::Type::ARR, "final_scriptwitness", /*optional=*/true, "",
869 : : {
870 : : {RPCResult::Type::STR_HEX, "", "hex-encoded witness data (if any)"},
871 : : }},
872 : : {RPCResult::Type::OBJ_DYN, "ripemd160_preimages", /*optional=*/ true, "",
873 : : {
874 : : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
875 : : }},
876 : : {RPCResult::Type::OBJ_DYN, "sha256_preimages", /*optional=*/ true, "",
877 : : {
878 : : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
879 : : }},
880 : : {RPCResult::Type::OBJ_DYN, "hash160_preimages", /*optional=*/ true, "",
881 : : {
882 : : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
883 : : }},
884 : : {RPCResult::Type::OBJ_DYN, "hash256_preimages", /*optional=*/ true, "",
885 : : {
886 : : {RPCResult::Type::STR, "hash", "The hash and preimage that corresponds to it."},
887 : : }},
888 : : {RPCResult::Type::STR_HEX, "taproot_key_path_sig", /*optional=*/ true, "hex-encoded signature for the Taproot key path spend"},
889 : : {RPCResult::Type::ARR, "taproot_script_path_sigs", /*optional=*/ true, "",
890 : : {
891 : : {RPCResult::Type::OBJ, "signature", /*optional=*/ true, "The signature for the pubkey and leaf hash combination",
892 : : {
893 : : {RPCResult::Type::STR, "pubkey", "The x-only pubkey for this signature"},
894 : : {RPCResult::Type::STR, "leaf_hash", "The leaf hash for this signature"},
895 : : {RPCResult::Type::STR, "sig", "The signature itself"},
896 : : }},
897 : : }},
898 : : {RPCResult::Type::ARR, "taproot_scripts", /*optional=*/ true, "",
899 : : {
900 : : {RPCResult::Type::OBJ, "", "",
901 : : {
902 : : {RPCResult::Type::STR_HEX, "script", "A leaf script"},
903 : : {RPCResult::Type::NUM, "leaf_ver", "The version number for the leaf script"},
904 : : {RPCResult::Type::ARR, "control_blocks", "The control blocks for this script",
905 : : {
906 : : {RPCResult::Type::STR_HEX, "control_block", "A hex-encoded control block for this script"},
907 : : }},
908 : : }},
909 : : }},
910 : : {RPCResult::Type::ARR, "taproot_bip32_derivs", /*optional=*/ true, "",
911 : : {
912 : : {RPCResult::Type::OBJ, "", "",
913 : : {
914 : : {RPCResult::Type::STR, "pubkey", "The x-only public key this path corresponds to"},
915 : : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
916 : : {RPCResult::Type::STR, "path", "The path"},
917 : : {RPCResult::Type::ARR, "leaf_hashes", "The hashes of the leaves this pubkey appears in",
918 : : {
919 : : {RPCResult::Type::STR_HEX, "hash", "The hash of a leaf this pubkey appears in"},
920 : : }},
921 : : }},
922 : : }},
923 : : {RPCResult::Type::STR_HEX, "taproot_internal_key", /*optional=*/ true, "The hex-encoded Taproot x-only internal key"},
924 : : {RPCResult::Type::STR_HEX, "taproot_merkle_root", /*optional=*/ true, "The hex-encoded Taproot merkle root"},
925 : : {RPCResult::Type::ARR, "musig2_participant_pubkeys", /*optional=*/true, "",
926 : : {
927 : : {RPCResult::Type::OBJ, "", "",
928 : : {
929 : : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which the participants create."},
930 : : {RPCResult::Type::ARR, "participant_pubkeys", "",
931 : : {
932 : : {RPCResult::Type::STR_HEX, "pubkey", "The compressed public keys that are aggregated for aggregate_pubkey."},
933 : : }},
934 : : }},
935 : : }},
936 : : {RPCResult::Type::ARR, "musig2_pubnonces", /*optional=*/true, "",
937 : : {
938 : : {RPCResult::Type::OBJ, "", "",
939 : : {
940 : : {RPCResult::Type::STR_HEX, "participant_pubkey", "The compressed public key of the participant that created this pubnonce."},
941 : : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which this pubnonce is for."},
942 : : {RPCResult::Type::STR_HEX, "leaf_hash", /*optional=*/true, "The hash of the leaf script that contains the aggregate pubkey being signed for. Omitted when signing for the internal key."},
943 : : {RPCResult::Type::STR_HEX, "pubnonce", "The public nonce itself."},
944 : : }},
945 : : }},
946 : : {RPCResult::Type::ARR, "musig2_partial_sigs", /*optional=*/true, "",
947 : : {
948 : : {RPCResult::Type::OBJ, "", "",
949 : : {
950 : : {RPCResult::Type::STR_HEX, "participant_pubkey", "The compressed public key of the participant that created this partial signature."},
951 : : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which this partial signature is for."},
952 : : {RPCResult::Type::STR_HEX, "leaf_hash", /*optional=*/true, "The hash of the leaf script that contains the aggregate pubkey being signed for. Omitted when signing for the internal key."},
953 : : {RPCResult::Type::STR_HEX, "partial_sig", "The partial signature itself."},
954 : : }},
955 : : }},
956 : : {RPCResult::Type::OBJ_DYN, "unknown", /*optional=*/ true, "The unknown input fields",
957 : : {
958 : : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
959 : : }},
960 : : {RPCResult::Type::ARR, "proprietary", /*optional=*/true, "The input proprietary map",
961 : : {
962 : : {RPCResult::Type::OBJ, "", "",
963 : : {
964 : : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
965 : : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
966 : : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
967 : : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
968 : : }},
969 : : }},
970 : : }},
971 : : }
972 : : };
973 : :
974 : : const RPCResult decodepsbt_outputs{
975 : : RPCResult::Type::ARR, "outputs", "",
976 : : {
977 : : {RPCResult::Type::OBJ, "", "",
978 : : {
979 : : {RPCResult::Type::OBJ, "redeem_script", /*optional=*/true, "",
980 : : {
981 : : {RPCResult::Type::STR, "asm", "Disassembly of the redeem script"},
982 : : {RPCResult::Type::STR_HEX, "hex", "The raw redeem script bytes, hex-encoded"},
983 : : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
984 : : }},
985 : : {RPCResult::Type::OBJ, "witness_script", /*optional=*/true, "",
986 : : {
987 : : {RPCResult::Type::STR, "asm", "Disassembly of the witness script"},
988 : : {RPCResult::Type::STR_HEX, "hex", "The raw witness script bytes, hex-encoded"},
989 : : {RPCResult::Type::STR, "type", "The type, eg 'pubkeyhash'"},
990 : : }},
991 : : {RPCResult::Type::ARR, "bip32_derivs", /*optional=*/true, "",
992 : : {
993 : : {RPCResult::Type::OBJ, "", "",
994 : : {
995 : : {RPCResult::Type::STR, "pubkey", "The public key this path corresponds to"},
996 : : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
997 : : {RPCResult::Type::STR, "path", "The path"},
998 : : }},
999 : : }},
1000 : : {RPCResult::Type::STR_HEX, "taproot_internal_key", /*optional=*/ true, "The hex-encoded Taproot x-only internal key"},
1001 : : {RPCResult::Type::ARR, "taproot_tree", /*optional=*/ true, "The tuples that make up the Taproot tree, in depth first search order",
1002 : : {
1003 : : {RPCResult::Type::OBJ, "tuple", /*optional=*/ true, "A single leaf script in the taproot tree",
1004 : : {
1005 : : {RPCResult::Type::NUM, "depth", "The depth of this element in the tree"},
1006 : : {RPCResult::Type::NUM, "leaf_ver", "The version of this leaf"},
1007 : : {RPCResult::Type::STR, "script", "The hex-encoded script itself"},
1008 : : }},
1009 : : }},
1010 : : {RPCResult::Type::ARR, "taproot_bip32_derivs", /*optional=*/ true, "",
1011 : : {
1012 : : {RPCResult::Type::OBJ, "", "",
1013 : : {
1014 : : {RPCResult::Type::STR, "pubkey", "The x-only public key this path corresponds to"},
1015 : : {RPCResult::Type::STR, "master_fingerprint", "The fingerprint of the master key"},
1016 : : {RPCResult::Type::STR, "path", "The path"},
1017 : : {RPCResult::Type::ARR, "leaf_hashes", "The hashes of the leaves this pubkey appears in",
1018 : : {
1019 : : {RPCResult::Type::STR_HEX, "hash", "The hash of a leaf this pubkey appears in"},
1020 : : }},
1021 : : }},
1022 : : }},
1023 : : {RPCResult::Type::ARR, "musig2_participant_pubkeys", /*optional=*/true, "",
1024 : : {
1025 : : {RPCResult::Type::OBJ, "", "",
1026 : : {
1027 : : {RPCResult::Type::STR_HEX, "aggregate_pubkey", "The compressed aggregate public key for which the participants create."},
1028 : : {RPCResult::Type::ARR, "participant_pubkeys", "",
1029 : : {
1030 : : {RPCResult::Type::STR_HEX, "pubkey", "The compressed public keys that are aggregated for aggregate_pubkey."},
1031 : : }},
1032 : : }},
1033 : : }},
1034 : : {RPCResult::Type::OBJ_DYN, "unknown", /*optional=*/true, "The unknown output fields",
1035 : : {
1036 : : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
