Branch data Line data Source code
1 : : // Copyright (c) 2009-2010 Satoshi Nakamoto
2 : : // Copyright (c) 2009-present The Bitcoin Core developers
3 : : // Distributed under the MIT software license, see the accompanying
4 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
5 : :
6 : : #include <wallet/wallet.h>
7 : :
8 : : #include <bitcoin-build-config.h> // IWYU pragma: keep
9 : : #include <addresstype.h>
10 : : #include <blockfilter.h>
11 : : #include <chain.h>
12 : : #include <coins.h>
13 : : #include <common/args.h>
14 : : #include <common/messages.h>
15 : : #include <common/settings.h>
16 : : #include <common/signmessage.h>
17 : : #include <common/system.h>
18 : : #include <consensus/amount.h>
19 : : #include <consensus/consensus.h>
20 : : #include <consensus/validation.h>
21 : : #include <external_signer.h>
22 : : #include <interfaces/chain.h>
23 : : #include <interfaces/handler.h>
24 : : #include <interfaces/wallet.h>
25 : : #include <kernel/mempool_removal_reason.h>
26 : : #include <kernel/types.h>
27 : : #include <key.h>
28 : : #include <key_io.h>
29 : : #include <logging.h>
30 : : #include <node/types.h>
31 : : #include <outputtype.h>
32 : : #include <policy/feerate.h>
33 : : #include <policy/truc_policy.h>
34 : : #include <primitives/block.h>
35 : : #include <primitives/transaction.h>
36 : : #include <psbt.h>
37 : : #include <pubkey.h>
38 : : #include <random.h>
39 : : #include <script/descriptor.h>
40 : : #include <script/interpreter.h>
41 : : #include <script/script.h>
42 : : #include <script/sign.h>
43 : : #include <script/signingprovider.h>
44 : : #include <script/solver.h>
45 : : #include <serialize.h>
46 : : #include <span.h>
47 : : #include <streams.h>
48 : : #include <support/allocators/secure.h>
49 : : #include <support/allocators/zeroafterfree.h>
50 : : #include <support/cleanse.h>
51 : : #include <sync.h>
52 : : #include <tinyformat.h>
53 : : #include <uint256.h>
54 : : #include <univalue.h>
55 : : #include <util/check.h>
56 : : #include <util/fs.h>
57 : : #include <util/fs_helpers.h>
58 : : #include <util/moneystr.h>
59 : : #include <util/result.h>
60 : : #include <util/string.h>
61 : : #include <util/time.h>
62 : : #include <util/translation.h>
63 : : #include <wallet/coincontrol.h>
64 : : #include <wallet/context.h>
65 : : #include <wallet/crypter.h>
66 : : #include <wallet/db.h>
67 : : #include <wallet/external_signer_scriptpubkeyman.h>
68 : : #include <wallet/scriptpubkeyman.h>
69 : : #include <wallet/transaction.h>
70 : : #include <wallet/types.h>
71 : : #include <wallet/walletdb.h>
72 : : #include <wallet/walletutil.h>
73 : :
74 : : #include <algorithm>
75 : : #include <cassert>
76 : : #include <condition_variable>
77 : : #include <exception>
78 : : #include <optional>
79 : : #include <stdexcept>
80 : : #include <thread>
81 : : #include <tuple>
82 : : #include <variant>
83 : :
84 : : struct KeyOriginInfo;
85 : :
86 : : using common::AmountErrMsg;
87 : : using common::AmountHighWarn;
88 : : using common::PSBTError;
89 : : using interfaces::FoundBlock;
90 : : using kernel::ChainstateRole;
91 : : using util::ReplaceAll;
92 : : using util::ToString;
93 : :
94 : : namespace wallet {
95 : :
96 : 185 : bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
97 : : {
98 : 370 : const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
99 [ + + ]: 185 : if (!setting_value.isArray()) setting_value.setArray();
100 [ + + ]: 380 : for (const auto& value : setting_value.getValues()) {
101 [ + - + - ]: 195 : if (value.isStr() && value.get_str() == wallet_name) return interfaces::SettingsAction::SKIP_WRITE;
102 : : }
103 [ + - ]: 185 : setting_value.push_back(wallet_name);
104 : 185 : return interfaces::SettingsAction::WRITE;
105 : 185 : };
106 [ + - + - ]: 185 : return chain.updateRwSetting("wallet", update_function);
107 : : }
108 : :
109 : 15 : bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
110 : : {
111 : 30 : const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
112 [ + + ]: 15 : if (!setting_value.isArray()) return interfaces::SettingsAction::SKIP_WRITE;
113 : 13 : common::SettingsValue new_value(common::SettingsValue::VARR);
114 [ + - + + ]: 47 : for (const auto& value : setting_value.getValues()) {
115 [ + - + - : 34 : if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value);
+ + + - +
- ]
116 : : }
117 [ - + - + : 13 : if (new_value.size() == setting_value.size()) return interfaces::SettingsAction::SKIP_WRITE;
+ + ]
118 : 9 : setting_value = std::move(new_value);
119 : 9 : return interfaces::SettingsAction::WRITE;
120 : 13 : };
121 [ + - + - ]: 15 : return chain.updateRwSetting("wallet", update_function);
122 : : }
123 : :
124 : 1691 : static void UpdateWalletSetting(interfaces::Chain& chain,
125 : : const std::string& wallet_name,
126 : : std::optional<bool> load_on_startup,
127 : : std::vector<bilingual_str>& warnings)
128 : : {
129 [ + + ]: 1691 : if (!load_on_startup) return;
130 [ + + - + ]: 190 : if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) {
131 [ # # # # ]: 0 : warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup."));
132 [ + + - + ]: 190 : } else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) {
133 [ # # # # ]: 0 : warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup."));
134 : : }
135 : : }
136 : :
137 : : /**
138 : : * Refresh mempool status so the wallet is in an internally consistent state and
139 : : * immediately knows the transaction's status: Whether it can be considered
140 : : * trusted and is eligible to be abandoned ...
141 : : */
142 : 18870 : static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain)
143 : : {
144 [ + + ]: 18870 : if (chain.isInMempool(tx.GetHash())) {
145 [ - + ]: 3599 : tx.m_state = TxStateInMempool();
146 [ + + ]: 15271 : } else if (tx.state<TxStateInMempool>()) {
147 [ - + ]: 249 : tx.m_state = TxStateInactive();
148 : : }
149 : 18870 : }
150 : :
151 : 884 : bool AddWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
152 : : {
153 : 884 : LOCK(context.wallets_mutex);
154 [ - + ]: 884 : assert(wallet);
155 [ + - ]: 884 : std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
156 [ + - ]: 884 : if (i != context.wallets.end()) return false;
157 [ + - ]: 884 : context.wallets.push_back(wallet);
158 [ + - ]: 884 : wallet->ConnectScriptPubKeyManNotifiers();
159 [ + - ]: 884 : wallet->NotifyCanGetAddressesChanged();
160 : : return true;
161 : 884 : }
162 : :
163 : 884 : bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings)
164 : : {
165 [ - + ]: 884 : assert(wallet);
166 : :
167 : 884 : interfaces::Chain& chain = wallet->chain();
168 [ - + ]: 884 : std::string name = wallet->GetName();
169 [ + - + - ]: 2652 : WITH_LOCK(wallet->cs_wallet, wallet->WriteBestBlock());
170 : :
171 : : // Unregister with the validation interface which also drops shared pointers.
172 [ + - ]: 884 : wallet->DisconnectChainNotifications();
173 : 884 : {
174 [ + - ]: 884 : LOCK(context.wallets_mutex);
175 : 884 : std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
176 [ - + - - ]: 884 : if (i == context.wallets.end()) return false;
177 [ + - ]: 884 : context.wallets.erase(i);
178 : 0 : }
179 : : // Notify unload so that upper layers release the shared pointer.
180 [ + - ]: 884 : wallet->NotifyUnload();
181 : :
182 : : // Write the wallet setting
183 [ + - ]: 884 : UpdateWalletSetting(chain, name, load_on_start, warnings);
184 : :
185 : : return true;
186 : 884 : }
187 : :
188 : 0 : bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start)
189 : : {
190 : 0 : std::vector<bilingual_str> warnings;
191 [ # # ]: 0 : return RemoveWallet(context, wallet, load_on_start, warnings);
192 : 0 : }
193 : :
194 : 1439 : std::vector<std::shared_ptr<CWallet>> GetWallets(WalletContext& context)
195 : : {
196 : 1439 : LOCK(context.wallets_mutex);
197 [ + - ]: 1439 : return context.wallets;
198 : 1439 : }
199 : :
200 : 4713 : std::shared_ptr<CWallet> GetDefaultWallet(WalletContext& context, size_t& count)
201 : : {
202 : 4713 : LOCK(context.wallets_mutex);
203 [ - + ]: 4713 : count = context.wallets.size();
204 [ + + + - : 9403 : return count == 1 ? context.wallets[0] : nullptr;
+ - ]
205 : 4713 : }
206 : :
207 : 14903 : std::shared_ptr<CWallet> GetWallet(WalletContext& context, const std::string& name)
208 : : {
209 : 14903 : LOCK(context.wallets_mutex);
210 [ + + ]: 69112 : for (const std::shared_ptr<CWallet>& wallet : context.wallets) {
211 [ + + + - : 83952 : if (wallet->GetName() == name) return wallet;
+ - ]
212 : : }
213 : 63 : return nullptr;
214 : 14903 : }
215 : :
216 : 1 : std::unique_ptr<interfaces::Handler> HandleLoadWallet(WalletContext& context, LoadWalletFn load_wallet)
217 : : {
218 : 1 : LOCK(context.wallets_mutex);
219 [ + - ]: 1 : auto it = context.wallet_load_fns.emplace(context.wallet_load_fns.end(), std::move(load_wallet));
220 [ + - + - : 3 : return interfaces::MakeCleanupHandler([&context, it] { LOCK(context.wallets_mutex); context.wallet_load_fns.erase(it); });
+ - ]
221 : 1 : }
222 : :
223 : 889 : void NotifyWalletLoaded(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
224 : : {
225 : 889 : LOCK(context.wallets_mutex);
226 [ + + ]: 890 : for (auto& load_wallet : context.wallet_load_fns) {
227 [ + - + - ]: 1 : load_wallet(interfaces::MakeWallet(context, wallet));
228 : : }
229 : 889 : }
230 : :
231 : : static GlobalMutex g_loading_wallet_mutex;
232 : : static GlobalMutex g_wallet_release_mutex;
233 : : static std::condition_variable g_wallet_release_cv;
234 : : static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex);
235 : : static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex);
236 : :
237 : : // Custom deleter for shared_ptr<CWallet>.
238 : 966 : static void FlushAndDeleteWallet(CWallet* wallet)
239 : : {
240 [ - + ]: 966 : const std::string name = wallet->GetName();
241 [ + - ]: 966 : wallet->WalletLogPrintf("Releasing wallet %s..\n", name);
242 : 966 : delete wallet;
243 : : // Wallet is now released, notify WaitForDeleteWallet, if any.
244 : 966 : {
245 [ + - ]: 966 : LOCK(g_wallet_release_mutex);
246 [ + + ]: 966 : if (g_unloading_wallet_set.erase(name) == 0) {
247 : : // WaitForDeleteWallet was not called for this wallet, all done.
248 [ + - ]: 77 : return;
249 : : }
250 : 77 : }
251 : 889 : g_wallet_release_cv.notify_all();
252 : 966 : }
253 : :
254 : 889 : void WaitForDeleteWallet(std::shared_ptr<CWallet>&& wallet)
255 : : {
256 : : // Mark wallet for unloading.
257 [ - + ]: 889 : const std::string name = wallet->GetName();
258 : 889 : {
259 [ + - ]: 889 : LOCK(g_wallet_release_mutex);
260 [ + - ]: 889 : g_unloading_wallet_set.insert(name);
261 : : // Do not expect to be the only one removing this wallet.
262 : : // Multiple threads could simultaneously be waiting for deletion.
263 : 0 : }
264 : :
265 : : // Time to ditch our shared_ptr and wait for FlushAndDeleteWallet call.
266 : 889 : wallet.reset();
267 : 889 : {
268 [ + - ]: 889 : WAIT_LOCK(g_wallet_release_mutex, lock);
269 [ - + ]: 889 : while (g_unloading_wallet_set.contains(name)) {
270 [ # # ]: 0 : g_wallet_release_cv.wait(lock);
271 : : }
272 : 889 : }
273 : 889 : }
274 : :
275 : : namespace {
276 : 233 : std::shared_ptr<CWallet> LoadWalletInternal(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
277 : : {
278 : 233 : try {
279 [ + - ]: 233 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
280 [ + + ]: 233 : if (!database) {
281 [ + - + - : 133 : error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
+ - + - +
- ]
282 : 19 : return nullptr;
283 : : }
284 : :
285 [ + - + - ]: 214 : context.chain->initMessage(_("Loading wallet…"));
286 [ + - ]: 214 : std::shared_ptr<CWallet> wallet = CWallet::LoadExisting(context, name, std::move(database), error, warnings);
287 [ + + ]: 214 : if (!wallet) {
288 [ + - + - : 70 : error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error;
+ - + - +
- ]
289 : 10 : status = DatabaseStatus::FAILED_LOAD;
290 : 10 : return nullptr;
291 : : }
292 : :
293 [ + - ]: 204 : NotifyWalletLoaded(context, wallet);
294 [ + - ]: 204 : AddWallet(context, wallet);
295 [ + - ]: 204 : wallet->postInitProcess();
296 : :
297 : : // Write the wallet setting
298 [ + - ]: 204 : UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
299 : :
300 : 204 : return wallet;
301 [ - - ]: 233 : } catch (const std::runtime_error& e) {
302 [ - - - - ]: 0 : error = Untranslated(e.what());
303 : 0 : status = DatabaseStatus::FAILED_LOAD;
304 : 0 : return nullptr;
305 : 0 : }
306 : : }
307 : :
308 : : class FastWalletRescanFilter
309 : : {
310 : : public:
311 [ + - ]: 5 : FastWalletRescanFilter(const CWallet& wallet) : m_wallet(wallet)
312 : : {
313 : : // create initial filter with scripts from all ScriptPubKeyMans
314 [ + - + + ]: 50 : for (auto spkm : m_wallet.GetAllScriptPubKeyMans()) {
315 [ + - ]: 45 : auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(spkm)};
316 [ - + ]: 45 : assert(desc_spkm != nullptr);
317 [ + - ]: 45 : AddScriptPubKeys(desc_spkm);
318 : : // save each range descriptor's end for possible future filter updates
319 [ + - + + ]: 45 : if (desc_spkm->IsHDEnabled()) {
320 [ + - + - : 40 : m_last_range_ends.emplace(desc_spkm->GetID(), desc_spkm->GetEndRange());
+ - ]
321 : : }
322 : 0 : }
323 : 5 : }
324 : :
325 : 616 : void UpdateIfNeeded()
326 : : {
327 : : // repopulate filter with new scripts if top-up has happened since last iteration
328 [ + + ]: 5544 : for (const auto& [desc_spkm_id, last_range_end] : m_last_range_ends) {
329 [ + - ]: 4928 : auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(m_wallet.GetScriptPubKeyMan(desc_spkm_id))};
330 [ - + ]: 4928 : assert(desc_spkm != nullptr);
331 : 4928 : int32_t current_range_end{desc_spkm->GetEndRange()};
332 [ + + ]: 4928 : if (current_range_end > last_range_end) {
333 : 80 : AddScriptPubKeys(desc_spkm, last_range_end);
334 : 80 : m_last_range_ends.at(desc_spkm->GetID()) = current_range_end;
335 : : }
336 : : }
337 : 616 : }
338 : :
339 : 616 : std::optional<bool> MatchesBlock(const uint256& block_hash) const
340 : : {
341 : 616 : return m_wallet.chain().blockFilterMatchesAny(BlockFilterType::BASIC, block_hash, m_filter_set);
342 : : }
343 : :
344 : : private:
345 : : const CWallet& m_wallet;
346 : : /** Map for keeping track of each range descriptor's last seen end range.
347 : : * This information is used to detect whether new addresses were derived
348 : : * (that is, if the current end range is larger than the saved end range)
349 : : * after processing a block and hence a filter set update is needed to
350 : : * take possible keypool top-ups into account.
351 : : */
352 : : std::map<uint256, int32_t> m_last_range_ends;
353 : : GCSFilter::ElementSet m_filter_set;
354 : :
355 : 125 : void AddScriptPubKeys(const DescriptorScriptPubKeyMan* desc_spkm, int32_t last_range_end = 0)
356 : : {
357 [ + + + - ]: 11344 : for (const auto& script_pub_key : desc_spkm->GetScriptPubKeys(last_range_end)) {
358 [ + - + - ]: 22438 : m_filter_set.emplace(script_pub_key.begin(), script_pub_key.end());
359 : 125 : }
360 : 125 : }
361 : : };
362 : : } // namespace
363 : :
364 : 237 : std::shared_ptr<CWallet> LoadWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
365 : : {
366 [ + - ]: 711 : auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name));
367 [ + + ]: 237 : if (!result.second) {
368 [ + - ]: 8 : error = Untranslated("Wallet already loading.");
369 : 4 : status = DatabaseStatus::FAILED_LOAD;
370 : 4 : return nullptr;
371 : : }
372 : 233 : auto wallet = LoadWalletInternal(context, name, load_on_start, options, status, error, warnings);
373 [ + - + - ]: 466 : WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first));
374 [ - + ]: 233 : return wallet;
375 : 233 : }
376 : :
377 : 599 : std::shared_ptr<CWallet> CreateWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
378 : : {
379 : : // Wallet must have a non-empty name
380 [ + + ]: 599 : if (name.empty()) {
381 [ + - ]: 4 : error = Untranslated("Wallet name cannot be empty");
382 : 2 : status = DatabaseStatus::FAILED_NEW_UNNAMED;
383 : 2 : return nullptr;
384 : : }
385 : :
386 : 597 : uint64_t wallet_creation_flags = options.create_flags;
387 : 597 : const SecureString& passphrase = options.create_passphrase;
388 : :
389 : : // Only descriptor wallets can be created
390 [ - + ]: 597 : Assert(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS);
391 : 597 : options.require_format = DatabaseFormat::SQLITE;
392 : :
393 : : // Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted
394 : 597 : bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET);
395 : :
396 : : // Born encrypted wallets need to be created blank first.