1037 : : }},
1038 : : {RPCResult::Type::ARR, "proprietary", /*optional=*/true, "The output proprietary map",
1039 : : {
1040 : : {RPCResult::Type::OBJ, "", "",
1041 : : {
1042 : : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
1043 : : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
1044 : : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
1045 : : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
1046 : : }},
1047 : : }},
1048 : : }},
1049 : : }
1050 : : };
1051 : :
1052 : 2516 : static RPCHelpMan decodepsbt()
1053 : : {
1054 : 2516 : return RPCHelpMan{
1055 : : "decodepsbt",
1056 : : "Return a JSON object representing the serialized, base64-encoded partially signed Bitcoin transaction.",
1057 : : {
1058 [ + - ]: 2516 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "The PSBT base64 string"},
1059 : : },
1060 : 0 : RPCResult{
1061 : : RPCResult::Type::OBJ, "", "",
1062 : : {
1063 : : {RPCResult::Type::OBJ, "tx", "The decoded network-serialized unsigned transaction.",
1064 : : {
1065 : : {RPCResult::Type::ELISION, "", "The layout is the same as the output of decoderawtransaction."},
1066 : : }},
1067 : : {RPCResult::Type::ARR, "global_xpubs", "",
1068 : : {
1069 : : {RPCResult::Type::OBJ, "", "",
1070 : : {
1071 : : {RPCResult::Type::STR, "xpub", "The extended public key this path corresponds to"},
1072 : : {RPCResult::Type::STR_HEX, "master_fingerprint", "The fingerprint of the master key"},
1073 : : {RPCResult::Type::STR, "path", "The path"},
1074 : : }},
1075 : : }},
1076 : : {RPCResult::Type::NUM, "psbt_version", "The PSBT version number. Not to be confused with the unsigned transaction version"},
1077 : : {RPCResult::Type::ARR, "proprietary", "The global proprietary map",
1078 : : {
1079 : : {RPCResult::Type::OBJ, "", "",
1080 : : {
1081 : : {RPCResult::Type::STR_HEX, "identifier", "The hex string for the proprietary identifier"},
1082 : : {RPCResult::Type::NUM, "subtype", "The number for the subtype"},
1083 : : {RPCResult::Type::STR_HEX, "key", "The hex for the key"},
1084 : : {RPCResult::Type::STR_HEX, "value", "The hex for the value"},
1085 : : }},
1086 : : }},
1087 : : {RPCResult::Type::OBJ_DYN, "unknown", "The unknown global fields",
1088 : : {
1089 : : {RPCResult::Type::STR_HEX, "key", "(key-value pair) An unknown key-value pair"},
1090 : : }},
1091 : : decodepsbt_inputs,
1092 : : decodepsbt_outputs,
1093 : : {RPCResult::Type::STR_AMOUNT, "fee", /*optional=*/true, "The transaction fee paid if all UTXOs slots in the PSBT have been filled."},
1094 : : }
1095 [ + - + - : 67932 : },
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + + + +
+ + + + +
+ + + + +
- - - - -
- - - - -
- - - - ]
1096 : 2516 : RPCExamples{
1097 [ + - + - : 5032 : HelpExampleCli("decodepsbt", "\"psbt\"")
+ - ]
1098 [ + - ]: 2516 : },
1099 : 330 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1100 : : {
1101 : : // Unserialize the transactions
1102 : 330 : PartiallySignedTransaction psbtx;
1103 [ + - ]: 330 : std::string error;
1104 [ + - + - : 330 : if (!DecodeBase64PSBT(psbtx, request.params[0].get_str(), error)) {
+ - + + ]
1105 [ + - + - ]: 108 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1106 : : }
1107 : :
1108 : 276 : UniValue result(UniValue::VOBJ);
1109 : :
1110 : : // Add the decoded tx
1111 : 276 : UniValue tx_univ(UniValue::VOBJ);
1112 [ + - + - ]: 276 : TxToUniv(CTransaction(*psbtx.tx), /*block_hash=*/uint256(), /*entry=*/tx_univ, /*include_hex=*/false);
1113 [ + - + - ]: 552 : result.pushKV("tx", std::move(tx_univ));
1114 : :
1115 : : // Add the global xpubs
1116 : 276 : UniValue global_xpubs(UniValue::VARR);
1117 [ + - + + ]: 279 : for (std::pair<KeyOriginInfo, std::set<CExtPubKey>> xpub_pair : psbtx.m_xpubs) {
1118 [ + + ]: 6 : for (auto& xpub : xpub_pair.second) {
1119 : 3 : std::vector<unsigned char> ser_xpub;
1120 [ + - ]: 3 : ser_xpub.assign(BIP32_EXTKEY_WITH_VERSION_SIZE, 0);
1121 [ + - ]: 3 : xpub.EncodeWithVersion(ser_xpub.data());
1122 : :
1123 : 3 : UniValue keypath(UniValue::VOBJ);
1124 [ + - + - : 6 : keypath.pushKV("xpub", EncodeBase58Check(ser_xpub));
+ - + - ]
1125 [ + - + - : 6 : keypath.pushKV("master_fingerprint", HexStr(std::span<unsigned char>(xpub_pair.first.fingerprint, xpub_pair.first.fingerprint + 4)));
+ - + - ]
1126 [ + - + - : 6 : keypath.pushKV("path", WriteHDKeypath(xpub_pair.first.path));
+ - + - ]
1127 [ + - ]: 3 : global_xpubs.push_back(std::move(keypath));
1128 : 3 : }
1129 : 3 : }
1130 [ + - + - ]: 552 : result.pushKV("global_xpubs", std::move(global_xpubs));
1131 : :
1132 : : // PSBT version
1133 [ + - + - : 552 : result.pushKV("psbt_version", static_cast<uint64_t>(psbtx.GetVersion()));
+ - + - ]
1134 : :
1135 : : // Proprietary
1136 : 276 : UniValue proprietary(UniValue::VARR);
1137 [ + + ]: 278 : for (const auto& entry : psbtx.m_proprietary) {
1138 : 2 : UniValue this_prop(UniValue::VOBJ);
1139 [ + - + - : 4 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - ]
1140 [ + - + - : 4 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1141 [ + - + - : 4 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - ]
1142 [ + - + - : 4 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - ]
1143 [ + - ]: 2 : proprietary.push_back(std::move(this_prop));
1144 : 2 : }
1145 [ + - + - ]: 552 : result.pushKV("proprietary", std::move(proprietary));
1146 : :
1147 : : // Unknown data
1148 : 276 : UniValue unknowns(UniValue::VOBJ);
1149 [ - - - + ]: 276 : for (auto entry : psbtx.unknown) {
1150 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # ]
1151 : 0 : }
1152 [ + - + - ]: 552 : result.pushKV("unknown", std::move(unknowns));
1153 : :
1154 : : // inputs
1155 : 276 : CAmount total_in = 0;
1156 : 276 : bool have_all_utxos = true;
1157 : 276 : UniValue inputs(UniValue::VARR);
1158 [ + + ]: 616 : for (unsigned int i = 0; i < psbtx.inputs.size(); ++i) {
1159 : 340 : const PSBTInput& input = psbtx.inputs[i];
1160 : 340 : UniValue in(UniValue::VOBJ);
1161 : : // UTXOs
1162 : 340 : bool have_a_utxo = false;
1163 : 340 : CTxOut txout;
1164 [ + + ]: 340 : if (!input.witness_utxo.IsNull()) {
1165 : 282 : txout = input.witness_utxo;
1166 : :
1167 : 282 : UniValue o(UniValue::VOBJ);
1168 [ + - ]: 282 : ScriptToUniv(txout.scriptPubKey, /*out=*/o, /*include_hex=*/true, /*include_address=*/true);
1169 : :
1170 : 282 : UniValue out(UniValue::VOBJ);
1171 [ + - + - : 564 : out.pushKV("amount", ValueFromAmount(txout.nValue));
+ - ]
1172 [ + - + - ]: 564 : out.pushKV("scriptPubKey", std::move(o));
1173 : :
1174 [ + - + - ]: 564 : in.pushKV("witness_utxo", std::move(out));
1175 : :
1176 : 282 : have_a_utxo = true;
1177 : 282 : }
1178 [ + + ]: 340 : if (input.non_witness_utxo) {
1179 : 139 : txout = input.non_witness_utxo->vout[psbtx.tx->vin[i].prevout.n];
1180 : :
1181 : 139 : UniValue non_wit(UniValue::VOBJ);
1182 [ + - ]: 139 : TxToUniv(*input.non_witness_utxo, /*block_hash=*/uint256(), /*entry=*/non_wit, /*include_hex=*/false);
1183 [ + - + - ]: 278 : in.pushKV("non_witness_utxo", std::move(non_wit));
1184 : :
1185 : 139 : have_a_utxo = true;
1186 : 0 : }
1187 [ + + ]: 340 : if (have_a_utxo) {
1188 [ + - - + ]: 321 : if (MoneyRange(txout.nValue) && MoneyRange(total_in + txout.nValue)) {
1189 : : total_in += txout.nValue;
1190 : : } else {
1191 : : // Hack to just not show fee later
1192 : : have_all_utxos = false;
1193 : : }
1194 : : } else {
1195 : : have_all_utxos = false;
1196 : : }
1197 : :
1198 : : // Partial sigs
1199 [ + + ]: 340 : if (!input.partial_sigs.empty()) {
1200 : 34 : UniValue partial_sigs(UniValue::VOBJ);
1201 [ + + ]: 84 : for (const auto& sig : input.partial_sigs) {
1202 [ + - + - : 100 : partial_sigs.pushKV(HexStr(sig.second.first), HexStr(sig.second.second));
+ - + - ]
1203 : : }
1204 [ + - + - ]: 68 : in.pushKV("partial_signatures", std::move(partial_sigs));
1205 : 34 : }
1206 : :
1207 : : // Sighash
1208 [ + + ]: 340 : if (input.sighash_type != std::nullopt) {
1209 [ + - + - : 10 : in.pushKV("sighash", SighashToStr((unsigned char)*input.sighash_type));
+ - + - ]
1210 : : }
1211 : :
1212 : : // Redeem script and witness script
1213 [ + + + + ]: 341 : if (!input.redeem_script.empty()) {
1214 : 19 : UniValue r(UniValue::VOBJ);
1215 [ + - ]: 19 : ScriptToUniv(input.redeem_script, /*out=*/r);
1216 [ + - + - ]: 38 : in.pushKV("redeem_script", std::move(r));
1217 : 19 : }