397 [ + + ]: 597 : if (!passphrase.empty()) {
398 : 12 : wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET;
399 : : }
400 : :
401 : : // Private keys must be disabled for an external signer wallet
402 [ + + + + ]: 597 : if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
403 [ + - ]: 2 : error = Untranslated("Private keys must be disabled when using an external signer");
404 : 1 : status = DatabaseStatus::FAILED_CREATE;
405 : 1 : return nullptr;
406 : : }
407 : :
408 : : // Do not allow a passphrase when private keys are disabled
409 [ + + + + ]: 596 : if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
410 [ + - ]: 8 : error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled.");
411 : 4 : status = DatabaseStatus::FAILED_CREATE;
412 : 4 : return nullptr;
413 : : }
414 : :
415 : : // Wallet::Verify will check if we're trying to create a wallet with a duplicate name.
416 : 592 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
417 [ + + ]: 592 : if (!database) {
418 [ + - + - : 28 : error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
+ - + - +
- ]
419 : 4 : status = DatabaseStatus::FAILED_VERIFY;
420 : 4 : return nullptr;
421 : : }
422 : :
423 : : // Make the wallet
424 [ + - + - ]: 588 : context.chain->initMessage(_("Creating wallet…"));
425 [ + + ]: 588 : std::shared_ptr<CWallet> wallet = CWallet::CreateNew(context, name, std::move(database), wallet_creation_flags, error, warnings);
426 [ - + ]: 585 : if (!wallet) {
427 [ # # # # : 0 : error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error;
# # # # #
# ]
428 : 0 : status = DatabaseStatus::FAILED_CREATE;
429 : 0 : return nullptr;
430 : : }
431 : :
432 : : // Encrypt the wallet
433 [ + + + - ]: 585 : if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
434 [ + - - + ]: 8 : if (!wallet->EncryptWallet(passphrase)) {
435 [ # # # # ]: 0 : error = Untranslated("Error: Wallet created but failed to encrypt.");
436 : 0 : status = DatabaseStatus::FAILED_ENCRYPT;
437 : 0 : return nullptr;
438 : : }
439 [ + + ]: 8 : if (!create_blank) {
440 : : // Unlock the wallet
441 [ + - - + ]: 4 : if (!wallet->Unlock(passphrase)) {
442 [ # # # # ]: 0 : error = Untranslated("Error: Wallet was encrypted but could not be unlocked");
443 : 0 : status = DatabaseStatus::FAILED_ENCRYPT;
444 : 0 : return nullptr;
445 : : }
446 : :
447 : : // Set a seed for the wallet
448 : 4 : {
449 [ + - ]: 4 : LOCK(wallet->cs_wallet);
450 [ + - ]: 4 : wallet->SetupDescriptorScriptPubKeyMans();
451 : 0 : }
452 : :
453 : : // Relock the wallet
454 [ + - ]: 4 : wallet->Lock();
455 : : }
456 : : }
457 : :
458 [ + - + - ]: 1755 : WITH_LOCK(wallet->cs_wallet, wallet->LogStats());
459 [ + - ]: 585 : NotifyWalletLoaded(context, wallet);
460 [ + - ]: 585 : AddWallet(context, wallet);
461 [ + - ]: 585 : wallet->postInitProcess();
462 : :
463 : : // Write the wallet settings
464 [ + - ]: 585 : UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
465 : :
466 : 585 : status = DatabaseStatus::SUCCESS;
467 : 585 : return wallet;
468 : 592 : }
469 : :
470 : : // Re-creates wallet from the backup file by renaming and moving it into the wallet's directory.
471 : : // If 'load_after_restore=true', the wallet object will be fully initialized and appended to the context.
472 : 45 : std::shared_ptr<CWallet> RestoreWallet(WalletContext& context, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings, bool load_after_restore, bool allow_unnamed)
473 : : {
474 : : // Error if the wallet name is empty and allow_unnamed == false
475 : : // allow_unnamed == true is only used by migration to migrate an unnamed wallet
476 [ + + + + ]: 45 : if (!allow_unnamed && wallet_name.empty()) {
477 [ + - ]: 2 : error = Untranslated("Wallet name cannot be empty");
478 : 1 : status = DatabaseStatus::FAILED_NEW_UNNAMED;
479 : 1 : return nullptr;
480 : : }
481 : :
482 [ + - ]: 44 : DatabaseOptions options;
483 [ + - ]: 44 : ReadDatabaseArgs(*context.args, options);
484 : 44 : options.require_existing = true;
485 : :
486 [ - + + - : 88 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name));
+ - + - ]
487 [ + - + - ]: 88 : auto wallet_file = wallet_path / "wallet.dat";
488 : 44 : std::shared_ptr<CWallet> wallet;
489 : 44 : bool wallet_file_copied = false;
490 : 44 : bool created_parent_dir = false;
491 : :
492 : 44 : try {
493 [ + - + + ]: 44 : if (!fs::exists(backup_file)) {
494 [ + - + - ]: 2 : error = Untranslated("Backup file does not exist");
495 : 1 : status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE;
496 : 1 : return nullptr;
497 : : }
498 : :
499 : : // Wallet directories are allowed to exist, but must not contain a .dat file.
500 : : // Any existing wallet database is treated as a hard failure to prevent overwriting.
501 [ + - + + ]: 43 : if (fs::exists(wallet_path)) {
502 : : // If this is a file, it is the db and we don't want to overwrite it.
503 [ + - - + ]: 13 : if (!fs::is_directory(wallet_path)) {
504 [ # # # # : 0 : error = Untranslated(strprintf("Failed to restore wallet. Database file exists '%s'.", fs::PathToString(wallet_path)));
# # ]
505 : 0 : status = DatabaseStatus::FAILED_ALREADY_EXISTS;
506 : 0 : return nullptr;
507 : : }
508 : :
509 : : // Check we are not going to overwrite an existing db file
510 [ + - + + ]: 13 : if (fs::exists(wallet_file)) {
511 [ - + + - : 6 : error = Untranslated(strprintf("Failed to restore wallet. Database file exists in '%s'.", fs::PathToString(wallet_file)));
+ - ]
512 : 2 : status = DatabaseStatus::FAILED_ALREADY_EXISTS;
513 : 2 : return nullptr;
514 : : }
515 : : } else {
516 : : // The directory doesn't exist, create it
517 [ + - - + ]: 30 : if (!TryCreateDirectories(wallet_path)) {
518 [ # # # # : 0 : error = Untranslated(strprintf("Failed to restore database path '%s'.", fs::PathToString(wallet_path)));
# # ]
519 : 0 : status = DatabaseStatus::FAILED_ALREADY_EXISTS;
520 : 0 : return nullptr;
521 : : }
522 : : created_parent_dir = true;
523 : : }
524 : :
525 [ + - ]: 41 : fs::copy_file(backup_file, wallet_file, fs::copy_options::none);
526 : 41 : wallet_file_copied = true;
527 : :
528 [ + + ]: 41 : if (load_after_restore) {
529 [ + - - + ]: 66 : wallet = LoadWallet(context, wallet_name, load_on_start, options, status, error, warnings);
530 : : }
531 [ - - ]: 0 : } catch (const std::exception& e) {
532 [ - - ]: 0 : assert(!wallet);
533 [ - - - - : 0 : if (!error.empty()) error += Untranslated("\n");
- - - - ]
534 [ - - - - : 0 : error += Untranslated(strprintf("Unexpected exception: %s", e.what()));
- - ]
535 : 0 : }
536 : :
537 : : // Remove created wallet path only when loading fails
538 [ + - + + ]: 33 : if (load_after_restore && !wallet) {
539 [ + - + - ]: 14 : if (wallet_file_copied) fs::remove(wallet_file);
540 : : // Clean up the parent directory if we created it during restoration.
541 : : // As we have created it, it must be empty after deleting the wallet file.
542 [ + - ]: 14 : if (created_parent_dir) {
543 [ + - + - ]: 14 : Assume(fs::is_empty(wallet_path));
544 [ + - ]: 14 : fs::remove(wallet_path);
545 : : }
546 : : }
547 : :
548 : 41 : return wallet;
549 : 132 : }
550 : :
551 : : /** @defgroup mapWallet
552 : : *
553 : : * @{
554 : : */
555 : :
556 : 85347 : const CWalletTx* CWallet::GetWalletTx(const Txid& hash) const
557 : : {
558 : 85347 : AssertLockHeld(cs_wallet);
559 : 85347 : const auto it = mapWallet.find(hash);
560 [ + + ]: 85347 : if (it == mapWallet.end())
561 : : return nullptr;
562 : 84961 : return &(it->second);
563 : : }
564 : :
565 : 434 : void CWallet::UpgradeDescriptorCache()
566 : : {
567 [ + + + + : 434 : if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) {
+ + ]
568 : 425 : return;
569 : : }
570 : :
571 [ + + ]: 53 : for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) {
572 [ + - ]: 44 : DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
573 [ + - ]: 44 : desc_spkm->UpgradeDescriptorCache();
574 : : }
575 : 9 : SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
576 : : }
577 : :
578 : : /* Given a wallet passphrase string and an unencrypted master key, determine the proper key
579 : : * derivation parameters (should take at least 100ms) and encrypt the master key. */
580 : 26 : static bool EncryptMasterKey(const SecureString& wallet_passphrase, const CKeyingMaterial& plain_master_key, CMasterKey& master_key)
581 : : {
582 : 26 : constexpr MillisecondsDouble target_time{100};
583 : 26 : CCrypter crypter;
584 : :
585 : : // Get the weighted average of iterations we can do in 100ms over 2 runs.
586 [ + + ]: 74 : for (int i = 0; i < 2; i++){
587 : 50 : auto start_time{NodeClock::now()};
588 [ - + + - ]: 50 : crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod);
589 : 50 : auto elapsed_time{NodeClock::now() - start_time};
590 : :
591 [ + + ]: 50 : if (elapsed_time <= 0s) {
592 : : // We are probably in a test with a mocked clock.
593 : 2 : master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS;
594 : 2 : break;
595 : : }
596 : :
597 : : // target_iterations : elapsed_iterations :: target_time : elapsed_time
598 : 48 : unsigned int target_iterations = master_key.nDeriveIterations * target_time / elapsed_time;
599 : : // Get the weighted average with previous runs.
600 : 48 : master_key.nDeriveIterations = (i * master_key.nDeriveIterations + target_iterations) / (i + 1);
601 : : }
602 : :
603 [ + + ]: 26 : if (master_key.nDeriveIterations < CMasterKey::DEFAULT_DERIVE_ITERATIONS) {
604 : 13 : master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS;
605 : : }
606 : :
607 [ - + + - : 26 : if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
+ - ]
608 : : return false;
609 : : }
610 [ + - - + ]: 26 : if (!crypter.Encrypt(plain_master_key, master_key.vchCryptedKey)) {
611 : 0 : return false;
612 : : }
613 : :
614 : : return true;
615 : 26 : }
616 : :
617 : 83 : static bool DecryptMasterKey(const SecureString& wallet_passphrase, const CMasterKey& master_key, CKeyingMaterial& plain_master_key)
618 : : {
619 : 83 : CCrypter crypter;
620 [ - + + - : 83 : if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
+ - ]
621 : : return false;
622 : : }
623 [ - + + - : 83 : if (!crypter.Decrypt(master_key.vchCryptedKey, plain_master_key)) {
+ + ]
624 : 9 : return false;
625 : : }
626 : :
627 : : return true;
628 : 83 : }
629 : :
630 : 79 : bool CWallet::Unlock(const SecureString& strWalletPassphrase)
631 : : {
632 : 79 : CKeyingMaterial plain_master_key;
633 : :
634 : 79 : {
635 [ + - ]: 79 : LOCK(cs_wallet);
636 [ + - + + ]: 86 : for (const auto& [_, master_key] : mapMasterKeys)
637 : : {
638 [ + - + + ]: 79 : if (!DecryptMasterKey(strWalletPassphrase, master_key, plain_master_key)) {
639 : 7 : continue; // try another master key
640 : : }
641 [ + - + - ]: 72 : if (Unlock(plain_master_key)) {
642 : : // Now that we've unlocked, upgrade the descriptor cache
643 [ + - ]: 72 : UpgradeDescriptorCache();
644 [ + - ]: 72 : return true;
645 : : }
646 : : }
647 : 72 : }
648 : 7 : return false;
649 : 79 : }
650 : :
651 : 4 : bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase)
652 : : {
653 : 4 : bool fWasLocked = IsLocked();
654 : :
655 : 4 : {
656 [ + - ]: 4 : LOCK2(m_relock_mutex, cs_wallet);
657 [ + - ]: 4 : Lock();
658 : :
659 : 4 : CKeyingMaterial plain_master_key;
660 [ + - + - ]: 4 : for (auto& [master_key_id, master_key] : mapMasterKeys)
661 : : {
662 [ + - + + ]: 4 : if (!DecryptMasterKey(strOldWalletPassphrase, master_key, plain_master_key)) {
663 : : return false;
664 : : }
665 [ + - + - ]: 2 : if (Unlock(plain_master_key))
666 : : {
667 [ + - + - ]: 2 : if (!EncryptMasterKey(strNewWalletPassphrase, plain_master_key, master_key)) {
668 : : return false;
669 : : }
670 [ + - ]: 2 : WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", master_key.nDeriveIterations);
671 : :
672 [ + - + - ]: 2 : WalletBatch(GetDatabase()).WriteMasterKey(master_key_id, master_key);
673 [ + - ]: 2 : if (fWasLocked)
674 [ + - ]: 2 : Lock();
675 : 2 : return true;
676 : : }
677 : : }
678 [ - - - - : 12 : }
+ - + - ]
679 : :
680 : 0 : return false;
681 : : }
682 : :
683 : 47004 : void CWallet::SetLastBlockProcessedInMem(int block_height, uint256 block_hash)
684 : : {
685 : 47004 : AssertLockHeld(cs_wallet);
686 : :
687 : 47004 : m_last_block_processed = block_hash;
688 : 47004 : m_last_block_processed_height = block_height;
689 : 47004 : }
690 : :
691 : 4107 : void CWallet::SetLastBlockProcessed(int block_height, uint256 block_hash)
692 : : {
693 : 4107 : AssertLockHeld(cs_wallet);
694 : :
695 : 4107 : SetLastBlockProcessedInMem(block_height, block_hash);
696 : 4107 : WriteBestBlock();
697 : 4107 : }
698 : :
699 : 2021 : std::set<Txid> CWallet::GetConflicts(const Txid& txid) const
700 : : {
701 : 2021 : std::set<Txid> result;
702 : 2021 : AssertLockHeld(cs_wallet);
703 : :
704 : 2021 : const auto it = mapWallet.find(txid);
705 [ + - ]: 4042 : if (it == mapWallet.end())
706 : : return result;
707 : 2021 : const CWalletTx& wtx = it->second;
708 : :
709 : 2021 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
710 : :
711 [ + + ]: 5157 : for (const CTxIn& txin : wtx.tx->vin)
712 : : {
713 [ + + ]: 3136 : if (mapTxSpends.count(txin.prevout) <= 1)
714 : 3021 : continue; // No conflict if zero or one spends
715 : 115 : range = mapTxSpends.equal_range(txin.prevout);
716 [ + + ]: 3440 : for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it)
717 [ + - ]: 304 : result.insert(_it->second);
718 : : }
719 : : return result;
720 : 0 : }
721 : :
722 : 225 : bool CWallet::HasWalletSpend(const CTransactionRef& tx) const
723 : : {
724 : 225 : AssertLockHeld(cs_wallet);
725 : 225 : const Txid& txid = tx->GetHash();
726 [ - + + + ]: 803 : for (unsigned int i = 0; i < tx->vout.size(); ++i) {
727 [ + + ]: 581 : if (IsSpent(COutPoint(txid, i))) {
728 : : return true;
729 : : }
730 : : }
731 : : return false;
732 : : }
733 : :
734 : 14 : void CWallet::Close()
735 : : {
736 : 14 : GetDatabase().Close();
737 : 14 : }
738 : :
739 : 13335 : void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range)
740 : : {
741 : : // We want all the wallet transactions in range to have the same metadata as
742 : : // the oldest (smallest nOrderPos).