1218 [ + + + + ]: 365 : if (!input.witness_script.empty()) {
1219 : 25 : UniValue r(UniValue::VOBJ);
1220 [ + - ]: 25 : ScriptToUniv(input.witness_script, /*out=*/r);
1221 [ + - + - ]: 50 : in.pushKV("witness_script", std::move(r));
1222 : 25 : }
1223 : :
1224 : : // keypaths
1225 [ + + ]: 340 : if (!input.hd_keypaths.empty()) {
1226 : 98 : UniValue keypaths(UniValue::VARR);
1227 [ + - + + ]: 235 : for (auto entry : input.hd_keypaths) {
1228 : 137 : UniValue keypath(UniValue::VOBJ);
1229 [ + - + - : 274 : keypath.pushKV("pubkey", HexStr(entry.first));
+ - + - ]
1230 : :
1231 [ + - + - : 274 : keypath.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(entry.second.fingerprint)));
+ - + - ]
1232 [ + - + - : 274 : keypath.pushKV("path", WriteHDKeypath(entry.second.path));
+ - + - ]
1233 [ + - ]: 137 : keypaths.push_back(std::move(keypath));
1234 : 137 : }
1235 [ + - + - ]: 196 : in.pushKV("bip32_derivs", std::move(keypaths));
1236 : 98 : }
1237 : :
1238 : : // Final scriptSig and scriptwitness
1239 [ + + + + ]: 355 : if (!input.final_script_sig.empty()) {
1240 : 17 : UniValue scriptsig(UniValue::VOBJ);
1241 [ + - + - : 34 : scriptsig.pushKV("asm", ScriptToAsmStr(input.final_script_sig, true));
+ - + - ]
1242 [ + + + - : 51 : scriptsig.pushKV("hex", HexStr(input.final_script_sig));
+ - + - +
- ]
1243 [ + - + - ]: 34 : in.pushKV("final_scriptSig", std::move(scriptsig));
1244 : 17 : }
1245 [ + + ]: 340 : if (!input.final_script_witness.IsNull()) {
1246 : 12 : UniValue txinwitness(UniValue::VARR);
1247 [ + + ]: 37 : for (const auto& item : input.final_script_witness.stack) {
1248 [ + - + - : 25 : txinwitness.push_back(HexStr(item));
+ - ]
1249 : : }
1250 [ + - + - ]: 24 : in.pushKV("final_scriptwitness", std::move(txinwitness));
1251 : 12 : }
1252 : :
1253 : : // Ripemd160 hash preimages
1254 [ + + ]: 340 : if (!input.ripemd160_preimages.empty()) {
1255 : 2 : UniValue ripemd160_preimages(UniValue::VOBJ);
1256 [ + - + + ]: 5 : for (const auto& [hash, preimage] : input.ripemd160_preimages) {
1257 [ + - + - : 6 : ripemd160_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - ]
1258 : : }
1259 [ + - + - ]: 4 : in.pushKV("ripemd160_preimages", std::move(ripemd160_preimages));
1260 : 2 : }
1261 : :
1262 : : // Sha256 hash preimages
1263 [ + + ]: 340 : if (!input.sha256_preimages.empty()) {
1264 : 3 : UniValue sha256_preimages(UniValue::VOBJ);
1265 [ + - + + ]: 7 : for (const auto& [hash, preimage] : input.sha256_preimages) {
1266 [ + - + - : 8 : sha256_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - ]
1267 : : }
1268 [ + - + - ]: 6 : in.pushKV("sha256_preimages", std::move(sha256_preimages));
1269 : 3 : }
1270 : :
1271 : : // Hash160 hash preimages
1272 [ + + ]: 340 : if (!input.hash160_preimages.empty()) {
1273 : 2 : UniValue hash160_preimages(UniValue::VOBJ);
1274 [ + - + + ]: 5 : for (const auto& [hash, preimage] : input.hash160_preimages) {
1275 [ + - + - : 6 : hash160_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - ]
1276 : : }
1277 [ + - + - ]: 4 : in.pushKV("hash160_preimages", std::move(hash160_preimages));
1278 : 2 : }
1279 : :
1280 : : // Hash256 hash preimages
1281 [ + + ]: 340 : if (!input.hash256_preimages.empty()) {
1282 : 2 : UniValue hash256_preimages(UniValue::VOBJ);
1283 [ + - + + ]: 5 : for (const auto& [hash, preimage] : input.hash256_preimages) {
1284 [ + - + - : 6 : hash256_preimages.pushKV(HexStr(hash), HexStr(preimage));
+ - + - ]
1285 : : }
1286 [ + - + - ]: 4 : in.pushKV("hash256_preimages", std::move(hash256_preimages));
1287 : 2 : }
1288 : :
1289 : : // Taproot key path signature
1290 [ + + ]: 340 : if (!input.m_tap_key_sig.empty()) {
1291 [ + - + - : 162 : in.pushKV("taproot_key_path_sig", HexStr(input.m_tap_key_sig));
+ - + - ]
1292 : : }
1293 : :
1294 : : // Taproot script path signatures
1295 [ + + ]: 340 : if (!input.m_tap_script_sigs.empty()) {
1296 : 109 : UniValue script_sigs(UniValue::VARR);
1297 [ + + ]: 277 : for (const auto& [pubkey_leaf, sig] : input.m_tap_script_sigs) {
1298 : 168 : const auto& [xonly, leaf_hash] = pubkey_leaf;
1299 : 168 : UniValue sigobj(UniValue::VOBJ);
1300 [ + - + - : 336 : sigobj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1301 [ + - + - : 336 : sigobj.pushKV("leaf_hash", HexStr(leaf_hash));
+ - + - ]
1302 [ + - + - : 336 : sigobj.pushKV("sig", HexStr(sig));
+ - + - ]
1303 [ + - ]: 168 : script_sigs.push_back(std::move(sigobj));
1304 : 168 : }
1305 [ + - + - ]: 218 : in.pushKV("taproot_script_path_sigs", std::move(script_sigs));
1306 : 109 : }
1307 : :
1308 : : // Taproot leaf scripts
1309 [ + + ]: 340 : if (!input.m_tap_scripts.empty()) {
1310 : 143 : UniValue tap_scripts(UniValue::VARR);
1311 [ + + ]: 363 : for (const auto& [leaf, control_blocks] : input.m_tap_scripts) {
1312 : 220 : const auto& [script, leaf_ver] = leaf;
1313 : 220 : UniValue script_info(UniValue::VOBJ);
1314 [ + - + - : 440 : script_info.pushKV("script", HexStr(script));
+ - + - ]
1315 [ + - + - : 440 : script_info.pushKV("leaf_ver", leaf_ver);
+ - ]
1316 : 220 : UniValue control_blocks_univ(UniValue::VARR);
1317 [ + + ]: 506 : for (const auto& control_block : control_blocks) {
1318 [ + - + - : 286 : control_blocks_univ.push_back(HexStr(control_block));
+ - ]
1319 : : }
1320 [ + - + - ]: 440 : script_info.pushKV("control_blocks", std::move(control_blocks_univ));
1321 [ + - ]: 220 : tap_scripts.push_back(std::move(script_info));
1322 : 220 : }
1323 [ + - + - ]: 286 : in.pushKV("taproot_scripts", std::move(tap_scripts));
1324 : 143 : }
1325 : :
1326 : : // Taproot bip32 keypaths
1327 [ + + ]: 340 : if (!input.m_tap_bip32_paths.empty()) {
1328 : 170 : UniValue keypaths(UniValue::VARR);
1329 [ + + ]: 671 : for (const auto& [xonly, leaf_origin] : input.m_tap_bip32_paths) {
1330 : 501 : const auto& [leaf_hashes, origin] = leaf_origin;
1331 : 501 : UniValue path_obj(UniValue::VOBJ);
1332 [ + - + - : 1002 : path_obj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1333 [ + - + - : 1002 : path_obj.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(origin.fingerprint)));
+ - + - ]
1334 [ + - + - : 1002 : path_obj.pushKV("path", WriteHDKeypath(origin.path));
+ - + - ]
1335 : 501 : UniValue leaf_hashes_arr(UniValue::VARR);
1336 [ + + ]: 831 : for (const auto& leaf_hash : leaf_hashes) {
1337 [ + - + - : 330 : leaf_hashes_arr.push_back(HexStr(leaf_hash));
+ - ]
1338 : : }
1339 [ + - + - ]: 1002 : path_obj.pushKV("leaf_hashes", std::move(leaf_hashes_arr));
1340 [ + - ]: 501 : keypaths.push_back(std::move(path_obj));
1341 : 501 : }
1342 [ + - + - ]: 340 : in.pushKV("taproot_bip32_derivs", std::move(keypaths));
1343 : 170 : }
1344 : :
1345 : : // Taproot internal key
1346 [ + + ]: 340 : if (!input.m_tap_internal_key.IsNull()) {
1347 [ + - + - : 334 : in.pushKV("taproot_internal_key", HexStr(input.m_tap_internal_key));
+ - + - ]
1348 : : }
1349 : :
1350 : : // Write taproot merkle root
1351 [ + + ]: 340 : if (!input.m_tap_merkle_root.IsNull()) {
1352 [ + - + - : 286 : in.pushKV("taproot_merkle_root", HexStr(input.m_tap_merkle_root));
+ - + - ]
1353 : : }
1354 : :
1355 : : // Write MuSig2 fields
1356 [ + + ]: 340 : if (!input.m_musig2_participants.empty()) {
1357 : 13 : UniValue musig_pubkeys(UniValue::VARR);
1358 [ + + ]: 26 : for (const auto& [agg, parts] : input.m_musig2_participants) {
1359 : 13 : UniValue musig_part(UniValue::VOBJ);
1360 [ + - + - : 26 : musig_part.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1361 : 13 : UniValue part_pubkeys(UniValue::VARR);
1362 [ + + ]: 51 : for (const auto& pub : parts) {
1363 [ + - + - : 38 : part_pubkeys.push_back(HexStr(pub));
+ - ]
1364 : : }
1365 [ + - + - : 26 : musig_part.pushKV("participant_pubkeys", part_pubkeys);
+ - ]
1366 [ + - + - ]: 13 : musig_pubkeys.push_back(musig_part);
1367 : 13 : }
1368 [ + - + - : 26 : in.pushKV("musig2_participant_pubkeys", musig_pubkeys);
+ - ]
1369 : 13 : }
1370 [ + + ]: 340 : if (!input.m_musig2_pubnonces.empty()) {
1371 : 9 : UniValue musig_pubnonces(UniValue::VARR);
1372 [ + + ]: 18 : for (const auto& [agg_lh, part_pubnonce] : input.m_musig2_pubnonces) {
1373 : 9 : const auto& [agg, lh] = agg_lh;
1374 [ + + ]: 34 : for (const auto& [part, pubnonce] : part_pubnonce) {
1375 : 25 : UniValue info(UniValue::VOBJ);
1376 [ + - + - : 50 : info.pushKV("participant_pubkey", HexStr(part));
+ - + - ]