743 : : // So: find smallest nOrderPos:
744 : :
745 : 13335 : int nMinOrderPos = std::numeric_limits<int>::max();
746 : 13335 : const CWalletTx* copyFrom = nullptr;
747 [ + + ]: 29248 : for (TxSpends::iterator it = range.first; it != range.second; ++it) {
748 : 15913 : const CWalletTx* wtx = &mapWallet.at(it->second);
749 [ + + ]: 15913 : if (wtx->nOrderPos < nMinOrderPos) {
750 : 15886 : nMinOrderPos = wtx->nOrderPos;
751 : 15886 : copyFrom = wtx;
752 : : }
753 : : }
754 : :
755 [ + - ]: 13335 : if (!copyFrom) {
756 : : return;
757 : : }
758 : :
759 : : // Now copy data from copyFrom to rest:
760 [ + + ]: 29248 : for (TxSpends::iterator it = range.first; it != range.second; ++it)
761 : : {
762 : 15913 : const Txid& hash = it->second;
763 : 15913 : CWalletTx* copyTo = &mapWallet.at(hash);
764 [ + + ]: 15913 : if (copyFrom == copyTo) continue;
765 : 2578 : assert(copyFrom && "Oldest wallet transaction in range assumed to have been found.");
766 [ + + ]: 2578 : if (!copyFrom->IsEquivalentTo(*copyTo)) continue;
767 : 3 : copyTo->mapValue = copyFrom->mapValue;
768 : 3 : copyTo->vOrderForm = copyFrom->vOrderForm;
769 : : // nTimeReceived not copied on purpose
770 : 3 : copyTo->nTimeSmart = copyFrom->nTimeSmart;
771 : : // nOrderPos not copied on purpose
772 : : // cached members not copied on purpose
773 : : }
774 : : }
775 : :
776 : : /**
777 : : * Outpoint is spent if any non-conflicted transaction
778 : : * spends it:
779 : : */
780 : 551193 : bool CWallet::IsSpent(const COutPoint& outpoint) const
781 : : {
782 : 551193 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
783 : 551193 : range = mapTxSpends.equal_range(outpoint);
784 : :
785 [ + + ]: 552313 : for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
786 : 340818 : const Txid& txid = it->second;
787 : 340818 : const auto mit = mapWallet.find(txid);
788 [ + - ]: 341938 : if (mit != mapWallet.end()) {
789 [ + + ]: 340818 : const auto& wtx = mit->second;
790 [ + + + + : 340939 : if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted())
+ + ]
791 : : return true; // Spent
792 : : }
793 : : }
794 : : return false;
795 : : }
796 : :
797 : 13335 : void CWallet::AddToSpends(const COutPoint& outpoint, const Txid& txid)
798 : : {
799 : 13335 : mapTxSpends.insert(std::make_pair(outpoint, txid));
800 : :
801 : 13335 : UnlockCoin(outpoint);
802 : :
803 : 13335 : std::pair<TxSpends::iterator, TxSpends::iterator> range;
804 : 13335 : range = mapTxSpends.equal_range(outpoint);
805 : 13335 : SyncMetaData(range);
806 : 13335 : }
807 : :
808 : :
809 : 27496 : void CWallet::AddToSpends(const CWalletTx& wtx)
810 : : {
811 [ + + ]: 27496 : if (wtx.IsCoinBase()) // Coinbases don't spend anything!
812 : : return;
813 : :
814 [ + + ]: 19951 : for (const CTxIn& txin : wtx.tx->vin)
815 : 13335 : AddToSpends(txin.prevout, wtx.GetHash());
816 : : }
817 : :
818 : 24 : bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
819 : : {
820 : : // Only descriptor wallets can be encrypted
821 [ - + ]: 24 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
822 : :
823 [ + - ]: 24 : if (HasEncryptionKeys())
824 : : return false;
825 : :
826 : 24 : CKeyingMaterial plain_master_key;
827 : :
828 [ + - ]: 24 : plain_master_key.resize(WALLET_CRYPTO_KEY_SIZE);
829 [ - + ]: 24 : GetStrongRandBytes(plain_master_key);
830 : :
831 [ + - ]: 24 : CMasterKey master_key;
832 : :
833 [ + - ]: 24 : master_key.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE);
834 [ - + ]: 24 : GetStrongRandBytes(master_key.vchSalt);
835 : :
836 [ + - + - ]: 24 : if (!EncryptMasterKey(strWalletPassphrase, plain_master_key, master_key)) {
837 : : return false;
838 : : }
839 [ + - ]: 24 : WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", master_key.nDeriveIterations);
840 : :
841 : 24 : {
842 [ + - + - ]: 24 : LOCK2(m_relock_mutex, cs_wallet);
843 [ + - + - ]: 24 : mapMasterKeys[++nMasterKeyMaxID] = master_key;
844 [ + - + - ]: 24 : WalletBatch* encrypted_batch = new WalletBatch(GetDatabase());
845 [ + - - + ]: 24 : if (!encrypted_batch->TxnBegin()) {
846 [ # # ]: 0 : delete encrypted_batch;
847 : 0 : encrypted_batch = nullptr;
848 [ # # ]: 0 : return false;
849 : : }
850 [ + - ]: 24 : encrypted_batch->WriteMasterKey(nMasterKeyMaxID, master_key);
851 : :
852 [ + + ]: 127 : for (const auto& spk_man_pair : m_spk_managers) {
853 [ + - ]: 103 : auto spk_man = spk_man_pair.second.get();
854 [ + - - + ]: 103 : if (!spk_man->Encrypt(plain_master_key, encrypted_batch)) {
855 [ # # ]: 0 : encrypted_batch->TxnAbort();
856 : 0 : delete encrypted_batch;
857 : 0 : encrypted_batch = nullptr;
858 : : // We now probably have half of our keys encrypted in memory, and half not...
859 : : // die and let the user reload the unencrypted wallet.
860 : 0 : assert(false);
861 : : }
862 : : }
863 : :
864 [ + - - + ]: 24 : if (!encrypted_batch->TxnCommit()) {
865 [ # # ]: 0 : delete encrypted_batch;
866 : 0 : encrypted_batch = nullptr;
867 : : // We now have keys encrypted in memory, but not on disk...
868 : : // die to avoid confusion and let the user reload the unencrypted wallet.
869 : 0 : assert(false);
870 : : }
871 : :
872 [ + - ]: 48 : delete encrypted_batch;
873 : 24 : encrypted_batch = nullptr;
874 : :
875 [ + - ]: 24 : Lock();
876 [ + - ]: 24 : Unlock(strWalletPassphrase);
877 : :
878 : : // Make new descriptors with a new seed
879 [ + - + + ]: 24 : if (!IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
880 [ + - ]: 12 : SetupDescriptorScriptPubKeyMans();
881 : : }
882 [ + - ]: 24 : Lock();
883 : :
884 : : // Need to completely rewrite the wallet file; if we don't, the database might keep
885 : : // bits of the unencrypted private key in slack space in the database file.
886 [ + - ]: 24 : GetDatabase().Rewrite();
887 [ - - + - ]: 24 : }
888 [ + - ]: 24 : NotifyStatusChanged(this);
889 : :
890 : : return true;
891 : 24 : }
892 : :
893 : 0 : DBErrors CWallet::ReorderTransactions()
894 : : {
895 : 0 : LOCK(cs_wallet);
896 [ # # ]: 0 : WalletBatch batch(GetDatabase());
897 : :
898 : : // Old wallets didn't have any defined order for transactions
899 : : // Probably a bad idea to change the output of this
900 : :
901 : : // First: get all CWalletTx into a sorted-by-time multimap.
902 : 0 : typedef std::multimap<int64_t, CWalletTx*> TxItems;
903 : 0 : TxItems txByTime;
904 : :
905 [ # # # # ]: 0 : for (auto& entry : mapWallet)
906 : : {
907 : 0 : CWalletTx* wtx = &entry.second;
908 [ # # ]: 0 : txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx));
909 : : }
910 : :
911 : 0 : nOrderPosNext = 0;
912 : 0 : std::vector<int64_t> nOrderPosOffsets;
913 [ # # ]: 0 : for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it)
914 : : {
915 [ # # ]: 0 : CWalletTx *const pwtx = (*it).second;
916 : 0 : int64_t& nOrderPos = pwtx->nOrderPos;
917 : :
918 [ # # ]: 0 : if (nOrderPos == -1)
919 : : {
920 : 0 : nOrderPos = nOrderPosNext++;
921 [ # # ]: 0 : nOrderPosOffsets.push_back(nOrderPos);
922 : :
923 [ # # # # ]: 0 : if (!batch.WriteTx(*pwtx))
924 : : return DBErrors::LOAD_FAIL;
925 : : }
926 : : else
927 : : {
928 : 0 : int64_t nOrderPosOff = 0;
929 [ # # ]: 0 : for (const int64_t& nOffsetStart : nOrderPosOffsets)
930 : : {
931 [ # # ]: 0 : if (nOrderPos >= nOffsetStart)
932 : 0 : ++nOrderPosOff;
933 : : }
934 : 0 : nOrderPos += nOrderPosOff;
935 [ # # ]: 0 : nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1);
936 : :
937 [ # # ]: 0 : if (!nOrderPosOff)
938 : 0 : continue;
939 : :
940 : : // Since we're changing the order, write it back
941 [ # # # # ]: 0 : if (!batch.WriteTx(*pwtx))
942 : : return DBErrors::LOAD_FAIL;
943 : : }
944 : : }
945 [ # # ]: 0 : batch.WriteOrderPosNext(nOrderPosNext);
946 : :
947 : : return DBErrors::LOAD_OK;
948 [ # # ]: 0 : }
949 : :
950 : 19092 : int64_t CWallet::IncOrderPosNext(WalletBatch* batch)
951 : : {
952 : 19092 : AssertLockHeld(cs_wallet);
953 : 19092 : int64_t nRet = nOrderPosNext++;
954 [ + - ]: 19092 : if (batch) {
955 : 19092 : batch->WriteOrderPosNext(nOrderPosNext);
956 : : } else {
957 [ # # ]: 0 : WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext);
958 : : }
959 : 19092 : return nRet;
960 : : }
961 : :
962 : 860 : void CWallet::MarkDirty()
963 : : {
964 : 860 : {
965 : 860 : LOCK(cs_wallet);
966 [ + + + - ]: 3906 : for (auto& [_, wtx] : mapWallet)
967 : 3046 : wtx.MarkDirty();
968 : 860 : }
969 : 860 : }
970 : :
971 : 98 : bool CWallet::MarkReplaced(const Txid& originalHash, const Txid& newHash)
972 : : {
973 : 98 : LOCK(cs_wallet);
974 : :
975 : 98 : auto mi = mapWallet.find(originalHash);
976 : :
977 : : // There is a bug if MarkReplaced is not called on an existing wallet transaction.
978 [ - + ]: 98 : assert(mi != mapWallet.end());
979 : :
980 [ + - ]: 98 : CWalletTx& wtx = (*mi).second;
981 : :
982 : : // Ensure for now that we're not overwriting data
983 [ + - - + ]: 98 : assert(!wtx.mapValue.contains("replaced_by_txid"));
984 : :
985 [ + - + - : 98 : wtx.mapValue["replaced_by_txid"] = newHash.ToString();
+ - ]
986 : :
987 : : // Refresh mempool status without waiting for transactionRemovedFromMempool or transactionAddedToMempool
988 [ + - ]: 98 : RefreshMempoolStatus(wtx, chain());
989 : :
990 [ + - ]: 98 : WalletBatch batch(GetDatabase());
991 : :
992 : 98 : bool success = true;
993 [ + - - + ]: 98 : if (!batch.WriteTx(wtx)) {
994 [ # # # # ]: 0 : WalletLogPrintf("%s: Updating batch tx %s failed\n", __func__, wtx.GetHash().ToString());
995 : 0 : success = false;
996 : : }
997 : :
998 [ + - ]: 98 : NotifyTransactionChanged(originalHash, CT_UPDATED);
999 : :
1000 : 98 : return success;
1001 [ + - ]: 196 : }
1002 : :
1003 : 2024 : void CWallet::SetSpentKeyState(WalletBatch& batch, const Txid& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations)
1004 : : {
1005 : 2024 : AssertLockHeld(cs_wallet);
1006 : 2024 : const CWalletTx* srctx = GetWalletTx(hash);
1007 [ + + ]: 2024 : if (!srctx) return;
1008 : :
1009 : 1882 : CTxDestination dst;
1010 [ + - + - ]: 1882 : if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) {
1011 [ + - + + ]: 1882 : if (IsMine(dst)) {
1012 [ + - + + ]: 1208 : if (used != IsAddressPreviouslySpent(dst)) {
1013 [ + - ]: 19 : if (used) {
1014 [ + - ]: 19 : tx_destinations.insert(dst);
1015 : : }
1016 [ + - ]: 19 : SetAddressPreviouslySpent(batch, dst, used);
1017 : : }
1018 : : }
1019 : : }
1020 : 1882 : }
1021 : :
1022 : 439 : bool CWallet::IsSpentKey(const CScript& scriptPubKey) const
1023 : : {
1024 : 439 : AssertLockHeld(cs_wallet);
1025 : 439 : CTxDestination dest;
1026 [ + - + - ]: 439 : if (!ExtractDestination(scriptPubKey, dest)) {
1027 : : return false;
1028 : : }
1029 [ + - + + ]: 439 : if (IsAddressPreviouslySpent(dest)) {
1030 : 6 : return true;
1031 : : }
1032 : : return false;
1033 : 439 : }
1034 : :
1035 : 26666 : CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const TxState& state, const UpdateWalletTxFn& update_wtx, bool rescanning_old_block)
1036 : : {
1037 : 26666 : LOCK(cs_wallet);
1038 : :
1039 [ + - ]: 26666 : WalletBatch batch(GetDatabase());
1040 : :
1041 [ + - ]: 26666 : Txid hash = tx->GetHash();
1042 : :
1043 [ + - + + ]: 26666 : if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
1044 : : // Mark used destinations
1045 : 859 : std::set<CTxDestination> tx_destinations;
1046 : :
1047 [ + + ]: 2883 : for (const CTxIn& txin : tx->vin) {
1048 : 2024 : const COutPoint& op = txin.prevout;
1049 [ + - ]: 2024 : SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations);
1050 : : }
1051 : :
1052 [ + - ]: 859 : MarkDestinationsDirty(tx_destinations);
1053 : 859 : }
1054 : :
1055 : : // Inserts only if not already there, returns tx inserted or tx found
1056 [ + - ]: 26666 : auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(tx, state));
1057 [ + + ]: 26666 : CWalletTx& wtx = (*ret.first).second;
1058 : 26666 : bool fInsertedNew = ret.second;
1059 [ + + + - : 26666 : bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew);
- + ]
1060 [ + + ]: 26666 : if (fInsertedNew) {
1061 [ + - ]: 19092 : wtx.nTimeReceived = GetTime();
1062 [ + - ]: 19092 : wtx.nOrderPos = IncOrderPosNext(&batch);
1063 [ + - + - ]: 19092 : wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1064 [ + - ]: 19092 : wtx.nTimeSmart = ComputeTimeSmart(wtx, rescanning_old_block);
1065 [ + - ]: 19092 : AddToSpends(wtx);
1066 : :
1067 : : // Update birth time when tx time is older than it.
1068 [ + - + - ]: 19092 : MaybeUpdateBirthTime(wtx.GetTxTime());
1069 : : }
1070 : :
1071 : 7574 : if (!fInsertedNew)
1072 : : {
1073 [ + + ]: 7574 : if (state.index() != wtx.m_state.index()) {
1074 : 4484 : wtx.m_state = state;
1075 : 4484 : fUpdated = true;
1076 : : } else {
1077 [ - + ]: 3090 : assert(TxStateSerializedIndex(wtx.m_state) == TxStateSerializedIndex(state));
1078 [ - + ]: 3090 : assert(TxStateSerializedBlockHash(wtx.m_state) == TxStateSerializedBlockHash(state));
1079 : : }
1080 : : // If we have a witness-stripped version of this transaction, and we
1081 : : // see a new version with a witness, then we must be upgrading a pre-segwit
1082 : : // wallet. Store the new version of the transaction with the witness,
1083 : : // as the stripped-version must be invalid.
1084 : : // TODO: Store all versions of the transaction, instead of just one.
1085 [ + + - + ]: 7574 : if (tx->HasWitness() && !wtx.tx->HasWitness()) {
1086 [ # # # # ]: 0 : wtx.SetTx(tx);
1087 : 0 : fUpdated = true;
1088 : : }
1089 : : }
1090 : :
1091 : : // Mark inactive coinbase transactions and their descendants as abandoned
1092 [ + + ]: 26666 : if (wtx.IsCoinBase() && wtx.isInactive()) {
1093 [ + - ]: 540 : std::vector<CWalletTx*> txs{&wtx};
1094 : :
1095 : 540 : TxStateInactive inactive_state = TxStateInactive{/*abandoned=*/true};
1096 : :
1097 [ + + ]: 1081 : while (!txs.empty()) {
1098 : 541 : CWalletTx* desc_tx = txs.back();
1099 [ + + ]: 541 : txs.pop_back();
1100 [ + + ]: 541 : desc_tx->m_state = inactive_state;
1101 : : // Break caches since we have changed the state
1102 : 541 : desc_tx->MarkDirty();
1103 [ + - ]: 541 : batch.WriteTx(*desc_tx);
1104 [ + - ]: 541 : MarkInputsDirty(desc_tx->tx);
1105 [ - + + + ]: 1623 : for (unsigned int i = 0; i < desc_tx->tx->vout.size(); ++i) {
1106 : 1082 : COutPoint outpoint(desc_tx->GetHash(), i);
1107 : 1082 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(outpoint);
1108 [ + + ]: 1083 : for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
1109 : 1 : const auto wit = mapWallet.find(it->second);
1110 [ + - ]: 1 : if (wit != mapWallet.end()) {
1111 [ + - ]: 1 : txs.push_back(&wit->second);
1112 : : }
1113 : : }
1114 : : }
1115 : : }
1116 : 540 : }
1117 : :
1118 : : //// debug print
1119 [ + - ]: 26666 : std::string status{"no-change"};
1120 [ + + ]: 26666 : if (fInsertedNew || fUpdated) {
1121 [ + + + + ]: 23577 : status = fInsertedNew ? (fUpdated ? "new, update" : "new") : "update";
1122 : : }
1123 [ + - + - ]: 79998 : WalletLogPrintf("AddToWallet %s %s %s", hash.ToString(), status, TxStateString(state));
1124 : :
1125 : : // Write to disk
1126 [ + + ]: 26666 : if (fInsertedNew || fUpdated)
1127 [ + - + - ]: 23577 : if (!batch.WriteTx(wtx))
1128 : : return nullptr;
1129 : :
1130 : : // Break debit/credit balance caches:
1131 : 26666 : wtx.MarkDirty();
1132 : :
1133 : : // Cache the outputs that belong to the wallet
1134 [ + - ]: 26666 : RefreshTXOsFromTx(wtx);
1135 : :
1136 : : // Notify UI of new or updated transaction
1137 [ + + + - ]: 34240 : NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED);
1138 : :
1139 : : #if HAVE_SYSTEM
1140 : : // notify an external script when a wallet transaction comes in or is updated
1141 [ - + ]: 26666 : std::string strCmd = m_notify_tx_changed_script;
1142 : :
1143 [ + + ]: 26666 : if (!strCmd.empty())
1144 : : {
1145 [ + - + - : 52 : ReplaceAll(strCmd, "%s", hash.GetHex());
+ - ]
1146 [ + + ]: 26 : if (auto* conf = wtx.state<TxStateConfirmed>())
1147 : : {
1148 [ + - + - : 44 : ReplaceAll(strCmd, "%b", conf->confirmed_block_hash.GetHex());
+ - ]
1149 [ + - + - : 44 : ReplaceAll(strCmd, "%h", ToString(conf->confirmed_block_height));
+ - ]
1150 : : } else {
1151 [ + - + - : 8 : ReplaceAll(strCmd, "%b", "unconfirmed");
+ - ]
1152 [ + - + - : 8 : ReplaceAll(strCmd, "%h", "-1");
+ - ]
1153 : : }
1154 : : #ifndef WIN32
1155 : : // Substituting the wallet name isn't currently supported on windows
1156 : : // because windows shell escaping has not been implemented yet:
1157 : : // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
1158 : : // A few ways it could be implemented in the future are described in:
1159 : : // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
1160 [ + - + - : 52 : ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
+ - ]
1161 : : #endif
1162 [ + - ]: 26 : std::thread t(runCommand, strCmd);
1163 [ + - ]: 26 : t.detach(); // thread runs free
1164 : 26 : }
1165 : : #endif
1166 : :
1167 : 26666 : return &wtx;
1168 [ + - ]: 106664 : }
1169 : :
1170 : 8404 : bool CWallet::LoadToWallet(const Txid& hash, const UpdateWalletTxFn& fill_wtx)
1171 : : {
1172 : 8404 : const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(nullptr, TxStateInactive{}));
1173 : 8404 : CWalletTx& wtx = ins.first->second;
1174 [ + - ]: 8404 : if (!fill_wtx(wtx, ins.second)) {
1175 : : return false;
1176 : : }
1177 : : // If wallet doesn't have a chain (e.g when using bitcoin-wallet tool),
1178 : : // don't bother to update txn.
1179 [ + + ]: 8404 : if (HaveChain()) {
1180 : 8325 : wtx.updateState(chain());
1181 : : }
1182 [ + - ]: 8404 : if (/* insertion took place */ ins.second) {
1183 : 8404 : wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1184 : : }
1185 : 8404 : AddToSpends(wtx);
1186 [ + + ]: 16993 : for (const CTxIn& txin : wtx.tx->vin) {
1187 : 8589 : auto it = mapWallet.find(txin.prevout.hash);
1188 [ + + ]: 8589 : if (it != mapWallet.end()) {
1189 [ + + ]: 416 : CWalletTx& prevtx = it->second;
1190 [ + + ]: 8592 : if (auto* prev = prevtx.state<TxStateBlockConflicted>()) {
1191 : 3 : MarkConflicted(prev->conflicting_block_hash, prev->conflicting_block_height, wtx.GetHash());
1192 : : }
1193 : : }
1194 : : }
1195 : :
1196 : : // Update birth time when tx time is older than it.
1197 : 8404 : MaybeUpdateBirthTime(wtx.GetTxTime());
1198 : :
1199 : : // Make sure the tx outputs are known by the wallet
1200 : 8404 : RefreshTXOsFromTx(wtx);
1201 : 8404 : return true;
1202 : : }
1203 : :
1204 : 155753 : bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, const SyncTxState& state, bool fUpdate, bool rescanning_old_block)
1205 : : {
1206 [ + + ]: 155753 : const CTransaction& tx = *ptx;
1207 : 155753 : {
1208 : 155753 : AssertLockHeld(cs_wallet);
1209 : :
1210 [ + + ]: 155753 : if (auto* conf = std::get_if<TxStateConfirmed>(&state)) {
1211 [ + + ]: 328703 : for (const CTxIn& txin : tx.vin) {
1212 : 183755 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout);
1213 [ + + ]: 191708 : while (range.first != range.second) {
1214 [ + + ]: 7953 : if (range.first->second != tx.GetHash()) {
1215 [ + - + - : 314 : WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), conf->confirmed_block_hash.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n);
+ - + - ]
1216 : 157 : MarkConflicted(conf->confirmed_block_hash, conf->confirmed_block_height, range.first->second);
1217 : : }
1218 : 7953 : range.first++;
1219 : : }
1220 : : }
1221 : : }
1222 : :
1223 : 155753 : bool fExisted = mapWallet.contains(tx.GetHash());
1224 [ + - ]: 155753 : if (fExisted && !fUpdate) return false;
1225 [ + + + + : 155753 : if (fExisted || IsMine(tx) || IsFromMe(tx))
+ + ]
1226 : : {
1227 : : /* Check if any keys in the wallet keypool that were supposed to be unused
1228 : : * have appeared in a new transaction. If so, remove those keys from the keypool.
1229 : : * This can happen when restoring an old wallet backup that does not contain
1230 : : * the mostly recently created transactions from newer versions of the wallet.
1231 : : */
1232 : :
1233 : : // loop though all outputs
1234 [ + + ]: 135810 : for (const CTxOut& txout: tx.vout) {
1235 [ + + ]: 159302 : for (const auto& spk_man : GetScriptPubKeyMans(txout.scriptPubKey)) {
1236 [ + - + + ]: 77050 : for (auto &dest : spk_man->MarkUnusedAddresses(txout.scriptPubKey)) {
1237 : : // If internal flag is not defined try to infer it from the ScriptPubKeyMan
1238 [ + - ]: 28416 : if (!dest.internal.has_value()) {
1239 [ + - ]: 28416 : dest.internal = IsInternalScriptPubKeyMan(spk_man);
1240 : : }
1241 : :
1242 : : // skip if can't determine whether it's a receiving address or not
1243 [ + + ]: 28416 : if (!dest.internal.has_value()) continue;
1244 : :
1245 : : // If this is a receiving address and it's not in the address book yet
1246 : : // (e.g. it wasn't generated on this node or we're restoring from backup)
1247 : : // add it to the address book for proper transaction accounting
1248 [ + + + - : 18610 : if (!*dest.internal && !FindAddressBookEntry(dest.dest, /* allow_change= */ false)) {
+ + ]
1249 [ + - + - ]: 22750 : SetAddressBook(dest.dest, "", AddressPurpose::RECEIVE);
1250 : : }
1251 : 48634 : }
1252 : 110668 : }
1253 : : }
1254 : :
1255 : : // Block disconnection override an abandoned tx as unconfirmed
1256 : : // which means user may have to call abandontransaction again
1257 [ + - ]: 50284 : TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);
1258 [ + - + - : 75426 : CWalletTx* wtx = AddToWallet(MakeTransactionRef(tx), tx_state, /*update_wtx=*/nullptr, rescanning_old_block);
+ - ]
1259 [ - + ]: 25142 : if (!wtx) {
1260 : : // Can only be nullptr if there was a db write error (missing db, read-only db or a db engine internal writing error).
1261 : : // As we only store arriving transaction in this process, and we don't want an inconsistent state, let's throw an error.
1262 [ # # ]: 0 : throw std::runtime_error("DB error adding transaction to wallet, write failed");
1263 : : }
1264 : : return true;
1265 : : }
1266 : : }
1267 : : return false;
1268 : : }
1269 : :
1270 : 0 : bool CWallet::TransactionCanBeAbandoned(const Txid& hashTx) const
1271 : : {
1272 : 0 : LOCK(cs_wallet);
1273 [ # # ]: 0 : const CWalletTx* wtx = GetWalletTx(hashTx);
1274 [ # # # # : 0 : return wtx && !wtx->isAbandoned() && GetTxDepthInMainChain(*wtx) == 0 && !wtx->InMempool();
# # # # #
# # # ]
1275 : 0 : }
1276 : :
1277 : 62 : void CWallet::UpdateTrucSiblingConflicts(const CWalletTx& parent_wtx, const Txid& child_txid, bool add_conflict) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet)
1278 : : {
1279 : : // Find all other txs in our wallet that spend utxos from this parent
1280 : : // so that we can mark them as mempool-conflicted by this new tx.
1281 [ - + + + ]: 242 : for (long unsigned int i = 0; i < parent_wtx.tx->vout.size(); i++) {
1282 [ + + ]: 225 : for (auto range = mapTxSpends.equal_range(COutPoint(parent_wtx.tx->GetHash(), i)); range.first != range.second; range.first++) {
1283 [ + + ]: 45 : const Txid& sibling_txid = range.first->second;
1284 : : // Skip the child_tx itself
1285 [ + + ]: 45 : if (sibling_txid == child_txid) continue;
1286 [ + - ]: 34 : RecursiveUpdateTxState(/*batch=*/nullptr, sibling_txid, [&child_txid, add_conflict](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1287 [ + + + + ]: 17 : return add_conflict ? (wtx.mempool_conflicts.insert(child_txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED)
1288 [ + + ]: 9 : : (wtx.mempool_conflicts.erase(child_txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED);
1289 : : });
1290 : : }
1291 : : }
1292 : 62 : }
1293 : :
1294 : 31329 : void CWallet::MarkInputsDirty(const CTransactionRef& tx)
1295 : : {
1296 [ + + ]: 73483 : for (const CTxIn& txin : tx->vin) {
1297 : 42154 : auto it = mapWallet.find(txin.prevout.hash);
1298 [ + + ]: 64149 : if (it != mapWallet.end()) {
1299 : 21995 : it->second.MarkDirty();
1300 : : }
1301 : : }
1302 : 31329 : }
1303 : :
1304 : 8 : bool CWallet::AbandonTransaction(const Txid& hashTx)
1305 : : {
1306 : 8 : LOCK(cs_wallet);
1307 : 8 : auto it = mapWallet.find(hashTx);
1308 [ - + ]: 8 : assert(it != mapWallet.end());
1309 [ + - + - ]: 8 : return AbandonTransaction(it->second);
1310 : 8 : }
1311 : :
1312 : 600 : bool CWallet::AbandonTransaction(CWalletTx& tx)
1313 : : {
1314 : : // Can't mark abandoned if confirmed or in mempool
1315 [ + + + + ]: 600 : if (GetTxDepthInMainChain(tx) != 0 || tx.InMempool()) {
1316 : 3 : return false;
1317 : : }
1318 : :
1319 : 1217 : auto try_updating_state = [](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1320 : : // If the orig tx was not in block/mempool, none of its spends can be.
1321 [ + - ]: 620 : assert(!wtx.isConfirmed());
1322 [ - + ]: 620 : assert(!wtx.InMempool());
1323 : : // If already conflicted or abandoned, no need to set abandoned
1324 [ + - + - ]: 620 : if (!wtx.isBlockConflicted() && !wtx.isAbandoned()) {
1325 [ + - ]: 511 : wtx.m_state = TxStateInactive{/*abandoned=*/true};
1326 : 511 : return TxUpdate::NOTIFY_CHANGED;
1327 : : }
1328 : : return TxUpdate::UNCHANGED;
1329 : : };
1330 : :
1331 : : // Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too.
1332 : : // States are not permanent, so these transactions can become unabandoned if they are re-added to the
1333 : : // mempool, or confirmed in a block, or conflicted.
1334 : : // Note: If the reorged coinbase is re-added to the main chain, the descendants that have not had their
1335 : : // states change will remain abandoned and will require manual broadcast if the user wants them.
1336 : :
1337 [ + - ]: 597 : RecursiveUpdateTxState(tx.GetHash(), try_updating_state);
1338 : :
1339 : 597 : return true;
1340 : : }
1341 : :
1342 : 160 : void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const Txid& hashTx)
1343 : : {
1344 : 160 : LOCK(cs_wallet);
1345 : :
1346 : : // If number of conflict confirms cannot be determined, this means
1347 : : // that the block is still unknown or not yet part of the main chain,
1348 : : // for example when loading the wallet during a reindex. Do nothing in that
1349 : : // case.
1350 [ + + + - ]: 160 : if (m_last_block_processed_height < 0 || conflicting_height < 0) {
1351 : : return;
1352 : : }
1353 : 157 : int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1;
1354 [ + - ]: 157 : if (conflictconfirms >= 0)
1355 : : return;
1356 : :
1357 : 323 : auto try_updating_state = [&](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1358 [ + + ]: 166 : if (conflictconfirms < GetTxDepthInMainChain(wtx)) {
1359 : : // Block is 'more conflicted' than current confirm; update.
1360 : : // Mark transaction as conflicted with this block.
1361 : 152 : wtx.m_state = TxStateBlockConflicted{hashBlock, conflicting_height};
1362 : 152 : return TxUpdate::CHANGED;
1363 : : }
1364 : : return TxUpdate::UNCHANGED;
1365 : 157 : };
1366 : :
1367 : : // Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too.
1368 [ + - + - : 314 : RecursiveUpdateTxState(hashTx, try_updating_state);
+ - ]
1369 : :
1370 : 160 : }
1371 : :
1372 : 762 : void CWallet::RecursiveUpdateTxState(const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1373 : 762 : WalletBatch batch(GetDatabase());
1374 [ + - ]: 762 : RecursiveUpdateTxState(&batch, tx_hash, try_updating_state);
1375 : 762 : }
1376 : :
1377 : 16905 : void CWallet::RecursiveUpdateTxState(WalletBatch* batch, const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1378 [ + - ]: 16905 : std::set<Txid> todo;
1379 : 16905 : std::set<Txid> done;
1380 : :
1381 [ + - ]: 16905 : todo.insert(tx_hash);
1382 : :
1383 [ + + ]: 33863 : while (!todo.empty()) {
1384 : 16958 : Txid now = *todo.begin();
1385 : 16958 : todo.erase(now);
1386 [ + - ]: 16958 : done.insert(now);
1387 : 16958 : auto it = mapWallet.find(now);
1388 [ - + ]: 16958 : assert(it != mapWallet.end());
1389 [ + - ]: 16958 : CWalletTx& wtx = it->second;
1390 : :
1391 [ + - ]: 16958 : TxUpdate update_state = try_updating_state(wtx);
1392 [ + + ]: 16958 : if (update_state != TxUpdate::UNCHANGED) {
1393 : 5646 : wtx.MarkDirty();
1394 [ + + + - ]: 5646 : if (batch) batch->WriteTx(wtx);
1395 : : // Iterate over all its outputs, and update those tx states as well (if applicable)
1396 [ - + + + ]: 16981 : for (unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
1397 : 11335 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(COutPoint(now, i));
1398 [ + + ]: 11389 : for (TxSpends::const_iterator iter = range.first; iter != range.second; ++iter) {
1399 [ + + ]: 54 : if (!done.contains(iter->second)) {
1400 [ + - ]: 53 : todo.insert(iter->second);
1401 : : }
1402 : : }
1403 : : }
1404 : :
1405 [ + + ]: 5646 : if (update_state == TxUpdate::NOTIFY_CHANGED) {
1406 [ + - ]: 511 : NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED);
1407 : : }
1408 : :
1409 : : // If a transaction changes its tx state, that usually changes the balance
1410 : : // available of the outputs it spends. So force those to be recomputed
1411 [ + - ]: 5646 : MarkInputsDirty(wtx.tx);
1412 : : }
1413 : : }
1414 : 16905 : }
1415 : :
1416 : 155753 : bool CWallet::SyncTransaction(const CTransactionRef& ptx, const SyncTxState& state, bool update_tx, bool rescanning_old_block)
1417 : : {
1418 [ + + ]: 155753 : if (!AddToWalletIfInvolvingMe(ptx, state, update_tx, rescanning_old_block))
1419 : : return false; // Not one of ours
1420 : :
1421 : : // If a transaction changes 'conflicted' state, that changes the balance
1422 : : // available of the outputs it spends. So force those to be
1423 : : // recomputed, also:
1424 : 25142 : MarkInputsDirty(ptx);
1425 : 25142 : return true;
1426 : : }
1427 : :
1428 : 7287 : void CWallet::transactionAddedToMempool(const CTransactionRef& tx) {
1429 : 7287 : LOCK(cs_wallet);
1430 [ + - ]: 7287 : SyncTransaction(tx, TxStateInMempool{});
1431 : :
1432 : 7287 : auto it = mapWallet.find(tx->GetHash());
1433 [ + + ]: 7287 : if (it != mapWallet.end()) {
1434 [ + - ]: 3689 : RefreshMempoolStatus(it->second, chain());
1435 : : }
1436 : :
1437 : 7287 : const Txid& txid = tx->GetHash();
1438 : :
1439 [ + + ]: 21233 : for (const CTxIn& tx_in : tx->vin) {
1440 : : // For each wallet transaction spending this prevout..