1377 [ + - + - : 50 : info.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1378 [ + + + - : 32 : if (!lh.IsNull()) info.pushKV("leaf_hash", HexStr(lh));
+ - + - +
- ]
1379 [ + - + - : 50 : info.pushKV("pubnonce", HexStr(pubnonce));
+ - + - ]
1380 [ + - + - ]: 25 : musig_pubnonces.push_back(info);
1381 : 25 : }
1382 : : }
1383 [ + - + - : 18 : in.pushKV("musig2_pubnonces", musig_pubnonces);
+ - ]
1384 : 9 : }
1385 [ + + ]: 340 : if (!input.m_musig2_partial_sigs.empty()) {
1386 : 5 : UniValue musig_partial_sigs(UniValue::VARR);
1387 [ + + ]: 10 : for (const auto& [agg_lh, part_psig] : input.m_musig2_partial_sigs) {
1388 : 5 : const auto& [agg, lh] = agg_lh;
1389 [ + + ]: 18 : for (const auto& [part, psig] : part_psig) {
1390 : 13 : UniValue info(UniValue::VOBJ);
1391 [ + - + - : 26 : info.pushKV("participant_pubkey", HexStr(part));
+ - + - ]
1392 [ + - + - : 26 : info.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1393 [ + + + - : 17 : if (!lh.IsNull()) info.pushKV("leaf_hash", HexStr(lh));
+ - + - +
- ]
1394 [ + - + - : 26 : info.pushKV("partial_sig", HexStr(psig));
+ - + - ]
1395 [ + - + - ]: 13 : musig_partial_sigs.push_back(info);
1396 : 13 : }
1397 : : }
1398 [ + - + - : 10 : in.pushKV("musig2_partial_sigs", musig_partial_sigs);
+ - ]
1399 : 5 : }
1400 : :
1401 : : // Proprietary
1402 [ + + ]: 340 : if (!input.m_proprietary.empty()) {
1403 : 1 : UniValue proprietary(UniValue::VARR);
1404 [ + + ]: 2 : for (const auto& entry : input.m_proprietary) {
1405 : 1 : UniValue this_prop(UniValue::VOBJ);
1406 [ + - + - : 2 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - ]
1407 [ + - + - : 2 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1408 [ + - + - : 2 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - ]
1409 [ + - + - : 2 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - ]
1410 [ + - ]: 1 : proprietary.push_back(std::move(this_prop));
1411 : 1 : }
1412 [ + - + - ]: 2 : in.pushKV("proprietary", std::move(proprietary));
1413 : 1 : }
1414 : :
1415 : : // Unknown data
1416 [ - + ]: 340 : if (input.unknown.size() > 0) {
1417 : 0 : UniValue unknowns(UniValue::VOBJ);
1418 [ # # # # ]: 0 : for (auto entry : input.unknown) {
1419 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # ]
1420 : 0 : }
1421 [ # # # # ]: 0 : in.pushKV("unknown", std::move(unknowns));
1422 : 0 : }
1423 : :
1424 [ + - ]: 340 : inputs.push_back(std::move(in));
1425 : 340 : }
1426 [ + - + - ]: 552 : result.pushKV("inputs", std::move(inputs));
1427 : :
1428 : : // outputs
1429 : 276 : CAmount output_value = 0;
1430 : 276 : UniValue outputs(UniValue::VARR);
1431 [ + + ]: 740 : for (unsigned int i = 0; i < psbtx.outputs.size(); ++i) {
1432 : 464 : const PSBTOutput& output = psbtx.outputs[i];
1433 : 464 : UniValue out(UniValue::VOBJ);
1434 : : // Redeem script and witness script
1435 [ - + + + ]: 464 : if (!output.redeem_script.empty()) {
1436 : 16 : UniValue r(UniValue::VOBJ);
1437 [ + - ]: 16 : ScriptToUniv(output.redeem_script, /*out=*/r);
1438 [ + - + - ]: 32 : out.pushKV("redeem_script", std::move(r));
1439 : 16 : }
1440 [ + + + + ]: 476 : if (!output.witness_script.empty()) {
1441 : 12 : UniValue r(UniValue::VOBJ);
1442 [ + - ]: 12 : ScriptToUniv(output.witness_script, /*out=*/r);
1443 [ + - + - ]: 24 : out.pushKV("witness_script", std::move(r));
1444 : 12 : }
1445 : :
1446 : : // keypaths
1447 [ + + ]: 464 : if (!output.hd_keypaths.empty()) {
1448 : 96 : UniValue keypaths(UniValue::VARR);
1449 [ + - + + ]: 208 : for (auto entry : output.hd_keypaths) {
1450 : 112 : UniValue keypath(UniValue::VOBJ);
1451 [ + - + - : 224 : keypath.pushKV("pubkey", HexStr(entry.first));
+ - + - ]
1452 [ + - + - : 224 : keypath.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(entry.second.fingerprint)));
+ - + - ]
1453 [ + - + - : 224 : keypath.pushKV("path", WriteHDKeypath(entry.second.path));
+ - + - ]
1454 [ + - ]: 112 : keypaths.push_back(std::move(keypath));
1455 : 112 : }
1456 [ + - + - ]: 192 : out.pushKV("bip32_derivs", std::move(keypaths));
1457 : 96 : }
1458 : :
1459 : : // Taproot internal key
1460 [ + + ]: 464 : if (!output.m_tap_internal_key.IsNull()) {
1461 [ + - + - : 238 : out.pushKV("taproot_internal_key", HexStr(output.m_tap_internal_key));
+ - + - ]
1462 : : }
1463 : :
1464 : : // Taproot tree
1465 [ + + ]: 464 : if (!output.m_tap_tree.empty()) {
1466 : 106 : UniValue tree(UniValue::VARR);
1467 [ + + ]: 382 : for (const auto& [depth, leaf_ver, script] : output.m_tap_tree) {
1468 : 276 : UniValue elem(UniValue::VOBJ);
1469 [ + - + - : 552 : elem.pushKV("depth", (int)depth);
+ - ]
1470 [ + - + - : 552 : elem.pushKV("leaf_ver", (int)leaf_ver);
+ - ]
1471 [ + - + - : 552 : elem.pushKV("script", HexStr(script));
+ - + - ]
1472 [ + - ]: 276 : tree.push_back(std::move(elem));
1473 : 276 : }
1474 [ + - + - ]: 212 : out.pushKV("taproot_tree", std::move(tree));
1475 : 106 : }
1476 : :
1477 : : // Taproot bip32 keypaths
1478 [ + + ]: 464 : if (!output.m_tap_bip32_paths.empty()) {
1479 : 119 : UniValue keypaths(UniValue::VARR);
1480 [ + + ]: 456 : for (const auto& [xonly, leaf_origin] : output.m_tap_bip32_paths) {
1481 : 337 : const auto& [leaf_hashes, origin] = leaf_origin;
1482 : 337 : UniValue path_obj(UniValue::VOBJ);
1483 [ + - + - : 674 : path_obj.pushKV("pubkey", HexStr(xonly));
+ - + - ]
1484 [ + - + - : 674 : path_obj.pushKV("master_fingerprint", strprintf("%08x", ReadBE32(origin.fingerprint)));
+ - + - ]
1485 [ + - + - : 674 : path_obj.pushKV("path", WriteHDKeypath(origin.path));
+ - + - ]
1486 : 337 : UniValue leaf_hashes_arr(UniValue::VARR);
1487 [ + + ]: 573 : for (const auto& leaf_hash : leaf_hashes) {
1488 [ + - + - : 236 : leaf_hashes_arr.push_back(HexStr(leaf_hash));
+ - ]
1489 : : }
1490 [ + - + - ]: 674 : path_obj.pushKV("leaf_hashes", std::move(leaf_hashes_arr));
1491 [ + - ]: 337 : keypaths.push_back(std::move(path_obj));
1492 : 337 : }
1493 [ + - + - ]: 238 : out.pushKV("taproot_bip32_derivs", std::move(keypaths));
1494 : 119 : }
1495 : :
1496 : : // Write MuSig2 fields
1497 [ + + ]: 464 : if (!output.m_musig2_participants.empty()) {
1498 : 3 : UniValue musig_pubkeys(UniValue::VARR);
1499 [ + + ]: 6 : for (const auto& [agg, parts] : output.m_musig2_participants) {
1500 : 3 : UniValue musig_part(UniValue::VOBJ);
1501 [ + - + - : 6 : musig_part.pushKV("aggregate_pubkey", HexStr(agg));
+ - + - ]
1502 : 3 : UniValue part_pubkeys(UniValue::VARR);
1503 [ + + ]: 11 : for (const auto& pub : parts) {
1504 [ + - + - : 8 : part_pubkeys.push_back(HexStr(pub));
+ - ]
1505 : : }
1506 [ + - + - : 6 : musig_part.pushKV("participant_pubkeys", part_pubkeys);
+ - ]
1507 [ + - + - ]: 3 : musig_pubkeys.push_back(musig_part);
1508 : 3 : }
1509 [ + - + - : 6 : out.pushKV("musig2_participant_pubkeys", musig_pubkeys);
+ - ]
1510 : 3 : }
1511 : :
1512 : : // Proprietary
1513 [ + + ]: 464 : if (!output.m_proprietary.empty()) {
1514 : 1 : UniValue proprietary(UniValue::VARR);
1515 [ + + ]: 2 : for (const auto& entry : output.m_proprietary) {
1516 : 1 : UniValue this_prop(UniValue::VOBJ);
1517 [ + - + - : 2 : this_prop.pushKV("identifier", HexStr(entry.identifier));
+ - + - ]
1518 [ + - + - : 2 : this_prop.pushKV("subtype", entry.subtype);
+ - ]
1519 [ + - + - : 2 : this_prop.pushKV("key", HexStr(entry.key));
+ - + - ]
1520 [ + - + - : 2 : this_prop.pushKV("value", HexStr(entry.value));
+ - + - ]
1521 [ + - ]: 1 : proprietary.push_back(std::move(this_prop));
1522 : 1 : }
1523 [ + - + - ]: 2 : out.pushKV("proprietary", std::move(proprietary));
1524 : 1 : }
1525 : :
1526 : : // Unknown data
1527 [ - + ]: 464 : if (output.unknown.size() > 0) {
1528 : 0 : UniValue unknowns(UniValue::VOBJ);
1529 [ # # # # ]: 0 : for (auto entry : output.unknown) {
1530 [ # # # # : 0 : unknowns.pushKV(HexStr(entry.first), HexStr(entry.second));
# # # # ]
1531 : 0 : }
1532 [ # # # # ]: 0 : out.pushKV("unknown", std::move(unknowns));
1533 : 0 : }
1534 : :
1535 [ + - ]: 464 : outputs.push_back(std::move(out));
1536 : :
1537 : : // Fee calculation
1538 [ + - - + ]: 464 : if (MoneyRange(psbtx.tx->vout[i].nValue) && MoneyRange(output_value + psbtx.tx->vout[i].nValue)) {
1539 : : output_value += psbtx.tx->vout[i].nValue;
1540 : : } else {
1541 : : // Hack to just not show fee later
1542 : : have_all_utxos = false;
1543 : : }
1544 : 464 : }
1545 [ + - + - ]: 552 : result.pushKV("outputs", std::move(outputs));