1441 [ + + ]: 24847 : for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1442 [ + + ]: 10901 : const Txid& spent_id = range.first->second;
1443 : : // Skip the recently added tx
1444 [ + + ]: 10901 : if (spent_id == txid) continue;
1445 [ + - ]: 4988 : RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1446 [ + + ]: 2503 : return wtx.mempool_conflicts.insert(txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1447 : : });
1448 : : }
1449 : :
1450 : : }
1451 : :
1452 [ + + ]: 7287 : if (tx->version == TRUC_VERSION) {
1453 : : // Unconfirmed TRUC transactions are only allowed a 1-parent-1-child topology.
1454 : : // For any unconfirmed v3 parents (there should be a maximum of 1 except in reorgs),
1455 : : // record this child so the wallet doesn't try to spend any other outputs
1456 [ + + ]: 546 : for (const CTxIn& tx_in : tx->vin) {
1457 : 391 : auto parent_it = mapWallet.find(tx_in.prevout.hash);
1458 [ + + ]: 545 : if (parent_it != mapWallet.end()) {
1459 [ + + ]: 154 : CWalletTx& parent_wtx = parent_it->second;
1460 [ + + ]: 154 : if (parent_wtx.isUnconfirmed()) {
1461 [ - + ]: 31 : parent_wtx.truc_child_in_mempool = tx->GetHash();
1462 : : // Even though these siblings do not spend the same utxos, they can't
1463 : : // be present in the mempool at the same time because of TRUC policy rules
1464 [ + - ]: 31 : UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/true);
1465 : : }
1466 : : }
1467 : : }
1468 : : }
1469 : 7287 : }
1470 : :
1471 : 50503 : void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason) {
1472 : 50503 : LOCK(cs_wallet);
1473 : 50503 : auto it = mapWallet.find(tx->GetHash());
1474 [ + + ]: 50503 : if (it != mapWallet.end()) {
1475 [ + - ]: 15083 : RefreshMempoolStatus(it->second, chain());
1476 : : }
1477 : : // Handle transactions that were removed from the mempool because they
1478 : : // conflict with transactions in a newly connected block.
1479 [ + + ]: 50503 : if (reason == MemPoolRemovalReason::CONFLICT) {
1480 : : // Trigger external -walletnotify notifications for these transactions.
1481 : : // Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons:
1482 : : //
1483 : : // 1. The transactionRemovedFromMempool callback does not currently
1484 : : // provide the conflicting block's hash and height, and for backwards
1485 : : // compatibility reasons it may not be not safe to store conflicted
1486 : : // wallet transactions with a null block hash. See
1487 : : // https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993.
1488 : : // 2. For most of these transactions, the wallet's internal conflict
1489 : : // detection in the blockConnected handler will subsequently call
1490 : : // MarkConflicted and update them with CONFLICTED status anyway. This
1491 : : // applies to any wallet transaction that has inputs spent in the
1492 : : // block, or that has ancestors in the wallet with inputs spent by
1493 : : // the block.
1494 : : // 3. Longstanding behavior since the sync implementation in
1495 : : // https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync
1496 : : // implementation before that was to mark these transactions
1497 : : // unconfirmed rather than conflicted.
1498 : : //
1499 : : // Nothing described above should be seen as an unchangeable requirement
1500 : : // when improving this code in the future. The wallet's heuristics for
1501 : : // distinguishing between conflicted and unconfirmed transactions are
1502 : : // imperfect, and could be improved in general, see
1503 : : // https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking
1504 [ + - ]: 14 : SyncTransaction(tx, TxStateInactive{});
1505 : : }
1506 : :
1507 : 50503 : const Txid& txid = tx->GetHash();
1508 : :
1509 [ + + ]: 108682 : for (const CTxIn& tx_in : tx->vin) {
1510 : : // Iterate over all wallet transactions spending txin.prev
1511 : : // and recursively mark them as no longer conflicting with
1512 : : // txid
1513 [ + + ]: 71811 : for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1514 [ + - ]: 13632 : const Txid& spent_id = range.first->second;
1515 : :
1516 [ + - ]: 27264 : RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1517 [ + + ]: 13640 : return wtx.mempool_conflicts.erase(txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1518 : : });
1519 : : }
1520 : : }
1521 : :
1522 [ + + ]: 50503 : if (tx->version == TRUC_VERSION) {
1523 : : // If this tx has a parent, unset its truc_child_in_mempool to make it possible
1524 : : // to spend from the parent again. If this tx was replaced by another
1525 : : // child of the same parent, transactionAddedToMempool
1526 : : // will update truc_child_in_mempool
1527 [ + + ]: 1133 : for (const CTxIn& tx_in : tx->vin) {
1528 : 784 : auto parent_it = mapWallet.find(tx_in.prevout.hash);
1529 [ + + ]: 1331 : if (parent_it != mapWallet.end()) {
1530 [ + + ]: 547 : CWalletTx& parent_wtx = parent_it->second;
1531 [ + + ]: 547 : if (parent_wtx.truc_child_in_mempool == tx->GetHash()) {
1532 [ + - ]: 31 : parent_wtx.truc_child_in_mempool = std::nullopt;
1533 [ + - ]: 31 : UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/false);
1534 : : }
1535 : : }
1536 : : }
1537 : : }
1538 : 50503 : }
1539 : :
1540 : 42101 : void CWallet::blockConnected(const ChainstateRole& role, const interfaces::BlockInfo& block)
1541 : : {
1542 [ + + ]: 42101 : if (role.historical) {
1543 : : return;
1544 : : }
1545 [ - + ]: 42001 : assert(block.data);
1546 : 42001 : LOCK(cs_wallet);
1547 : :
1548 : : // Update the best block in memory first. This will set the best block's height, which is
1549 : : // needed by MarkConflicted.
1550 [ + - ]: 42001 : SetLastBlockProcessedInMem(block.height, block.hash);
1551 : :
1552 : : // No need to scan block if it was created before the wallet birthday.
1553 : : // Uses chain max time and twice the grace period to adjust time for block time variability.
1554 [ + + + - ]: 42001 : if (block.chain_time_max < m_birth_time.load() - (TIMESTAMP_WINDOW * 2)) return;
1555 : :
1556 : : // Scan block
1557 : : bool wallet_updated = false;
1558 [ - + + + ]: 91786 : for (size_t index = 0; index < block.data->vtx.size(); index++) {
1559 [ + - ]: 50256 : wallet_updated |= SyncTransaction(block.data->vtx[index], TxStateConfirmed{block.hash, block.height, static_cast<int>(index)});
1560 [ + - ]: 50256 : transactionRemovedFromMempool(block.data->vtx[index], MemPoolRemovalReason::BLOCK);
1561 : : }
1562 : :
1563 : : // Update on disk if this block resulted in us updating a tx, or periodically every 144 blocks (~1 day)
1564 [ + + + + ]: 41530 : if (wallet_updated || block.height % 144 == 0) {
1565 [ + - ]: 12724 : WriteBestBlock();
1566 : : }
1567 : 42001 : }
1568 : :
1569 : 3448 : void CWallet::blockDisconnected(const interfaces::BlockInfo& block)
1570 : : {
1571 [ - + ]: 3448 : assert(block.data);
1572 : 3448 : LOCK(cs_wallet);
1573 : :
1574 : : // At block disconnection, this will change an abandoned transaction to
1575 : : // be unconfirmed, whether or not the transaction is added back to the mempool.
1576 : : // User may have to call abandontransaction again. It may be addressed in the
1577 : : // future with a stickier abandoned state or even removing abandontransaction call.
1578 : 3448 : int disconnect_height = block.height;
1579 : :
1580 [ - + + + ]: 6952 : for (size_t index = 0; index < block.data->vtx.size(); index++) {
1581 [ + - ]: 3504 : const CTransactionRef& ptx = block.data->vtx[index];
1582 : : // Coinbase transactions are not only inactive but also abandoned,
1583 : : // meaning they should never be relayed standalone via the p2p protocol.
1584 [ + - ]: 3504 : SyncTransaction(ptx, TxStateInactive{/*abandoned=*/index == 0});
1585 : :
1586 [ + + ]: 7113 : for (const CTxIn& tx_in : ptx->vin) {
1587 : : // No other wallet transactions conflicted with this transaction
1588 [ + + ]: 3609 : if (!mapTxSpends.contains(tx_in.prevout)) continue;
1589 : :
1590 : 89 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(tx_in.prevout);
1591 : :
1592 : : // For all of the spends that conflict with this transaction
1593 [ + + ]: 3706 : for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) {
1594 [ + + ]: 97 : CWalletTx& wtx = mapWallet.find(_it->second)->second;
1595 : :
1596 [ + + ]: 97 : if (!wtx.isBlockConflicted()) continue;
1597 : :
1598 : 20 : auto try_updating_state = [&](CWalletTx& tx) {
1599 [ + - ]: 12 : if (!tx.isBlockConflicted()) return TxUpdate::UNCHANGED;
1600 [ + + ]: 12 : if (tx.state<TxStateBlockConflicted>()->conflicting_block_height >= disconnect_height) {
1601 [ - + ]: 11 : tx.m_state = TxStateInactive{};
1602 : 11 : return TxUpdate::CHANGED;
1603 : : }
1604 : : return TxUpdate::UNCHANGED;
1605 : 8 : };
1606 : :
1607 [ + - ]: 16 : RecursiveUpdateTxState(wtx.tx->GetHash(), try_updating_state);
1608 : : }
1609 : : }
1610 : : }
1611 : :
1612 : : // Update the best block
1613 [ - + + - ]: 3448 : SetLastBlockProcessed(block.height - 1, *Assert(block.prev_hash));
1614 : 3448 : }
1615 : :
1616 : 39864 : void CWallet::updatedBlockTip()
1617 : : {
1618 : 39864 : m_best_block_time = GetTime();
1619 : 39864 : }
1620 : :
1621 : 6443 : void CWallet::BlockUntilSyncedToCurrentChain() const {
1622 : 6443 : AssertLockNotHeld(cs_wallet);
1623 : : // Skip the queue-draining stuff if we know we're caught up with
1624 : : // chain().Tip(), otherwise put a callback in the validation interface queue and wait
1625 : : // for the queue to drain enough to execute it (indicating we are caught up
1626 : : // at least with the time we entered this function).
1627 [ + - ]: 12886 : uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed);
1628 : 6443 : chain().waitForNotificationsIfTipChanged(last_block_hash);
1629 : 6443 : }
1630 : :
1631 : : // Note that this function doesn't distinguish between a 0-valued input,
1632 : : // and a not-"is mine" input.
1633 : 2188 : CAmount CWallet::GetDebit(const CTxIn &txin) const
1634 : : {
1635 : 2188 : LOCK(cs_wallet);
1636 [ + - ]: 2188 : auto txo = GetTXO(txin.prevout);
1637 [ + + ]: 2188 : if (txo) {
1638 : 1408 : return txo->GetTxOut().nValue;
1639 : : }
1640 : : return 0;
1641 : 2188 : }
1642 : :
1643 : 586343 : bool CWallet::IsMine(const CTxOut& txout) const
1644 : : {
1645 : 586343 : AssertLockHeld(cs_wallet);
1646 : 586343 : return IsMine(txout.scriptPubKey);
1647 : : }
1648 : :
1649 : 33110 : bool CWallet::IsMine(const CTxDestination& dest) const
1650 : : {
1651 : 33110 : AssertLockHeld(cs_wallet);
1652 [ + - ]: 33110 : return IsMine(GetScriptForDestination(dest));
1653 : : }
1654 : :
1655 : 621890 : bool CWallet::IsMine(const CScript& script) const
1656 : : {
1657 : 621890 : AssertLockHeld(cs_wallet);
1658 : :
1659 : : // Search the cache so that IsMine is called only on the relevant SPKMs instead of on everything in m_spk_managers
1660 : 621890 : const auto& it = m_cached_spks.find(script);
1661 [ + + ]: 621890 : if (it != m_cached_spks.end()) {
1662 : 197918 : bool res = false;
1663 [ + + ]: 395886 : for (const auto& spkm : it->second) {
1664 [ + + + - ]: 395886 : res = res || spkm->IsMine(script);
1665 : : }
1666 : 197918 : Assume(res);
1667 : 197918 : return res;
1668 : : }
1669 : :
1670 : : return false;
1671 : : }
1672 : :
1673 : 148264 : bool CWallet::IsMine(const CTransaction& tx) const
1674 : : {
1675 : 148264 : AssertLockHeld(cs_wallet);
1676 [ + + ]: 478625 : for (const CTxOut& txout : tx.vout)
1677 [ + + ]: 347778 : if (IsMine(txout))
1678 : : return true;
1679 : : return false;
1680 : : }
1681 : :
1682 : 2978 : bool CWallet::IsMine(const COutPoint& outpoint) const
1683 : : {
1684 : 2978 : AssertLockHeld(cs_wallet);
1685 : 2978 : auto wtx = GetWalletTx(outpoint.hash);
1686 [ + + ]: 2978 : if (!wtx) {
1687 : : return false;
1688 : : }
1689 [ - + + - ]: 2956 : if (outpoint.n >= wtx->tx->vout.size()) {
1690 : : return false;
1691 : : }
1692 : 2956 : return IsMine(wtx->tx->vout[outpoint.n]);
1693 : : }
1694 : :
1695 : 141259 : bool CWallet::IsFromMe(const CTransaction& tx) const
1696 : : {
1697 : 141259 : LOCK(cs_wallet);
1698 [ + + ]: 318747 : for (const CTxIn& txin : tx.vin) {
1699 [ + - + + ]: 180706 : if (GetTXO(txin.prevout)) return true;
1700 : : }
1701 : : return false;
1702 : 141259 : }
1703 : :
1704 : 1269 : CAmount CWallet::GetDebit(const CTransaction& tx) const
1705 : : {
1706 : 1269 : CAmount nDebit = 0;
1707 [ + + ]: 3444 : for (const CTxIn& txin : tx.vin)
1708 : : {
1709 : 2175 : nDebit += GetDebit(txin);
1710 [ - + ]: 2175 : if (!MoneyRange(nDebit))
1711 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": value out of range");
1712 : : }
1713 : 1269 : return nDebit;
1714 : : }
1715 : :
1716 : 4 : bool CWallet::IsHDEnabled() const
1717 : : {
1718 : : // All Active ScriptPubKeyMans must be HD for this to be true
1719 : 4 : bool result = false;
1720 [ + + ]: 36 : for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
1721 [ + - - + ]: 32 : if (!spk_man->IsHDEnabled()) return false;
1722 : 32 : result = true;
1723 : : }
1724 : 4 : return result;
1725 : : }
1726 : :
1727 : 11381 : bool CWallet::CanGetAddresses(bool internal) const
1728 : : {
1729 : 11381 : LOCK(cs_wallet);
1730 [ + + ]: 11381 : if (m_spk_managers.empty()) return false;
1731 [ + + ]: 12281 : for (OutputType t : OUTPUT_TYPES) {
1732 [ + - ]: 12268 : auto spk_man = GetScriptPubKeyMan(t, internal);
1733 [ + + + - : 12268 : if (spk_man && spk_man->CanGetAddresses(internal)) {
- + ]
1734 : : return true;
1735 : : }
1736 : : }
1737 : : return false;
1738 : 11381 : }
1739 : :
1740 : 72 : void CWallet::SetWalletFlag(uint64_t flags)
1741 : : {
1742 : 72 : WalletBatch batch(GetDatabase());
1743 [ + - ]: 72 : return SetWalletFlagWithDB(batch, flags);
1744 : 72 : }
1745 : :
1746 : 106 : void CWallet::SetWalletFlagWithDB(WalletBatch& batch, uint64_t flags)
1747 : : {
1748 : 106 : LOCK(cs_wallet);
1749 [ + - ]: 106 : m_wallet_flags |= flags;
1750 [ + - - + ]: 106 : if (!batch.WriteWalletFlags(m_wallet_flags))
1751 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1752 : 106 : }
1753 : :
1754 : 1 : void CWallet::UnsetWalletFlag(uint64_t flag)
1755 : : {
1756 : 1 : WalletBatch batch(GetDatabase());
1757 [ + - ]: 1 : UnsetWalletFlagWithDB(batch, flag);
1758 : 1 : }
1759 : :
1760 : 3731 : void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag)
1761 : : {
1762 : 3731 : LOCK(cs_wallet);
1763 [ + - ]: 3731 : m_wallet_flags &= ~flag;
1764 [ + - - + ]: 3731 : if (!batch.WriteWalletFlags(m_wallet_flags))
1765 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1766 : 3731 : }
1767 : :
1768 : 3730 : void CWallet::UnsetBlankWalletFlag(WalletBatch& batch)
1769 : : {
1770 : 3730 : UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET);
1771 : 3730 : }
1772 : :
1773 : 206773 : bool CWallet::IsWalletFlagSet(uint64_t flag) const
1774 : : {
1775 : 206773 : return (m_wallet_flags & flag);
1776 : : }
1777 : :
1778 : 970 : bool CWallet::LoadWalletFlags(uint64_t flags)
1779 : : {
1780 : 970 : LOCK(cs_wallet);
1781 [ + - ]: 970 : if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) {
1782 : : // contains unknown non-tolerable wallet flags
1783 : : return false;
1784 : : }
1785 : 970 : m_wallet_flags = flags;
1786 : :
1787 : 970 : return true;
1788 : 970 : }
1789 : :
1790 : 610 : void CWallet::InitWalletFlags(uint64_t flags)
1791 : : {
1792 : 610 : LOCK(cs_wallet);
1793 : :
1794 : : // We should never be writing unknown non-tolerable wallet flags
1795 [ - + ]: 610 : assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32));
1796 : : // This should only be used once, when creating a new wallet - so current flags are expected to be blank
1797 [ - + ]: 610 : assert(m_wallet_flags == 0);
1798 : :
1799 [ + - + - : 1220 : if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) {
- + ]
1800 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1801 : : }
1802 : :
1803 [ + - - + ]: 610 : if (!LoadWalletFlags(flags)) assert(false);
1804 : 610 : }
1805 : :
1806 : 423 : uint64_t CWallet::GetWalletFlags() const
1807 : : {
1808 : 423 : return m_wallet_flags;
1809 : : }
1810 : :
1811 : 34827 : void CWallet::MaybeUpdateBirthTime(int64_t time)
1812 : : {
1813 [ + + ]: 34827 : int64_t birthtime = m_birth_time.load();
1814 [ + + ]: 34827 : if (time < birthtime) {
1815 : 1401 : m_birth_time = time;
1816 : : }
1817 : 34827 : }
1818 : :
1819 : : /**
1820 : : * Scan active chain for relevant transactions after importing keys. This should
1821 : : * be called whenever new keys are added to the wallet, with the oldest key
1822 : : * creation time.
1823 : : *
1824 : : * @return Earliest timestamp that could be successfully scanned from. Timestamp
1825 : : * returned will be higher than startTime if relevant blocks could not be read.
1826 : : */
1827 : 619 : int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update)
1828 : : {
1829 : : // Find starting block. May be null if nCreateTime is greater than the
1830 : : // highest blockchain timestamp, in which case there is nothing that needs
1831 : : // to be scanned.
1832 : 619 : int start_height = 0;
1833 : 619 : uint256 start_block;
1834 : 619 : bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height));
1835 [ + - + - ]: 1238 : WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);
1836 : :
1837 [ + - ]: 619 : if (start) {
1838 : : // TODO: this should take into account failure by ScanResult::USER_ABORT
1839 : 619 : ScanResult result = ScanForWalletTransactions(start_block, start_height, /*max_height=*/{}, reserver, /*fUpdate=*/update, /*save_progress=*/false);
1840 [ + + ]: 619 : if (result.status == ScanResult::FAILURE) {
1841 : 1 : int64_t time_max;
1842 : 1 : CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max)));
1843 : 1 : return time_max + TIMESTAMP_WINDOW + 1;
1844 : : }
1845 : : }
1846 : : return startTime;
1847 : : }
1848 : :
1849 : : /**
1850 : : * Scan the block chain (starting in start_block) for transactions
1851 : : * from or to us. If fUpdate is true, found transactions that already
1852 : : * exist in the wallet will be updated. If max_height is not set, the
1853 : : * mempool will be scanned as well.
1854 : : *
1855 : : * @param[in] start_block Scan starting block. If block is not on the active
1856 : : * chain, the scan will return SUCCESS immediately.
1857 : : * @param[in] start_height Height of start_block
1858 : : * @param[in] max_height Optional max scanning height. If unset there is
1859 : : * no maximum and scanning can continue to the tip
1860 : : *
1861 : : * @return ScanResult returning scan information and indicating success or
1862 : : * failure. Return status will be set to SUCCESS if scan was
1863 : : * successful. FAILURE if a complete rescan was not possible (due to
1864 : : * pruning or corruption). USER_ABORT if the rescan was aborted before
1865 : : * it could complete.
1866 : : *
1867 : : * @pre Caller needs to make sure start_block (and the optional stop_block) are on
1868 : : * the main chain after to the addition of any new keys you want to detect
1869 : : * transactions for.
1870 : : */
1871 : 695 : CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate, const bool save_progress)
1872 : : {
1873 : 695 : constexpr auto INTERVAL_TIME{60s};
1874 : 695 : auto current_time{reserver.now()};
1875 : 695 : auto start_time{reserver.now()};
1876 : :
1877 [ - + ]: 695 : assert(reserver.isReserved());
1878 : :
1879 : 695 : uint256 block_hash = start_block;
1880 : 695 : ScanResult result;
1881 : :
1882 : 695 : std::unique_ptr<FastWalletRescanFilter> fast_rescan_filter;
1883 [ + - + + : 700 : if (chain().hasBlockFilterIndex(BlockFilterType::BASIC)) fast_rescan_filter = std::make_unique<FastWalletRescanFilter>(*this);
+ - ]
1884 : :
1885 [ + + + - ]: 1390 : WalletLogPrintf("Rescan started from block %s... (%s)\n", start_block.ToString(),
1886 [ + + + - ]: 1385 : fast_rescan_filter ? "fast variant using block filters" : "slow variant inspecting all blocks");
1887 : :
1888 [ + - ]: 695 : fAbortRescan = false;
1889 [ + - + - : 1390 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 0); // show rescan progress in GUI as dialog or on splashscreen, if rescan required on startup (e.g. due to corruption)
+ - ]
1890 [ + - + - ]: 1390 : uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1891 : 695 : uint256 end_hash = tip_hash;
1892 [ + + + - ]: 695 : if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash));
1893 [ + - ]: 695 : double progress_begin = chain().guessVerificationProgress(block_hash);
1894 [ + - ]: 695 : double progress_end = chain().guessVerificationProgress(end_hash);
1895 : 695 : double progress_current = progress_begin;
1896 : 695 : int block_height = start_height;
1897 [ + - + - : 74278 : while (!fAbortRescan && !chain().shutdownRequested()) {
+ - ]
1898 [ + + ]: 74278 : if (progress_end - progress_begin > 0.0) {
1899 : 74060 : m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin);
1900 : : } else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal)
1901 : 218 : m_scanning_progress = 0;
1902 : : }
1903 [ + + + + ]: 74278 : if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) {
1904 [ + + + + : 2872 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));
+ - + - +
- ]
1905 : : }
1906 : :
1907 [ + - + + ]: 74278 : bool next_interval = reserver.now() >= current_time + INTERVAL_TIME;
1908 [ + + ]: 74278 : if (next_interval) {
1909 [ + - ]: 2 : current_time = reserver.now();
1910 [ + - ]: 2 : WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current);
1911 : : }
1912 : :
1913 : 74278 : bool fetch_block{true};
1914 [ + + ]: 74278 : if (fast_rescan_filter) {
1915 [ + - ]: 616 : fast_rescan_filter->UpdateIfNeeded();
1916 [ + - ]: 616 : auto matches_block{fast_rescan_filter->MatchesBlock(block_hash)};
1917 [ + - ]: 616 : if (matches_block.has_value()) {
1918 [ + + ]: 616 : if (*matches_block) {
1919 [ + - + - : 124 : LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (filter matched)\n", block_height, block_hash.ToString());
+ - + - ]
1920 : : } else {
1921 : 554 : result.last_scanned_block = block_hash;
1922 : 554 : result.last_scanned_height = block_height;
1923 : 554 : fetch_block = false;
1924 : : }
1925 : : } else {
1926 [ # # # # : 0 : LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (WARNING: block filter not found!)\n", block_height, block_hash.ToString());
# # # # ]
1927 : : }
1928 : : }
1929 : :
1930 : : // Find next block separately from reading data above, because reading
1931 : : // is slow and there might be a reorg while it is read.
1932 : 74278 : bool block_still_active = false;
1933 : 74278 : bool next_block = false;
1934 : 74278 : uint256 next_block_hash;
1935 [ + - ]: 74278 : chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash)));
1936 : :
1937 [ + + ]: 74278 : if (fetch_block) {
1938 : : // Read block data and locator if needed (the locator is usually null unless we need to save progress)
1939 : 73724 : CBlock block;
1940 : 73724 : CBlockLocator loc;
1941 : : // Find block
1942 [ + + ]: 73724 : FoundBlock found_block{FoundBlock().data(block)};
1943 [ + + ]: 73724 : if (save_progress && next_interval) found_block.locator(loc);
1944 [ + - ]: 73724 : chain().findBlock(block_hash, found_block);
1945 : :
1946 [ + + ]: 73724 : if (!block.IsNull()) {
1947 [ + - ]: 73620 : LOCK(cs_wallet);
1948 [ - + ]: 73620 : if (!block_still_active) {
1949 : : // Abort scan if current block is no longer active, to prevent
1950 : : // marking transactions as coming from the wrong block.
1951 : 0 : result.last_failed_block = block_hash;
1952 : 0 : result.status = ScanResult::FAILURE;
1953 [ # # ]: 0 : break;
1954 : : }
1955 [ - + + + ]: 168312 : for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) {
1956 [ + - ]: 94692 : SyncTransaction(block.vtx[posInBlock], TxStateConfirmed{block_hash, block_height, static_cast<int>(posInBlock)}, fUpdate, /*rescanning_old_block=*/true);
1957 : : }
1958 : : // scan succeeded, record block as most recent successfully scanned
1959 : 73620 : result.last_scanned_block = block_hash;
1960 [ + + ]: 73620 : result.last_scanned_height = block_height;
1961 : :
1962 [ + + ]: 73620 : if (!loc.IsNull()) {
1963 [ + - ]: 2 : WalletLogPrintf("Saving scan progress %d.\n", block_height);
1964 [ + - ]: 2 : WalletBatch batch(GetDatabase());
1965 [ + - ]: 2 : batch.WriteBestBlock(loc);
1966 : 2 : }
1967 : 73620 : } else {
1968 : : // could not scan block, keep scanning but record this block as the most recent failure
1969 : 104 : result.last_failed_block = block_hash;
1970 : 104 : result.status = ScanResult::FAILURE;
1971 : : }
1972 : 73724 : }
1973 [ + + + + ]: 74278 : if (max_height && block_height >= *max_height) {
1974 : : break;
1975 : : }
1976 : : // If rescanning was triggered with cs_wallet permanently locked (AttachChain), additional blocks that were connected during the rescan
1977 : : // aren't processed here but will be processed with the pending blockConnected notifications after the lock is released.
1978 : : // If rescanning without a permanent cs_wallet lock, additional blocks that were added during the rescan will be re-processed if
1979 : : // the notification was processed and the last block height was updated.
1980 [ + - + + : 148552 : if (block_height >= WITH_LOCK(cs_wallet, return GetLastBlockHeight())) {
+ - ]
1981 : : break;
1982 : : }
1983 : :
1984 : 73584 : {
1985 [ + + ]: 73584 : if (!next_block) {
1986 : : // break successfully when rescan has reached the tip, or
1987 : : // previous block is no longer on the chain due to a reorg
1988 : : break;
1989 : : }
1990 : :
1991 : : // increment block and verification progress
1992 : 73583 : block_hash = next_block_hash;
1993 : 73583 : ++block_height;
1994 [ + - ]: 73583 : progress_current = chain().guessVerificationProgress(block_hash);
1995 : :
1996 : : // handle updated tip hash
1997 : 73583 : const uint256 prev_tip_hash = tip_hash;
1998 [ + - + - ]: 147166 : tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1999 [ + + - + ]: 73583 : if (!max_height && prev_tip_hash != tip_hash) {
2000 : : // in case the tip has changed, update progress max
2001 [ # # ]: 0 : progress_end = chain().guessVerificationProgress(tip_hash);
2002 : : }
2003 : : }
2004 : : }
2005 [ + + ]: 695 : if (!max_height) {
2006 [ + - ]: 693 : WalletLogPrintf("Scanning current mempool transactions.\n");
2007 [ + - + - ]: 2079 : WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
2008 : : }
2009 [ + - + - : 1390 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 100); // hide progress dialog in GUI
+ - ]
2010 [ + + + - ]: 695 : if (block_height && fAbortRescan) {
2011 [ # # ]: 0 : WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current);
2012 : 0 : result.status = ScanResult::USER_ABORT;
2013 [ + + + - : 695 : } else if (block_height && chain().shutdownRequested()) {
+ - ]
2014 [ # # ]: 0 : WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current);
2015 : 0 : result.status = ScanResult::USER_ABORT;
2016 : : } else {
2017 [ + - + - ]: 695 : WalletLogPrintf("Rescan completed in %15dms\n", Ticks<std::chrono::milliseconds>(reserver.now() - start_time));
2018 : : }
2019 : 695 : return result;
2020 : 695 : }
2021 : :
2022 : 1646 : bool CWallet::SubmitTxMemoryPoolAndRelay(CWalletTx& wtx,
2023 : : std::string& err_string,
2024 : : node::TxBroadcast broadcast_method) const
2025 : : {
2026 : 1646 : AssertLockHeld(cs_wallet);
2027 : :
2028 : : // Can't relay if wallet is not broadcasting
2029 [ + - ]: 1646 : if (!GetBroadcastTransactions()) return false;
2030 : : // Don't relay abandoned transactions
2031 [ + + ]: 1646 : if (wtx.isAbandoned()) return false;
2032 : : // Don't try to submit coinbase transactions. These would fail anyway but would
2033 : : // cause log spam.
2034 [ + - ]: 1646 : if (wtx.IsCoinBase()) return false;
2035 : : // Don't try to submit conflicted or confirmed transactions.
2036 [ + - ]: 1646 : if (GetTxDepthInMainChain(wtx) != 0) return false;
2037 : :
2038 : 1646 : const char* what{""};
2039 [ + + - - ]: 1646 : switch (broadcast_method) {
2040 : 1515 : case node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL:
2041 : 1515 : what = "to mempool and for broadcast to peers";
2042 : 1515 : break;
2043 : 131 : case node::TxBroadcast::MEMPOOL_NO_BROADCAST:
2044 : 131 : what = "to mempool without broadcast";
2045 : 131 : break;
2046 : 0 : case node::TxBroadcast::NO_MEMPOOL_PRIVATE_BROADCAST:
2047 : 0 : what = "for private broadcast without adding to the mempool";
2048 : 0 : break;
2049 : : }
2050 [ + - ]: 1646 : WalletLogPrintf("Submitting wtx %s %s\n", wtx.GetHash().ToString(), what);
2051 : : // We must set TxStateInMempool here. Even though it will also be set later by the
2052 : : // entered-mempool callback, if we did not there would be a race where a
2053 : : // user could call sendmoney in a loop and hit spurious out of funds errors
2054 : : // because we think that this newly generated transaction's change is
2055 : : // unavailable as we're not yet aware that it is in the mempool.
2056 : : //
2057 : : // If broadcast fails for any reason, trying to set wtx.m_state here would be incorrect.
2058 : : // If transaction was previously in the mempool, it should be updated when
2059 : : // TransactionRemovedFromMempool fires.
2060 : 1646 : bool ret = chain().broadcastTransaction(wtx.tx, m_default_max_tx_fee, broadcast_method, err_string);
2061 [ + + + + ]: 3203 : if (ret) wtx.m_state = TxStateInMempool{};
2062 : : return ret;
2063 : : }
2064 : :
2065 : 2021 : std::set<Txid> CWallet::GetTxConflicts(const CWalletTx& wtx) const
2066 : : {
2067 : 2021 : AssertLockHeld(cs_wallet);
2068 : :
2069 : 2021 : const Txid myHash{wtx.GetHash()};
2070 : 2021 : std::set<Txid> result{GetConflicts(myHash)};
2071 : 2021 : result.erase(myHash);
2072 : 2021 : return result;
2073 : : }
2074 : :
2075 : 196 : bool CWallet::ShouldResend() const
2076 : : {
2077 : : // Don't attempt to resubmit if the wallet is configured to not broadcast
2078 [ + - ]: 196 : if (!fBroadcastTransactions) return false;
2079 : :
2080 : : // During reindex, importing and IBD, old wallet transactions become
2081 : : // unconfirmed. Don't resend them as that would spam other nodes.
2082 : : // We only allow forcing mempool submission when not relaying to avoid this spam.
2083 [ + + ]: 196 : if (!chain().isReadyToBroadcast()) return false;
2084 : :
2085 : : // Do this infrequently and randomly to avoid giving away
2086 : : // that these are our transactions.
2087 [ + + ]: 124 : if (NodeClock::now() < m_next_resend) return false;
2088 : :
2089 : : return true;
2090 : : }
2091 : :
2092 : 1058 : NodeClock::time_point CWallet::GetDefaultNextResend() { return FastRandomContext{}.rand_uniform_delay(NodeClock::now() + 12h, 24h); }
2093 : :
2094 : : // Resubmit transactions from the wallet to the mempool, optionally asking the
2095 : : // mempool to relay them. On startup, we will do this for all unconfirmed
2096 : : // transactions but will not ask the mempool to relay them. We do this on startup
2097 : : // to ensure that our own mempool is aware of our transactions. There
2098 : : // is a privacy side effect here as not broadcasting on startup also means that we won't
2099 : : // inform the world of our wallet's state, particularly if the wallet (or node) is not
2100 : : // yet synced.
2101 : : //
2102 : : // Otherwise this function is called periodically in order to relay our unconfirmed txs.