1546 [ + + ]: 276 : if (have_all_utxos) {
1547 [ + - + - : 530 : result.pushKV("fee", ValueFromAmount(total_in - output_value));
+ - ]
1548 : : }
1549 : :
1550 : 276 : return result;
1551 : 330 : },
1552 [ + - + - : 22644 : };
+ - + - +
- + - + +
- - ]
1553 [ + - + - : 52836 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
- - - - -
- ]
1554 : :
1555 : 2195 : static RPCHelpMan combinepsbt()
1556 : : {
1557 : 2195 : return RPCHelpMan{
1558 : : "combinepsbt",
1559 : : "Combine multiple partially signed Bitcoin transactions into one transaction.\n"
1560 : : "Implements the Combiner role.\n",
1561 : : {
1562 [ + - ]: 2195 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base64 strings of partially signed transactions",
1563 : : {
1564 [ + - ]: 2195 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "A base64 string of a PSBT"},
1565 : : },
1566 : : },
1567 : : },
1568 : 0 : RPCResult{
1569 : : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction"
1570 [ + - + - : 4390 : },
+ - ]
1571 : 2195 : RPCExamples{
1572 [ + - + - : 4390 : HelpExampleCli("combinepsbt", R"('["mybase64_1", "mybase64_2", "mybase64_3"]')")
+ - ]
1573 [ + - ]: 2195 : },
1574 : 9 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1575 : : {
1576 : : // Unserialize the transactions
1577 : 9 : std::vector<PartiallySignedTransaction> psbtxs;
1578 [ + - + - : 9 : UniValue txs = request.params[0].get_array();
+ - ]
1579 [ + + ]: 9 : if (txs.empty()) {
1580 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "Parameter 'txs' cannot be empty");
1581 : : }
1582 [ + + ]: 24 : for (unsigned int i = 0; i < txs.size(); ++i) {
1583 : 16 : PartiallySignedTransaction psbtx;
1584 [ + - ]: 16 : std::string error;
1585 [ + - + - : 16 : if (!DecodeBase64PSBT(psbtx, txs[i].get_str(), error)) {
+ - - + ]
1586 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1587 : : }
1588 [ + - ]: 16 : psbtxs.push_back(psbtx);
1589 : 16 : }
1590 : :
1591 : 8 : PartiallySignedTransaction merged_psbt;
1592 [ + - + + ]: 8 : if (!CombinePSBTs(merged_psbt, psbtxs)) {
1593 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, "PSBTs not compatible (different transactions)");
1594 : : }
1595 : :
1596 : 7 : DataStream ssTx{};
1597 [ + - ]: 7 : ssTx << merged_psbt;
1598 [ + - + - ]: 21 : return EncodeBase64(ssTx);
1599 : 12 : },
1600 [ + - + - : 26340 : };
+ - + - +
- + - + -
+ - + - +
+ + + - -
- - ]
1601 [ + - + - : 10975 : }
+ - ]
1602 : :
1603 : 2369 : static RPCHelpMan finalizepsbt()
1604 : : {
1605 : 2369 : return RPCHelpMan{"finalizepsbt",
1606 : : "Finalize the inputs of a PSBT. If the transaction is fully signed, it will produce a\n"
1607 : : "network serialized transaction which can be broadcast with sendrawtransaction. Otherwise a PSBT will be\n"
1608 : : "created which has the final_scriptSig and final_scriptWitness fields filled for inputs that are complete.\n"
1609 : : "Implements the Finalizer and Extractor roles.\n",
1610 : : {
1611 [ + - ]: 2369 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"},
1612 [ + - ]: 4738 : {"extract", RPCArg::Type::BOOL, RPCArg::Default{true}, "If true and the transaction is complete,\n"
1613 : : " extract and return the complete transaction in normal network serialization instead of the PSBT."},
1614 : : },
1615 : 0 : RPCResult{
1616 : : RPCResult::Type::OBJ, "", "",
1617 : : {
1618 : : {RPCResult::Type::STR, "psbt", /*optional=*/true, "The base64-encoded partially signed transaction if not extracted"},
1619 : : {RPCResult::Type::STR_HEX, "hex", /*optional=*/true, "The hex-encoded network transaction if extracted"},
1620 : : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
1621 : : }
1622 [ + - + - : 11845 : },
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + + -
- ]
1623 : 2369 : RPCExamples{
1624 [ + - + - : 4738 : HelpExampleCli("finalizepsbt", "\"psbt\"")
+ - ]
1625 [ + - ]: 2369 : },
1626 : 183 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1627 : : {
1628 : : // Unserialize the transactions
1629 : 183 : PartiallySignedTransaction psbtx;
1630 [ + - ]: 183 : std::string error;
1631 [ + - + - : 183 : if (!DecodeBase64PSBT(psbtx, request.params[0].get_str(), error)) {
+ - - + ]
1632 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1633 : : }
1634 : :
1635 [ + - + + : 183 : bool extract = request.params[1].isNull() || (!request.params[1].isNull() && request.params[1].get_bool());
+ - + - +
- + - +
+ ]
1636 : :
1637 [ + - ]: 183 : CMutableTransaction mtx;
1638 [ + - ]: 183 : bool complete = FinalizeAndExtractPSBT(psbtx, mtx);
1639 : :
1640 : 183 : UniValue result(UniValue::VOBJ);
1641 : 183 : DataStream ssTx{};
1642 [ + + ]: 183 : std::string result_str;
1643 : :
1644 [ + + + + ]: 183 : if (complete && extract) {
1645 [ + - ]: 176 : ssTx << TX_WITH_WITNESS(mtx);
1646 [ + - ]: 176 : result_str = HexStr(ssTx);
1647 [ + - + - : 352 : result.pushKV("hex", result_str);
+ - ]
1648 : : } else {
1649 [ + - ]: 7 : ssTx << psbtx;
1650 [ + - + - ]: 7 : result_str = EncodeBase64(ssTx.str());
1651 [ + - + - : 14 : result.pushKV("psbt", result_str);
+ - ]
1652 : : }
1653 [ + - + - : 366 : result.pushKV("complete", complete);
+ - ]
1654 : :
1655 : 366 : return result;
1656 : 366 : },
1657 [ + - + - : 33166 : };
+ - + - +
- + - + -
+ - + + -
- ]
1658 [ + - + - : 21321 : }
+ - + - +
- + - + -
- - - - ]
1659 : :
1660 : 2245 : static RPCHelpMan createpsbt()
1661 : : {
1662 : 2245 : return RPCHelpMan{
1663 : : "createpsbt",
1664 : : "Creates a transaction in the Partially Signed Transaction format.\n"
1665 : : "Implements the Creator role.\n"
1666 : : "Note that the transaction's inputs are not signed, and\n"
1667 : : "it is not stored in the wallet or transmitted to the network.\n",
1668 [ + - ]: 4490 : CreateTxDoc(),
1669 : 0 : RPCResult{
1670 : : RPCResult::Type::STR, "", "The resulting raw transaction (base64-encoded string)"
1671 [ + - + - : 4490 : },
+ - ]
1672 : 2245 : RPCExamples{
1673 [ + - + - : 4490 : HelpExampleCli("createpsbt", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"address\\\":0.01}]\"")
+ - ]
1674 [ + - ]: 2245 : },
1675 : 59 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1676 : : {
1677 : :
1678 : 59 : std::optional<bool> rbf;
1679 [ + + ]: 59 : if (!request.params[3].isNull()) {
1680 : 1 : rbf = request.params[3].get_bool();
1681 : : }
1682 : 59 : CMutableTransaction rawTx = ConstructTransaction(request.params[0], request.params[1], request.params[2], rbf);
1683 : :
1684 : : // Make a blank psbt
1685 : 59 : PartiallySignedTransaction psbtx;
1686 [ + - ]: 59 : psbtx.tx = rawTx;
1687 [ + + ]: 122 : for (unsigned int i = 0; i < rawTx.vin.size(); ++i) {
1688 [ + - ]: 63 : psbtx.inputs.emplace_back();
1689 : : }
1690 [ + + ]: 119 : for (unsigned int i = 0; i < rawTx.vout.size(); ++i) {
1691 [ + - ]: 60 : psbtx.outputs.emplace_back();
1692 : : }
1693 : :
1694 : : // Serialize the PSBT
1695 : 59 : DataStream ssTx{};
1696 [ + - ]: 59 : ssTx << psbtx;
1697 : :
1698 [ + - + - ]: 118 : return EncodeBase64(ssTx);
1699 : 118 : },
1700 [ + - + - : 13470 : };
+ - ]
1701 : : }
1702 : :
1703 : 2192 : static RPCHelpMan converttopsbt()
1704 : : {
1705 : 2192 : return RPCHelpMan{
1706 : : "converttopsbt",
1707 : : "Converts a network serialized transaction to a PSBT. This should be used only with createrawtransaction and fundrawtransaction\n"
1708 : : "createpsbt and walletcreatefundedpsbt should be used for new applications.\n",
1709 : : {
1710 [ + - ]: 2192 : {"hexstring", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The hex string of a raw transaction"},
1711 [ + - ]: 4384 : {"permitsigdata", RPCArg::Type::BOOL, RPCArg::Default{false}, "If true, any signatures in the input will be discarded and conversion\n"
1712 : : " will continue. If false, RPC will fail if any signatures are present."},
1713 [ + - ]: 4384 : {"iswitness", RPCArg::Type::BOOL, RPCArg::DefaultHint{"depends on heuristic tests"}, "Whether the transaction hex is a serialized witness transaction.\n"
1714 : : "If iswitness is not present, heuristic tests will be used in decoding.\n"
1715 : : "If true, only witness deserialization will be tried.\n"
1716 : : "If false, only non-witness deserialization will be tried.\n"
1717 : : "This boolean should reflect whether the transaction has inputs\n"
1718 : : "(e.g. fully valid, or on-chain transactions), if known by the caller."
1719 : : },
1720 : : },
1721 : 0 : RPCResult{
1722 : : RPCResult::Type::STR, "", "The resulting raw transaction (base64-encoded string)"
1723 [ + - + - : 4384 : },
+ - ]
1724 : 2192 : RPCExamples{
1725 : : "\nCreate a transaction\n"
1726 [ + - + - : 4384 : + HelpExampleCli("createrawtransaction", "\"[{\\\"txid\\\":\\\"myid\\\",\\\"vout\\\":0}]\" \"[{\\\"data\\\":\\\"00010203\\\"}]\"") +
+ - + - ]
1727 : 2192 : "\nConvert the transaction to a PSBT\n"
1728 [ + - + - : 8768 : + HelpExampleCli("converttopsbt", "\"rawtransaction\"")
+ - + - ]
1729 [ + - ]: 2192 : },
1730 : 6 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1731 : : {
1732 : : // parse hex string from parameter
1733 : 6 : CMutableTransaction tx;
1734 [ + - + + : 6 : bool permitsigdata = request.params[1].isNull() ? false : request.params[1].get_bool();
+ - + - ]
1735 [ + - + + ]: 6 : bool witness_specified = !request.params[2].isNull();
1736 [ + + + - : 6 : bool iswitness = witness_specified ? request.params[2].get_bool() : false;
+ - ]
1737 : 7 : const bool try_witness = witness_specified ? iswitness : true;
1738 : 1 : const bool try_no_witness = witness_specified ? !iswitness : true;
1739 [ + - + - : 6 : if (!DecodeHexTx(tx, request.params[0].get_str(), try_no_witness, try_witness)) {
+ - - + ]
1740 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed");
1741 : : }
1742 : :
1743 : : // Remove all scriptSigs and scriptWitnesses from inputs
1744 [ + + ]: 9 : for (CTxIn& input : tx.vin) {
1745 [ - + + - : 6 : if ((!input.scriptSig.empty() || !input.scriptWitness.IsNull()) && !permitsigdata) {
+ + + + ]
1746 [ + - + - ]: 6 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "Inputs must not have scriptSigs and scriptWitnesses");
1747 : : }
1748 : 3 : input.scriptSig.clear();
1749 : 3 : input.scriptWitness.SetNull();
1750 : : }
1751 : :
1752 : : // Make a blank psbt
1753 : 3 : PartiallySignedTransaction psbtx;
1754 [ + - ]: 3 : psbtx.tx = tx;
1755 [ + + ]: 6 : for (unsigned int i = 0; i < tx.vin.size(); ++i) {
1756 [ + - ]: 3 : psbtx.inputs.emplace_back();
1757 : : }
1758 [ + + ]: 8 : for (unsigned int i = 0; i < tx.vout.size(); ++i) {
1759 [ + - ]: 5 : psbtx.outputs.emplace_back();
1760 : : }
1761 : :
1762 : : // Serialize the PSBT
1763 : 3 : DataStream ssTx{};
1764 [ + - ]: 3 : ssTx << psbtx;
1765 : :
1766 [ + - + - ]: 6 : return EncodeBase64(ssTx);
1767 : 6 : },
1768 [ + - + - : 41648 : };
+ - + - +
- + - + -
+ - + - +
- + + -
- ]
1769 [ + - + - : 15344 : }
+ - + - -
- ]
1770 : :
1771 : 2188 : static RPCHelpMan utxoupdatepsbt()
1772 : : {
1773 : 2188 : return RPCHelpMan{
1774 : : "utxoupdatepsbt",
1775 : : "Updates all segwit inputs and outputs in a PSBT with data from output descriptors, the UTXO set, txindex, or the mempool.\n",
1776 : : {
1777 [ + - ]: 2188 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"},
1778 [ + - ]: 2188 : {"descriptors", RPCArg::Type::ARR, RPCArg::Optional::OMITTED, "An array of either strings or objects", {
1779 [ + - ]: 2188 : {"", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "An output descriptor"},
1780 [ + - ]: 2188 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "An object with an output descriptor and extra information", {
1781 [ + - ]: 2188 : {"desc", RPCArg::Type::STR, RPCArg::Optional::NO, "An output descriptor"},
1782 [ + - ]: 4376 : {"range", RPCArg::Type::RANGE, RPCArg::Default{1000}, "Up to what index HD chains should be explored (either end or [begin,end])"},
1783 : : }},
1784 : : }},
1785 : : },
1786 : 0 : RPCResult {
1787 : : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction with inputs updated"
1788 [ + - + - : 4376 : },
+ - ]
1789 : 2188 : RPCExamples {
1790 [ + - + - : 4376 : HelpExampleCli("utxoupdatepsbt", "\"psbt\"")
+ - ]
1791 [ + - ]: 2188 : },
1792 : 2 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1793 : : {
1794 : : // Parse descriptors, if any.
1795 : 2 : FlatSigningProvider provider;
1796 [ + - + + ]: 2 : if (!request.params[1].isNull()) {
1797 [ + - + - : 1 : auto descs = request.params[1].get_array();
+ - ]
1798 [ + + ]: 4 : for (size_t i = 0; i < descs.size(); ++i) {
1799 [ + - + - ]: 3 : EvalDescriptorStringOrObject(descs[i], provider);
1800 : : }
1801 : 1 : }
1802 : :
1803 : : // We don't actually need private keys further on; hide them as a precaution.