2103 : : // We do this on a random timer to slightly obfuscate which transactions
2104 : : // come from our wallet.
2105 : : //
2106 : : // TODO: Ideally, we'd only resend transactions that we think should have been
2107 : : // mined in the most recent block. Any transaction that wasn't in the top
2108 : : // blockweight of transactions in the mempool shouldn't have been mined,
2109 : : // and so is probably just sitting in the mempool waiting to be confirmed.
2110 : : // Rebroadcasting does nothing to speed up confirmation and only damages
2111 : : // privacy.
2112 : : //
2113 : : // The `force` option results in all unconfirmed transactions being submitted to
2114 : : // the mempool. This does not necessarily result in those transactions being relayed,
2115 : : // that depends on the `broadcast_method` option. Periodic rebroadcast uses the pattern
2116 : : // broadcast_method=TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL force=false, while loading into
2117 : : // the mempool (on start, or after import) uses
2118 : : // broadcast_method=TxBroadcast::MEMPOOL_NO_BROADCAST force=true.
2119 : 1511 : void CWallet::ResubmitWalletTransactions(node::TxBroadcast broadcast_method, bool force)
2120 : : {
2121 : : // Don't attempt to resubmit if the wallet is configured to not broadcast,
2122 : : // even if forcing.
2123 [ + + ]: 1511 : if (!fBroadcastTransactions) return;
2124 : :
2125 : 1508 : int submitted_tx_count = 0;
2126 : :
2127 : 1508 : { // cs_wallet scope
2128 : 1508 : LOCK(cs_wallet);
2129 : :
2130 : : // First filter for the transactions we want to rebroadcast.
2131 : : // We use a set with WalletTxOrderComparator so that rebroadcasting occurs in insertion order
2132 : 1508 : std::set<CWalletTx*, WalletTxOrderComparator> to_submit;
2133 [ + + + + ]: 15579 : for (auto& [txid, wtx] : mapWallet) {
2134 : : // Only rebroadcast unconfirmed txs
2135 [ + + ]: 14071 : if (!wtx.isUnconfirmed()) continue;
2136 : :
2137 : : // Attempt to rebroadcast all txes more than 5 minutes older than
2138 : : // the last block, or all txs if forcing.
2139 [ + + + + ]: 138 : if (!force && wtx.nTimeReceived > m_best_block_time - 5 * 60) continue;
2140 [ + - ]: 137 : to_submit.insert(&wtx);
2141 : : }
2142 : : // Now try submitting the transactions to the memory pool and (optionally) relay them.
2143 [ + + ]: 1645 : for (auto wtx : to_submit) {
2144 [ + - ]: 137 : std::string unused_err_string;
2145 [ + - + + ]: 137 : if (SubmitTxMemoryPoolAndRelay(*wtx, unused_err_string, broadcast_method)) ++submitted_tx_count;
2146 : 137 : }
2147 [ + - ]: 1508 : } // cs_wallet
2148 : :
2149 [ + + ]: 1508 : if (submitted_tx_count > 0) {
2150 : 56 : WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count);
2151 : : }
2152 : : }
2153 : :
2154 : : /** @} */ // end of mapWallet
2155 : :
2156 : 159 : void MaybeResendWalletTxs(WalletContext& context)
2157 : : {
2158 [ + + ]: 355 : for (const std::shared_ptr<CWallet>& pwallet : GetWallets(context)) {
2159 [ + - + + ]: 196 : if (!pwallet->ShouldResend()) continue;
2160 [ + - ]: 4 : pwallet->ResubmitWalletTransactions(node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL, /*force=*/false);
2161 [ + - ]: 196 : pwallet->SetNextResend();
2162 : : }
2163 : 159 : }
2164 : :
2165 : :
2166 : 2542 : bool CWallet::SignTransaction(CMutableTransaction& tx) const
2167 : : {
2168 : 2542 : AssertLockHeld(cs_wallet);
2169 : :
2170 : : // Build coins map
2171 : 2542 : std::map<COutPoint, Coin> coins;
2172 [ + + ]: 11612 : for (auto& input : tx.vin) {
2173 : 9070 : const auto mi = mapWallet.find(input.prevout.hash);
2174 [ + - - + : 11612 : if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) {
+ - ]
2175 : : return false;
2176 : : }
2177 [ + + ]: 9070 : const CWalletTx& wtx = mi->second;
2178 [ + + ]: 9070 : int prev_height = wtx.state<TxStateConfirmed>() ? wtx.state<TxStateConfirmed>()->confirmed_block_height : 0;
2179 [ + - ]: 9070 : coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], prev_height, wtx.IsCoinBase());
2180 : : }
2181 [ + - ]: 2542 : std::map<int, bilingual_str> input_errors;
2182 [ + - ]: 2542 : return SignTransaction(tx, coins, SIGHASH_DEFAULT, input_errors);
2183 : 5084 : }
2184 : :
2185 : 2864 : bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const
2186 : : {
2187 : : // Try to sign with all ScriptPubKeyMans
2188 [ + + ]: 16362 : for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2189 : : // spk_man->SignTransaction will return true if the transaction is complete,
2190 : : // so we can exit early and return true if that happens
2191 [ + - + + ]: 16352 : if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) {
2192 : 2854 : return true;
2193 : : }
2194 : : }
2195 : :
2196 : : // At this point, one input was not fully signed otherwise we would have exited already
2197 : 10 : return false;
2198 : : }
2199 : :
2200 : 1144 : std::optional<PSBTError> CWallet::FillPSBT(PartiallySignedTransaction& psbtx, bool& complete, std::optional<int> sighash_type, bool sign, bool bip32derivs, size_t * n_signed, bool finalize) const
2201 : : {
2202 [ - + ]: 1144 : if (n_signed) {
2203 : 0 : *n_signed = 0;
2204 : : }
2205 : 1144 : LOCK(cs_wallet);
2206 : : // Get all of the previous transactions
2207 [ - + + + ]: 4821 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
2208 [ + - ]: 3677 : const CTxIn& txin = psbtx.tx->vin[i];
2209 [ + - ]: 3677 : PSBTInput& input = psbtx.inputs.at(i);
2210 : :
2211 [ + - + + ]: 3677 : if (PSBTInputSigned(input)) {
2212 : 18 : continue;
2213 : : }
2214 : :
2215 : : // If we have no utxo, grab it from the wallet.
2216 [ + + ]: 3659 : if (!input.non_witness_utxo) {
2217 : 2237 : const Txid& txhash = txin.prevout.hash;
2218 : 2237 : const auto it = mapWallet.find(txhash);
2219 [ + + ]: 5598 : if (it != mapWallet.end()) {
2220 : 1921 : const CWalletTx& wtx = it->second;
2221 : : // We only need the non_witness_utxo, which is a superset of the witness_utxo.
2222 : : // The signing code will switch to the smaller witness_utxo if this is ok.
2223 : 1921 : input.non_witness_utxo = wtx.tx;
2224 : : }
2225 : : }
2226 : : }
2227 : :
2228 [ + - ]: 1144 : const PrecomputedTransactionData txdata = PrecomputePSBTData(psbtx);
2229 : :
2230 : : // Fill in information from ScriptPubKeyMans
2231 [ + - + + ]: 9288 : for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2232 : 8153 : int n_signed_this_spkm = 0;
2233 [ + - ]: 8153 : const auto error{spk_man->FillPSBT(psbtx, txdata, sighash_type, sign, bip32derivs, &n_signed_this_spkm, finalize)};
2234 [ + + ]: 8153 : if (error) {
2235 : 9 : return error;
2236 : : }
2237 : :
2238 [ - + ]: 8144 : if (n_signed) {
2239 : 0 : (*n_signed) += n_signed_this_spkm;
2240 : : }
2241 : 9 : }
2242 : :
2243 [ + - ]: 1135 : RemoveUnnecessaryTransactions(psbtx);
2244 : :
2245 : : // Complete if every input is now signed
2246 : 1135 : complete = true;
2247 [ - + + + ]: 4802 : for (size_t i = 0; i < psbtx.inputs.size(); ++i) {
2248 [ + - ]: 3667 : complete &= PSBTInputSignedAndVerified(psbtx, i, &txdata);
2249 : : }
2250 : :
2251 : 1135 : return {};
2252 [ + - ]: 2288 : }
2253 : :
2254 : 9 : SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const
2255 : : {
2256 : 9 : SignatureData sigdata;
2257 [ + - ]: 9 : CScript script_pub_key = GetScriptForDestination(pkhash);
2258 [ + - ]: 47 : for (const auto& spk_man_pair : m_spk_managers) {
2259 [ + - + + ]: 47 : if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
2260 [ + - ]: 9 : LOCK(cs_wallet); // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
2261 [ + - + - ]: 9 : return spk_man_pair.second->SignMessage(message, pkhash, str_sig);
2262 : 9 : }
2263 : : }
2264 : : return SigningResult::PRIVATE_KEY_NOT_AVAILABLE;
2265 : 9 : }
2266 : :
2267 : 3586 : OutputType CWallet::TransactionChangeType(const std::optional<OutputType>& change_type, const std::vector<CRecipient>& vecSend) const
2268 : : {
2269 : : // If -changetype is specified, always use that change type.
2270 [ + + ]: 3586 : if (change_type) {
2271 : 343 : return *change_type;
2272 : : }
2273 : :
2274 : : // if m_default_address_type is legacy, use legacy address as change.
2275 [ + + ]: 3243 : if (m_default_address_type == OutputType::LEGACY) {
2276 : : return OutputType::LEGACY;
2277 : : }
2278 : :
2279 : 3217 : bool any_tr{false};
2280 : 3217 : bool any_wpkh{false};
2281 : 3217 : bool any_sh{false};
2282 : 3217 : bool any_pkh{false};
2283 : :
2284 [ + + ]: 42145 : for (const auto& recipient : vecSend) {
2285 [ + - ]: 38928 : if (std::get_if<WitnessV1Taproot>(&recipient.dest)) {
2286 : : any_tr = true;
2287 [ + - ]: 38603 : } else if (std::get_if<WitnessV0KeyHash>(&recipient.dest)) {
2288 : : any_wpkh = true;
2289 [ + - ]: 46041 : } else if (std::get_if<ScriptHash>(&recipient.dest)) {
2290 : : any_sh = true;
2291 [ + - ]: 44982 : } else if (std::get_if<PKHash>(&recipient.dest)) {
2292 : 5931 : any_pkh = true;
2293 : : }
2294 : : }
2295 : :
2296 : 3217 : const bool has_bech32m_spkman(GetScriptPubKeyMan(OutputType::BECH32M, /*internal=*/true));
2297 [ + + ]: 3217 : if (has_bech32m_spkman && any_tr) {
2298 : : // Currently tr is the only type supported by the BECH32M spkman
2299 : : return OutputType::BECH32M;
2300 : : }
2301 : 2896 : const bool has_bech32_spkman(GetScriptPubKeyMan(OutputType::BECH32, /*internal=*/true));
2302 [ + + ]: 2896 : if (has_bech32_spkman && any_wpkh) {
2303 : : // Currently wpkh is the only type supported by the BECH32 spkman
2304 : : return OutputType::BECH32;
2305 : : }
2306 : 347 : const bool has_p2sh_segwit_spkman(GetScriptPubKeyMan(OutputType::P2SH_SEGWIT, /*internal=*/true));
2307 [ + + ]: 347 : if (has_p2sh_segwit_spkman && any_sh) {
2308 : : // Currently sh_wpkh is the only type supported by the P2SH_SEGWIT spkman
2309 : : // As of 2021 about 80% of all SH are wrapping WPKH, so use that
2310 : : return OutputType::P2SH_SEGWIT;
2311 : : }
2312 : 302 : const bool has_legacy_spkman(GetScriptPubKeyMan(OutputType::LEGACY, /*internal=*/true));
2313 [ + + ]: 302 : if (has_legacy_spkman && any_pkh) {
2314 : : // Currently pkh is the only type supported by the LEGACY spkman
2315 : : return OutputType::LEGACY;
2316 : : }
2317 : :
2318 [ + + ]: 263 : if (has_bech32m_spkman) {
2319 : : return OutputType::BECH32M;
2320 : : }
2321 [ + + ]: 32 : if (has_bech32_spkman) {
2322 : : return OutputType::BECH32;
2323 : : }
2324 : : // else use m_default_address_type for change
2325 : 18 : return m_default_address_type;
2326 : : }
2327 : :
2328 : 1516 : void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm)
2329 : : {
2330 : 1516 : LOCK(cs_wallet);
2331 [ + - + - : 3032 : WalletLogPrintf("CommitTransaction:\n%s\n", util::RemoveSuffixView(tx->ToString(), "\n"));
+ - ]
2332 : :
2333 : : // Add tx to wallet, because if it has change it's also ours,
2334 : : // otherwise just for transaction history.
2335 [ + - + - : 4548 : CWalletTx* wtx = AddToWallet(tx, TxStateInactive{}, [&](CWalletTx& wtx, bool new_tx) {
+ - ]
2336 : 1516 : CHECK_NONFATAL(wtx.mapValue.empty());
2337 : 1516 : CHECK_NONFATAL(wtx.vOrderForm.empty());
2338 : 1516 : wtx.mapValue = std::move(mapValue);
2339 : 1516 : wtx.vOrderForm = std::move(orderForm);
2340 : 1516 : return true;
2341 : : });
2342 : :
2343 : : // wtx can only be null if the db write failed.
2344 [ - + ]: 1516 : if (!wtx) {
2345 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Wallet db error, transaction commit failed");
2346 : : }
2347 : :
2348 : : // Notify that old coins are spent
2349 [ + + ]: 5432 : for (const CTxIn& txin : tx->vin) {
2350 [ + - ]: 3916 : CWalletTx &coin = mapWallet.at(txin.prevout.hash);
2351 : 3916 : coin.MarkDirty();
2352 [ + - ]: 3916 : NotifyTransactionChanged(coin.GetHash(), CT_UPDATED);
2353 : : }
2354 : :
2355 [ + + ]: 1516 : if (!fBroadcastTransactions) {
2356 : : // Don't submit tx to the mempool
2357 [ + - ]: 7 : return;
2358 : : }
2359 : :
2360 [ + - ]: 1509 : std::string err_string;
2361 [ + - + + ]: 1509 : if (!SubmitTxMemoryPoolAndRelay(*wtx, err_string, node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL)) {
2362 [ + - ]: 3 : WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string);
2363 : : // TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure.
2364 : : }
2365 [ + - ]: 3025 : }
2366 : :
2367 : 366 : DBErrors CWallet::PopulateWalletFromDB(bilingual_str& error, std::vector<bilingual_str>& warnings)
2368 : : {
2369 : 366 : LOCK(cs_wallet);
2370 : :
2371 [ - + ]: 366 : Assert(m_spk_managers.empty());
2372 [ - + ]: 366 : Assert(m_wallet_flags == 0);
2373 [ + - + - ]: 366 : DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this);
2374 : :
2375 [ + + ]: 366 : if (m_spk_managers.empty()) {
2376 [ - + ]: 22 : assert(m_external_spk_managers.empty());
2377 [ - + ]: 22 : assert(m_internal_spk_managers.empty());
2378 : : }
2379 : :
2380 [ + - ]: 366 : const auto wallet_file = m_database->Filename();
2381 [ + - + - : 366 : switch (nLoadWalletRet) {
- + + - -
+ ]
2382 : : case DBErrors::LOAD_OK:
2383 : : break;
2384 : 1 : case DBErrors::NONCRITICAL_ERROR:
2385 [ + - ]: 2 : warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"
2386 : : " or address metadata may be missing or incorrect."),
2387 : : wallet_file));
2388 : 1 : break;
2389 : 0 : case DBErrors::NEED_RESCAN:
2390 [ # # ]: 0 : warnings.push_back(strprintf(_("Error reading %s! Transaction data may be missing or incorrect."