1804 [ + - ]: 2 : const PartiallySignedTransaction& psbtx = ProcessPSBT(
1805 : 2 : request.params[0].get_str(),
1806 : 2 : request.context,
1807 [ + - ]: 2 : HidingSigningProvider(&provider, /*hide_secret=*/true, /*hide_origin=*/false),
1808 : : /*sighash_type=*/std::nullopt,
1809 [ + - + - : 2 : /*finalize=*/false);
+ - ]
1810 : :
1811 : 2 : DataStream ssTx{};
1812 [ + - ]: 2 : ssTx << psbtx;
1813 [ + - + - ]: 6 : return EncodeBase64(ssTx);
1814 : 2 : },
1815 [ + - + - : 56888 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + + +
+ + + - -
- - - - ]
1816 [ + - + - : 28444 : }
+ - + - +
- + - + -
- - - - -
- ]
1817 : :
1818 : 2189 : static RPCHelpMan joinpsbts()
1819 : : {
1820 : 2189 : return RPCHelpMan{
1821 : : "joinpsbts",
1822 : : "Joins multiple distinct PSBTs with different inputs and outputs into one PSBT with inputs and outputs from all of the PSBTs\n"
1823 : : "No input in any of the PSBTs can be in more than one of the PSBTs.\n",
1824 : : {
1825 [ + - ]: 2189 : {"txs", RPCArg::Type::ARR, RPCArg::Optional::NO, "The base64 strings of partially signed transactions",
1826 : : {
1827 [ + - ]: 2189 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"}
1828 : : }}
1829 : : },
1830 : 0 : RPCResult {
1831 : : RPCResult::Type::STR, "", "The base64-encoded partially signed transaction"
1832 [ + - + - : 4378 : },
+ - ]
1833 : 2189 : RPCExamples {
1834 [ + - + - : 4378 : HelpExampleCli("joinpsbts", "\"psbt\"")
+ - ]
1835 [ + - ]: 2189 : },
1836 : 3 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1837 : : {
1838 : : // Unserialize the transactions
1839 : 3 : std::vector<PartiallySignedTransaction> psbtxs;
1840 [ + - + - : 3 : UniValue txs = request.params[0].get_array();
+ - ]
1841 : :
1842 [ - + ]: 3 : if (txs.size() <= 1) {
1843 [ # # # # ]: 0 : throw JSONRPCError(RPC_INVALID_PARAMETER, "At least two PSBTs are required to join PSBTs.");
1844 : : }
1845 : :
1846 : : uint32_t best_version = 1;
1847 : : uint32_t best_locktime = 0xffffffff;
1848 [ + + ]: 9 : for (unsigned int i = 0; i < txs.size(); ++i) {
1849 : 6 : PartiallySignedTransaction psbtx;
1850 [ + - ]: 6 : std::string error;
1851 [ + - + - : 6 : if (!DecodeBase64PSBT(psbtx, txs[i].get_str(), error)) {
+ - - + ]
1852 [ # # # # ]: 0 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1853 : : }
1854 [ + - ]: 6 : psbtxs.push_back(psbtx);
1855 : : // Choose the highest version number
1856 [ + + ]: 6 : if (psbtx.tx->version > best_version) {
1857 : 3 : best_version = psbtx.tx->version;
1858 : : }
1859 : : // Choose the lowest lock time
1860 [ + + ]: 6 : if (psbtx.tx->nLockTime < best_locktime) {
1861 : 3 : best_locktime = psbtx.tx->nLockTime;
1862 : : }
1863 : 6 : }
1864 : :
1865 : : // Create a blank psbt where everything will be added
1866 : 3 : PartiallySignedTransaction merged_psbt;
1867 [ + - ]: 3 : merged_psbt.tx = CMutableTransaction();
1868 : 3 : merged_psbt.tx->version = best_version;
1869 : 3 : merged_psbt.tx->nLockTime = best_locktime;
1870 : :
1871 : : // Merge
1872 [ + + ]: 8 : for (auto& psbt : psbtxs) {
1873 [ + + ]: 15 : for (unsigned int i = 0; i < psbt.tx->vin.size(); ++i) {
1874 [ + - + + ]: 10 : if (!merged_psbt.AddInput(psbt.tx->vin[i], psbt.inputs[i])) {
1875 [ + - + - : 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, strprintf("Input %s:%d exists in multiple PSBTs", psbt.tx->vin[i].prevout.hash.ToString(), psbt.tx->vin[i].prevout.n));
+ - ]
1876 : : }
1877 : : }
1878 [ + + ]: 10 : for (unsigned int i = 0; i < psbt.tx->vout.size(); ++i) {
1879 [ + - ]: 5 : merged_psbt.AddOutput(psbt.tx->vout[i], psbt.outputs[i]);
1880 : : }
1881 [ - + ]: 5 : for (auto& xpub_pair : psbt.m_xpubs) {
1882 [ # # ]: 0 : if (merged_psbt.m_xpubs.count(xpub_pair.first) == 0) {
1883 [ # # # # ]: 0 : merged_psbt.m_xpubs[xpub_pair.first] = xpub_pair.second;
1884 : : } else {
1885 [ # # # # ]: 0 : merged_psbt.m_xpubs[xpub_pair.first].insert(xpub_pair.second.begin(), xpub_pair.second.end());
1886 : : }
1887 : : }
1888 [ + - ]: 5 : merged_psbt.unknown.insert(psbt.unknown.begin(), psbt.unknown.end());
1889 : : }
1890 : :
1891 : : // Generate list of shuffled indices for shuffling inputs and outputs of the merged PSBT
1892 [ + - ]: 2 : std::vector<int> input_indices(merged_psbt.inputs.size());
1893 : 2 : std::iota(input_indices.begin(), input_indices.end(), 0);
1894 [ + - ]: 2 : std::vector<int> output_indices(merged_psbt.outputs.size());
1895 : 2 : std::iota(output_indices.begin(), output_indices.end(), 0);
1896 : :
1897 : : // Shuffle input and output indices lists
1898 : 2 : std::shuffle(input_indices.begin(), input_indices.end(), FastRandomContext());
1899 : 2 : std::shuffle(output_indices.begin(), output_indices.end(), FastRandomContext());
1900 : :
1901 : 2 : PartiallySignedTransaction shuffled_psbt;
1902 [ + - ]: 2 : shuffled_psbt.tx = CMutableTransaction();
1903 : 2 : shuffled_psbt.tx->version = merged_psbt.tx->version;
1904 : 2 : shuffled_psbt.tx->nLockTime = merged_psbt.tx->nLockTime;
1905 [ + + ]: 10 : for (int i : input_indices) {
1906 [ + - ]: 8 : shuffled_psbt.AddInput(merged_psbt.tx->vin[i], merged_psbt.inputs[i]);
1907 : : }
1908 [ + + ]: 6 : for (int i : output_indices) {
1909 [ + - ]: 4 : shuffled_psbt.AddOutput(merged_psbt.tx->vout[i], merged_psbt.outputs[i]);
1910 : : }
1911 [ + - ]: 2 : shuffled_psbt.unknown.insert(merged_psbt.unknown.begin(), merged_psbt.unknown.end());
1912 : :
1913 : 2 : DataStream ssTx{};
1914 [ + - ]: 2 : ssTx << shuffled_psbt;
1915 [ + - + - ]: 6 : return EncodeBase64(ssTx);
1916 : 5 : },
1917 [ + - + - : 26268 : };
+ - + - +
- + - + -
+ - + - +
+ + + - -
- - ]
1918 [ + - + - : 10945 : }
+ - ]
1919 : :
1920 : 2194 : static RPCHelpMan analyzepsbt()
1921 : : {
1922 : 2194 : return RPCHelpMan{
1923 : : "analyzepsbt",
1924 : : "Analyzes and provides information about the current status of a PSBT and its inputs\n",
1925 : : {
1926 [ + - ]: 2194 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "A base64 string of a PSBT"}
1927 : : },
1928 : 0 : RPCResult {
1929 : : RPCResult::Type::OBJ, "", "",
1930 : : {
1931 : : {RPCResult::Type::ARR, "inputs", /*optional=*/true, "",
1932 : : {
1933 : : {RPCResult::Type::OBJ, "", "",
1934 : : {
1935 : : {RPCResult::Type::BOOL, "has_utxo", "Whether a UTXO is provided"},
1936 : : {RPCResult::Type::BOOL, "is_final", "Whether the input is finalized"},
1937 : : {RPCResult::Type::OBJ, "missing", /*optional=*/true, "Things that are missing that are required to complete this input",
1938 : : {
1939 : : {RPCResult::Type::ARR, "pubkeys", /*optional=*/true, "",
1940 : : {
1941 : : {RPCResult::Type::STR_HEX, "keyid", "Public key ID, hash160 of the public key, of a public key whose BIP 32 derivation path is missing"},
1942 : : }},
1943 : : {RPCResult::Type::ARR, "signatures", /*optional=*/true, "",
1944 : : {
1945 : : {RPCResult::Type::STR_HEX, "keyid", "Public key ID, hash160 of the public key, of a public key whose signature is missing"},
1946 : : }},
1947 : : {RPCResult::Type::STR_HEX, "redeemscript", /*optional=*/true, "Hash160 of the redeem script that is missing"},
1948 : : {RPCResult::Type::STR_HEX, "witnessscript", /*optional=*/true, "SHA256 of the witness script that is missing"},
1949 : : }},
1950 : : {RPCResult::Type::STR, "next", /*optional=*/true, "Role of the next person that this input needs to go to"},
1951 : : }},
1952 : : }},
1953 : : {RPCResult::Type::NUM, "estimated_vsize", /*optional=*/true, "Estimated vsize of the final signed transaction"},
1954 [ + - ]: 4388 : {RPCResult::Type::STR_AMOUNT, "estimated_feerate", /*optional=*/true, "Estimated feerate of the final signed transaction in " + CURRENCY_UNIT + "/kvB. Shown only if all UTXO slots in the PSBT have been filled"},
1955 : : {RPCResult::Type::STR_AMOUNT, "fee", /*optional=*/true, "The transaction fee paid. Shown only if all UTXO slots in the PSBT have been filled"},
1956 : : {RPCResult::Type::STR, "next", "Role of the next person that this psbt needs to go to"},
1957 : : {RPCResult::Type::STR, "error", /*optional=*/true, "Error message (if there is one)"},
1958 : : }
1959 [ + - + - : 57044 : },
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
+ + + + +
+ + + + +
+ - - - -
- - - - -
- - - ]
1960 : 2194 : RPCExamples {
1961 [ + - + - : 4388 : HelpExampleCli("analyzepsbt", "\"psbt\"")
+ - ]
1962 [ + - ]: 2194 : },
1963 : 8 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
1964 : : {
1965 : : // Unserialize the transaction
1966 : 8 : PartiallySignedTransaction psbtx;
1967 [ + - ]: 8 : std::string error;
1968 [ + - + - : 8 : if (!DecodeBase64PSBT(psbtx, request.params[0].get_str(), error)) {
+ - + + ]
1969 [ + - + - ]: 2 : throw JSONRPCError(RPC_DESERIALIZATION_ERROR, strprintf("TX decode failed %s", error));
1970 : : }
1971 : :
1972 [ + - + - ]: 7 : PSBTAnalysis psbta = AnalyzePSBT(psbtx);
1973 : :
1974 : 7 : UniValue result(UniValue::VOBJ);
1975 : 7 : UniValue inputs_result(UniValue::VARR);
1976 [ + + ]: 11 : for (const auto& input : psbta.inputs) {
1977 : 4 : UniValue input_univ(UniValue::VOBJ);
1978 : 4 : UniValue missing(UniValue::VOBJ);
1979 : :
1980 [ + - + - : 8 : input_univ.pushKV("has_utxo", input.has_utxo);
+ - ]
1981 [ + - + - : 8 : input_univ.pushKV("is_final", input.is_final);
+ - ]
1982 [ + - + - : 8 : input_univ.pushKV("next", PSBTRoleName(input.next));
+ - + - ]
1983 : :
1984 [ - + ]: 4 : if (!input.missing_pubkeys.empty()) {
1985 : 0 : UniValue missing_pubkeys_univ(UniValue::VARR);
1986 [ # # ]: 0 : for (const CKeyID& pubkey : input.missing_pubkeys) {
1987 [ # # # # : 0 : missing_pubkeys_univ.push_back(HexStr(pubkey));
# # ]
1988 : : }
1989 [ # # # # ]: 0 : missing.pushKV("pubkeys", std::move(missing_pubkeys_univ));
1990 : 0 : }
1991 [ - + ]: 4 : if (!input.missing_redeem_script.IsNull()) {
1992 [ # # # # : 0 : missing.pushKV("redeemscript", HexStr(input.missing_redeem_script));
# # # # ]
1993 : : }
1994 [ - + ]: 4 : if (!input.missing_witness_script.IsNull()) {
1995 [ # # # # : 0 : missing.pushKV("witnessscript", HexStr(input.missing_witness_script));
# # # # ]
1996 : : }
1997 [ + + ]: 4 : if (!input.missing_sigs.empty()) {
1998 : 1 : UniValue missing_sigs_univ(UniValue::VARR);
1999 [ + + ]: 2 : for (const CKeyID& pubkey : input.missing_sigs) {
2000 [ + - + - : 1 : missing_sigs_univ.push_back(HexStr(pubkey));
+ - ]
2001 : : }
2002 [ + - + - ]: 2 : missing.pushKV("signatures", std::move(missing_sigs_univ));
2003 : 1 : }
2004 [ + - + + ]: 4 : if (!missing.getKeys().empty()) {
2005 [ + - + - ]: 2 : input_univ.pushKV("missing", std::move(missing));
2006 : : }
2007 [ + - ]: 4 : inputs_result.push_back(std::move(input_univ));
2008 : 4 : }
2009 [ + + + - : 11 : if (!inputs_result.empty()) result.pushKV("inputs", std::move(inputs_result));
+ - ]
2010 : :
2011 [ + + ]: 7 : if (psbta.estimated_vsize != std::nullopt) {
2012 [ + - + - : 6 : result.pushKV("estimated_vsize", (int)*psbta.estimated_vsize);
+ - ]
2013 : : }
2014 [ + + ]: 7 : if (psbta.estimated_feerate != std::nullopt) {
2015 [ + - + - : 6 : result.pushKV("estimated_feerate", ValueFromAmount(psbta.estimated_feerate->GetFeePerK()));
+ - ]
2016 : : }
2017 [ + + ]: 7 : if (psbta.fee != std::nullopt) {
2018 [ + - + - : 6 : result.pushKV("fee", ValueFromAmount(*psbta.fee));
+ - ]
2019 : : }
2020 [ + - + - : 14 : result.pushKV("next", PSBTRoleName(psbta.next));
+ - + - ]
2021 [ + + ]: 7 : if (!psbta.error.empty()) {
2022 [ + - + - : 6 : result.pushKV("error", psbta.error);
+ - ]
2023 : : }
2024 : :
2025 : 7 : return result;
2026 : 15 : },
2027 [ + - + - : 19746 : };
+ - + - +
- + - + +
- - ]
2028 [ + - + - : 46074 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- - - - -
- - ]
2029 : :
2030 : 2199 : RPCHelpMan descriptorprocesspsbt()
2031 : : {
2032 : 2199 : return RPCHelpMan{
2033 : : "descriptorprocesspsbt",
2034 : : "Update all segwit inputs in a PSBT with information from output descriptors, the UTXO set or the mempool. \n"
2035 : : "Then, sign the inputs we are able to with information from the output descriptors. ",
2036 : : {
2037 [ + - ]: 2199 : {"psbt", RPCArg::Type::STR, RPCArg::Optional::NO, "The transaction base64 string"},
2038 [ + - ]: 2199 : {"descriptors", RPCArg::Type::ARR, RPCArg::Optional::NO, "An array of either strings or objects", {
2039 [ + - ]: 2199 : {"", RPCArg::Type::STR, RPCArg::Optional::OMITTED, "An output descriptor"},
2040 [ + - ]: 2199 : {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "An object with an output descriptor and extra information", {
2041 [ + - ]: 2199 : {"desc", RPCArg::Type::STR, RPCArg::Optional::NO, "An output descriptor"},
2042 [ + - ]: 4398 : {"range", RPCArg::Type::RANGE, RPCArg::Default{1000}, "Up to what index HD chains should be explored (either end or [begin,end])"},
2043 : : }},
2044 : : }},
2045 [ + - ]: 4398 : {"sighashtype", RPCArg::Type::STR, RPCArg::Default{"DEFAULT for Taproot, ALL otherwise"}, "The signature hash type to sign with if not specified by the PSBT. Must be one of\n"
2046 : : " \"DEFAULT\"\n"
2047 : : " \"ALL\"\n"
2048 : : " \"NONE\"\n"
2049 : : " \"SINGLE\"\n"
2050 : : " \"ALL|ANYONECANPAY\"\n"
2051 : : " \"NONE|ANYONECANPAY\"\n"
2052 : : " \"SINGLE|ANYONECANPAY\""},
2053 [ + - ]: 4398 : {"bip32derivs", RPCArg::Type::BOOL, RPCArg::Default{true}, "Include BIP 32 derivation paths for public keys if we know them"},
2054 [ + - ]: 4398 : {"finalize", RPCArg::Type::BOOL, RPCArg::Default{true}, "Also finalize inputs if possible"},
2055 : : },
2056 : 0 : RPCResult{
2057 : : RPCResult::Type::OBJ, "", "",
2058 : : {
2059 : : {RPCResult::Type::STR, "psbt", "The base64-encoded partially signed transaction"},
2060 : : {RPCResult::Type::BOOL, "complete", "If the transaction has a complete set of signatures"},
2061 : : {RPCResult::Type::STR_HEX, "hex", /*optional=*/true, "The hex-encoded network transaction if complete"},
2062 : : }
2063 [ + - + - : 10995 : },
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + + -
- ]
2064 : 2199 : RPCExamples{
2065 [ + - + - : 4398 : HelpExampleCli("descriptorprocesspsbt", "\"psbt\" \"[\\\"descriptor1\\\", \\\"descriptor2\\\"]\"") +
+ - ]
2066 [ + - + - : 6597 : HelpExampleCli("descriptorprocesspsbt", "\"psbt\" \"[{\\\"desc\\\":\\\"mydescriptor\\\", \\\"range\\\":21}]\"")
+ - + - ]
2067 [ + - ]: 2199 : },
2068 : 13 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
2069 : : {
2070 : : // Add descriptor information to a signing provider
2071 : 13 : FlatSigningProvider provider;
2072 : :
2073 [ + - + - : 13 : auto descs = request.params[1].get_array();
+ - ]
2074 [ + + ]: 89 : for (size_t i = 0; i < descs.size(); ++i) {
2075 [ + - + - ]: 76 : EvalDescriptorStringOrObject(descs[i], provider, /*expand_priv=*/true);
2076 : : }
2077 : :
2078 [ + - + + ]: 13 : std::optional<int> sighash_type = ParseSighashString(request.params[2]);
2079 [ + - + + : 12 : bool bip32derivs = request.params[3].isNull() ? true : request.params[3].get_bool();
+ - + - ]
2080 [ + - + + : 12 : bool finalize = request.params[4].isNull() ? true : request.params[4].get_bool();
+ - + - ]
2081 : :
2082 : 12 : const PartiallySignedTransaction& psbtx = ProcessPSBT(
2083 : 12 : request.params[0].get_str(),
2084 [ + - ]: 12 : request.context,
2085 : 7 : HidingSigningProvider(&provider, /*hide_secret=*/false, !bip32derivs),
2086 : : sighash_type,
2087 [ + - + - : 12 : finalize);
+ + ]
2088 : :
2089 : : // Check whether or not all of the inputs are now signed
2090 : 5 : bool complete = true;
2091 [ + + ]: 11 : for (const auto& input : psbtx.inputs) {
2092 [ + - ]: 6 : complete &= PSBTInputSigned(input);
2093 : : }
2094 : :
2095 : 5 : DataStream ssTx{};
2096 [ + - ]: 5 : ssTx << psbtx;
2097 : :
2098 : 5 : UniValue result(UniValue::VOBJ);
2099 : :
2100 [ + - + - : 10 : result.pushKV("psbt", EncodeBase64(ssTx));
+ - + - ]
2101 [ + - + - : 10 : result.pushKV("complete", complete);
+ - ]
2102 [ + + ]: 5 : if (complete) {
2103 [ + - ]: 2 : CMutableTransaction mtx;
2104 [ + - ]: 2 : PartiallySignedTransaction psbtx_copy = psbtx;
2105 [ + - + - ]: 2 : CHECK_NONFATAL(FinalizeAndExtractPSBT(psbtx_copy, mtx));
2106 : 2 : DataStream ssTx_final;
2107 [ + - ]: 2 : ssTx_final << TX_WITH_WITNESS(mtx);
2108 [ + - + - : 4 : result.pushKV("hex", HexStr(ssTx_final));
+ - + - ]
2109 : 4 : }
2110 : 10 : return result;
2111 : 21 : },
2112 [ + - + - : 90159 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
+ + + + +
- - - - -
- ]
2113 [ + - + - : 50577 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - -
- - - - -
- - ]
2114 : :
2115 : 1218 : void RegisterRawTransactionRPCCommands(CRPCTable& t)
2116 : : {
2117 : 1218 : static const CRPCCommand commands[]{
2118 : : {"rawtransactions", &getrawtransaction},
2119 : : {"rawtransactions", &createrawtransaction},
2120 : : {"rawtransactions", &decoderawtransaction},
2121 : : {"rawtransactions", &decodescript},
2122 : : {"rawtransactions", &combinerawtransaction},
2123 : : {"rawtransactions", &signrawtransactionwithkey},
2124 : : {"rawtransactions", &decodepsbt},
2125 : : {"rawtransactions", &combinepsbt},
2126 : : {"rawtransactions", &finalizepsbt},
2127 : : {"rawtransactions", &createpsbt},
2128 : : {"rawtransactions", &converttopsbt},
2129 : : {"rawtransactions", &utxoupdatepsbt},
2130 : : {"rawtransactions", &descriptorprocesspsbt},
2131 : : {"rawtransactions", &joinpsbts},
2132 : : {"rawtransactions", &analyzepsbt},
2133 [ + + + - : 1218 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
- - ]
2134 [ + + ]: 19488 : for (const auto& c : commands) {
2135 : 18270 : t.appendCommand(c.name, &c);
2136 : : }
2137 : 1218 : }
|