2391 : : " Rescanning wallet."), wallet_file));
2392 : 0 : break;
2393 : 1 : case DBErrors::CORRUPT:
2394 [ + - ]: 1 : error = strprintf(_("Error loading %s: Wallet corrupted"), wallet_file);
2395 : 1 : break;
2396 : 0 : case DBErrors::TOO_NEW:
2397 [ # # ]: 0 : error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), wallet_file, CLIENT_NAME);
2398 : 0 : break;
2399 : 0 : case DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED:
2400 [ # # ]: 0 : error = strprintf(_("Error loading %s: External signer wallet being loaded without external signer support compiled"), wallet_file);
2401 : 0 : break;
2402 : 1 : case DBErrors::UNKNOWN_DESCRIPTOR:
2403 [ + - ]: 1 : error = strprintf(_("Unrecognized descriptor found. Loading wallet %s\n\n"
2404 : : "The wallet might have been created on a newer version.\n"
2405 : 1 : "Please try running the latest software version.\n"), wallet_file);
2406 : 1 : break;
2407 : 1 : case DBErrors::UNEXPECTED_LEGACY_ENTRY:
2408 [ + - ]: 1 : error = strprintf(_("Unexpected legacy entry in descriptor wallet found. Loading wallet %s\n\n"
2409 : 1 : "The wallet might have been tampered with or created with malicious intent.\n"), wallet_file);
2410 : 1 : break;
2411 : 0 : case DBErrors::LEGACY_WALLET:
2412 [ # # ]: 0 : error = strprintf(_("Error loading %s: Wallet is a legacy wallet. Please migrate to a descriptor wallet using the migration tool (migratewallet RPC)."), wallet_file);
2413 : 0 : break;
2414 : 0 : case DBErrors::LOAD_FAIL:
2415 [ # # ]: 0 : error = strprintf(_("Error loading %s"), wallet_file);
2416 : 0 : break;
2417 : : } // no default case, so the compiler can warn about missing cases
2418 : 366 : return nLoadWalletRet;
2419 [ + - ]: 732 : }
2420 : :
2421 : 5 : util::Result<void> CWallet::RemoveTxs(std::vector<Txid>& txs_to_remove)
2422 : : {
2423 : 5 : AssertLockHeld(cs_wallet);
2424 [ + - ]: 5 : bilingual_str str_err; // future: make RunWithinTxn return a util::Result
2425 [ + - + - ]: 5 : bool was_txn_committed = RunWithinTxn(GetDatabase(), /*process_desc=*/"remove transactions", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
2426 : 5 : util::Result<void> result{RemoveTxs(batch, txs_to_remove)};
2427 [ + + + - ]: 6 : if (!result) str_err = util::ErrorString(result);
2428 : 5 : return result.has_value();
2429 : 5 : });
2430 [ + + + - ]: 7 : if (!str_err.empty()) return util::Error{str_err};
2431 [ - + - - ]: 4 : if (!was_txn_committed) return util::Error{_("Error starting/committing db txn for wallet transactions removal process")};
2432 : 4 : return {}; // all good
2433 : 5 : }
2434 : :
2435 : 11 : util::Result<void> CWallet::RemoveTxs(WalletBatch& batch, std::vector<Txid>& txs_to_remove)
2436 : : {
2437 : 11 : AssertLockHeld(cs_wallet);
2438 [ - + ]: 11 : if (!batch.HasActiveTxn()) return util::Error{strprintf(_("The transactions removal process can only be executed within a db txn"))};
2439 : :
2440 : : // Check for transaction existence and remove entries from disk
2441 : 11 : std::vector<decltype(mapWallet)::const_iterator> erased_txs;
2442 : 11 : bilingual_str str_err;
2443 [ + + ]: 26 : for (const Txid& hash : txs_to_remove) {
2444 : 16 : auto it_wtx = mapWallet.find(hash);
2445 [ + + ]: 16 : if (it_wtx == mapWallet.end()) {
2446 [ + - + - ]: 3 : return util::Error{strprintf(_("Transaction %s does not belong to this wallet"), hash.GetHex())};
2447 : : }
2448 [ + - - + ]: 15 : if (!batch.EraseTx(hash)) {
2449 [ # # # # ]: 0 : return util::Error{strprintf(_("Failure removing transaction: %s"), hash.GetHex())};
2450 : : }
2451 [ + - ]: 15 : erased_txs.emplace_back(it_wtx);
2452 : : }
2453 : :
2454 : : // Register callback to update the memory state only when the db txn is actually dumped to disk
2455 [ + - + - : 60 : batch.RegisterTxnListener({.on_commit=[&, erased_txs]() EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
+ - ]
2456 : : // Update the in-memory state and notify upper layers about the removals
2457 [ + + ]: 25 : for (const auto& it : erased_txs) {
2458 : 15 : const Txid hash{it->first};
2459 : 15 : wtxOrdered.erase(it->second.m_it_wtxOrdered);
2460 [ + + ]: 30 : for (const auto& txin : it->second.tx->vin) {
2461 : 15 : auto range = mapTxSpends.equal_range(txin.prevout);
2462 [ + - ]: 31 : for (auto iter = range.first; iter != range.second; ++iter) {
2463 [ + + ]: 16 : if (iter->second == hash) {
2464 : 15 : mapTxSpends.erase(iter);
2465 : 15 : break;
2466 : : }
2467 : : }
2468 : : }
2469 [ - + + + ]: 42 : for (unsigned int i = 0; i < it->second.tx->vout.size(); ++i) {
2470 : 27 : m_txos.erase(COutPoint(hash, i));
2471 : : }
2472 : 15 : mapWallet.erase(it);
2473 : 15 : NotifyTransactionChanged(hash, CT_DELETED);
2474 : : }
2475 : :
2476 : 10 : MarkDirty();
2477 : 10 : }, .on_abort={}});
2478 : :
2479 : 10 : return {};
2480 [ + - + - ]: 21 : }
2481 : :
2482 : 29321 : bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& new_purpose)
2483 : : {
2484 : 29321 : bool fUpdated = false;
2485 : 29321 : bool is_mine;
2486 : 29321 : std::optional<AddressPurpose> purpose;
2487 : 29321 : {
2488 : 29321 : LOCK(cs_wallet);
2489 : 29321 : std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address);
2490 [ + + - + ]: 29321 : fUpdated = mi != m_address_book.end() && !mi->second.IsChange();
2491 : :
2492 [ + + + - ]: 29321 : CAddressBookData& record = mi != m_address_book.end() ? mi->second : m_address_book[address];
2493 [ - + ]: 58642 : record.SetLabel(strName);
2494 [ + - ]: 29321 : is_mine = IsMine(address);
2495 [ + - ]: 29321 : if (new_purpose) { /* update purpose only if requested */
2496 : 29321 : record.purpose = new_purpose;
2497 : : }
2498 [ + - ]: 29321 : purpose = record.purpose;
2499 : 0 : }
2500 : :
2501 : 29321 : const std::string& encoded_dest = EncodeDestination(address);
2502 [ + - + - : 58642 : if (new_purpose && !batch.WritePurpose(encoded_dest, PurposeToString(*new_purpose))) {
+ - - + -
+ ]
2503 [ # # ]: 0 : WalletLogPrintf("Error: fail to write address book 'purpose' entry\n");
2504 : : return false;
2505 : : }
2506 [ + - - + ]: 29321 : if (!batch.WriteName(encoded_dest, strName)) {
2507 [ # # ]: 0 : WalletLogPrintf("Error: fail to write address book 'name' entry\n");
2508 : : return false;
2509 : : }
2510 : :
2511 : : // In very old wallets, address purpose may not be recorded so we derive it from IsMine
2512 [ + + + - ]: 58642 : NotifyAddressBookChanged(address, strName, is_mine,
2513 [ + + + - ]: 29322 : purpose.value_or(is_mine ? AddressPurpose::RECEIVE : AddressPurpose::SEND),
2514 : : (fUpdated ? CT_UPDATED : CT_NEW));
2515 : : return true;
2516 : 29321 : }
2517 : :
2518 : 29321 : bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& purpose)
2519 : : {
2520 : 29321 : WalletBatch batch(GetDatabase());
2521 [ + - ]: 29321 : return SetAddressBookWithDB(batch, address, strName, purpose);
2522 : 29321 : }
2523 : :
2524 : 0 : bool CWallet::DelAddressBook(const CTxDestination& address)
2525 : : {
2526 [ # # ]: 0 : return RunWithinTxn(GetDatabase(), /*process_desc=*/"address book entry removal", [&](WalletBatch& batch){
2527 : 0 : return DelAddressBookWithDB(batch, address);
2528 : 0 : });
2529 : : }
2530 : :
2531 : 27 : bool CWallet::DelAddressBookWithDB(WalletBatch& batch, const CTxDestination& address)
2532 : : {
2533 : 27 : const std::string& dest = EncodeDestination(address);
2534 : 27 : {
2535 [ + - ]: 27 : LOCK(cs_wallet);
2536 : : // If we want to delete receiving addresses, we should avoid calling EraseAddressData because it will delete the previously_spent value. Could instead just erase the label so it becomes a change address, and keep the data.
2537 : : // NOTE: This isn't a problem for sending addresses because they don't have any data that needs to be kept.
2538 : : // When adding new address data, it should be considered here whether to retain or delete it.
2539 [ + - - + ]: 27 : if (IsMine(address)) {
2540 [ # # ]: 0 : WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, CLIENT_BUGREPORT);
2541 : : return false;
2542 : : }
2543 : : // Delete data rows associated with this address
2544 [ + - - + ]: 27 : if (!batch.EraseAddressData(address)) {
2545 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry data\n");
2546 : : return false;
2547 : : }
2548 : :
2549 : : // Delete purpose entry
2550 [ + - - + ]: 27 : if (!batch.ErasePurpose(dest)) {
2551 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry purpose\n");
2552 : : return false;
2553 : : }
2554 : :
2555 : : // Delete name entry
2556 [ + - - + ]: 27 : if (!batch.EraseName(dest)) {
2557 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry name\n");
2558 : : return false;
2559 : : }
2560 : :
2561 : : // finally, remove it from the map
2562 [ + - ]: 27 : m_address_book.erase(address);
2563 : 0 : }
2564 : :
2565 : : // All good, signal changes
2566 [ + - + - ]: 27 : NotifyAddressBookChanged(address, "", /*is_mine=*/false, AddressPurpose::SEND, CT_DELETED);
2567 : 27 : return true;
2568 : 27 : }
2569 : :
2570 : 423 : size_t CWallet::KeypoolCountExternalKeys() const
2571 : : {
2572 : 423 : AssertLockHeld(cs_wallet);
2573 : :
2574 : 423 : unsigned int count = 0;
2575 [ + + ]: 1754 : for (auto spk_man : m_external_spk_managers) {
2576 : 1331 : count += spk_man.second->GetKeyPoolSize();
2577 : : }
2578 : :
2579 : 423 : return count;
2580 : : }
2581 : :
2582 : 1369 : unsigned int CWallet::GetKeyPoolSize() const
2583 : : {
2584 : 1369 : AssertLockHeld(cs_wallet);
2585 : :
2586 : 1369 : unsigned int count = 0;
2587 [ + + ]: 9325 : for (auto spk_man : GetActiveScriptPubKeyMans()) {
2588 [ + - ]: 7956 : count += spk_man->GetKeyPoolSize();
2589 : : }
2590 : 1369 : return count;
2591 : : }
2592 : :
2593 : 1016 : bool CWallet::TopUpKeyPool(unsigned int kpSize)
2594 : : {
2595 : 1016 : LOCK(cs_wallet);
2596 : 1016 : bool res = true;
2597 [ + - + + ]: 6642 : for (auto spk_man : GetActiveScriptPubKeyMans()) {
2598 [ + - ]: 5626 : res &= spk_man->TopUp(kpSize);
2599 : : }
2600 [ + - ]: 1016 : return res;
2601 : 1016 : }
2602 : :
2603 : 17245 : util::Result<CTxDestination> CWallet::GetNewDestination(const OutputType type, const std::string& label)
2604 : : {
2605 : 17245 : LOCK(cs_wallet);
2606 [ + - ]: 17245 : auto spk_man = GetScriptPubKeyMan(type, /*internal=*/false);
2607 [ + + ]: 17245 : if (!spk_man) {
2608 [ + - + - ]: 6 : return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2609 : : }
2610 : :
2611 [ + - ]: 17243 : auto op_dest = spk_man->GetNewDestination(type);
2612 [ + + ]: 17243 : if (op_dest) {
2613 [ + - ]: 17239 : SetAddressBook(*op_dest, label, AddressPurpose::RECEIVE);
2614 : : }
2615 : :
2616 : 17243 : return op_dest;
2617 : 34488 : }
2618 : :
2619 : 286 : util::Result<CTxDestination> CWallet::GetNewChangeDestination(const OutputType type)
2620 : : {
2621 : 286 : LOCK(cs_wallet);
2622 : :
2623 [ + - ]: 286 : ReserveDestination reservedest(this, type);
2624 [ + - ]: 286 : auto op_dest = reservedest.GetReservedDestination(true);
2625 [ + + + - ]: 286 : if (op_dest) reservedest.KeepDestination();
2626 : :
2627 : 286 : return op_dest;
2628 [ + - ]: 572 : }
2629 : :
2630 : 859 : void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) {
2631 [ + + + + ]: 256757 : for (auto& entry : mapWallet) {
2632 : 255898 : CWalletTx& wtx = entry.second;
2633 [ + + ]: 255898 : if (wtx.m_is_cache_empty) continue;
2634 [ - + + + ]: 114 : for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
2635 : 75 : CTxDestination dst;
2636 [ + - + + : 75 : if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.contains(dst)) {
+ + ]
2637 : 2 : wtx.MarkDirty();
2638 : 2 : break;
2639 : : }
2640 : 75 : }
2641 : : }
2642 : 859 : }
2643 : :
2644 : 124 : void CWallet::ForEachAddrBookEntry(const ListAddrBookFunc& func) const
2645 : : {
2646 : 124 : AssertLockHeld(cs_wallet);
2647 [ + + ]: 1461 : for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book) {
2648 : 1337 : const auto& entry = item.second;
2649 [ + - ]: 2674 : func(item.first, entry.GetLabel(), entry.IsChange(), entry.purpose);
2650 : : }
2651 : 124 : }
2652 : :
2653 : 24 : std::vector<CTxDestination> CWallet::ListAddrBookAddresses(const std::optional<AddrBookFilter>& _filter) const
2654 : : {
2655 : 24 : AssertLockHeld(cs_wallet);
2656 : 24 : std::vector<CTxDestination> result;
2657 [ + - + - ]: 24 : AddrBookFilter filter = _filter ? *_filter : AddrBookFilter();
2658 [ + - ]: 24 : ForEachAddrBookEntry([&result, &filter](const CTxDestination& dest, const std::string& label, bool is_change, const std::optional<AddressPurpose>& purpose) {
2659 : : // Filter by change
2660 [ + - + - ]: 200 : if (filter.ignore_change && is_change) return;
2661 : : // Filter by label
2662 [ + - + + ]: 200 : if (filter.m_op_label && *filter.m_op_label != label) return;
2663 : : // All good
2664 : 43 : result.emplace_back(dest);
2665 : : });
2666 : 24 : return result;
2667 : 24 : }
2668 : :
2669 : 38 : std::set<std::string> CWallet::ListAddrBookLabels(const std::optional<AddressPurpose> purpose) const
2670 : : {
2671 : 38 : AssertLockHeld(cs_wallet);
2672 [ + - ]: 38 : std::set<std::string> label_set;
2673 [ + - ]: 38 : ForEachAddrBookEntry([&](const CTxDestination& _dest, const std::string& _label,
2674 : : bool _is_change, const std::optional<AddressPurpose>& _purpose) {
2675 [ + - ]: 489 : if (_is_change) return;
2676 [ + + + - ]: 489 : if (!purpose || purpose == _purpose) {
2677 : 478 : label_set.insert(_label);
2678 : : }
2679 : : });
2680 : 38 : return label_set;
2681 : 0 : }
2682 : :
2683 : 2091 : util::Result<CTxDestination> ReserveDestination::GetReservedDestination(bool internal)
2684 : : {
2685 : 2091 : m_spk_man = pwallet->GetScriptPubKeyMan(type, internal);
2686 [ + + ]: 2091 : if (!m_spk_man) {
2687 : 24 : return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2688 : : }
2689 : :
2690 [ + - ]: 2079 : if (nIndex == -1) {
2691 : 2079 : int64_t index;
2692 : 2079 : auto op_address = m_spk_man->GetReservedDestination(type, internal, index);
2693 [ + + ]: 2079 : if (!op_address) return op_address;
2694 : 2075 : nIndex = index;
2695 [ + - ]: 4150 : address = *op_address;
2696 : 2079 : }
2697 : 2075 : return address;
2698 : : }
2699 : :
2700 : 3759 : void ReserveDestination::KeepDestination()
2701 : : {
2702 [ + + ]: 3759 : if (nIndex != -1) {
2703 : 1973 : m_spk_man->KeepDestination(nIndex, type);
2704 : : }
2705 : 3759 : nIndex = -1;
2706 : 3759 : address = CNoDestination();
2707 : 3759 : }
2708 : :
2709 : 3872 : void ReserveDestination::ReturnDestination()
2710 : : {
2711 [ + + ]: 3872 : if (nIndex != -1) {
2712 : 102 : m_spk_man->ReturnDestination(nIndex, fInternal, address);
2713 : : }
2714 : 3872 : nIndex = -1;
2715 : 3872 : address = CNoDestination();
2716 : 3872 : }
2717 : :
2718 : 5 : util::Result<void> CWallet::DisplayAddress(const CTxDestination& dest)
2719 : : {
2720 : 5 : CScript scriptPubKey = GetScriptForDestination(dest);
2721 [ + - + - ]: 5 : for (const auto& spk_man : GetScriptPubKeyMans(scriptPubKey)) {
2722 [ + - ]: 5 : auto signer_spk_man = dynamic_cast<ExternalSignerScriptPubKeyMan *>(spk_man);
2723 [ - + ]: 5 : if (signer_spk_man == nullptr) {
2724 : 0 : continue;
2725 : : }
2726 [ + + ]: 5 : auto signer{ExternalSignerScriptPubKeyMan::GetExternalSigner()};
2727 [ - + - - : 4 : if (!signer) throw std::runtime_error(util::ErrorString(signer).original);
- - ]
2728 [ + - ]: 4 : return signer_spk_man->DisplayAddress(dest, *signer);
2729 : 5 : }
2730 [ # # ]: 0 : return util::Error{_("There is no ScriptPubKeyManager for this address")};
2731 : 4 : }
2732 : :
2733 : 82 : void CWallet::LoadLockedCoin(const COutPoint& coin, bool persistent)
2734 : : {
2735 : 82 : AssertLockHeld(cs_wallet);
2736 : 82 : m_locked_coins.emplace(coin, persistent);
2737 : 82 : }
2738 : :
2739 : 80 : bool CWallet::LockCoin(const COutPoint& output, bool persist)
2740 : : {
2741 : 80 : AssertLockHeld(cs_wallet);
2742 : 80 : LoadLockedCoin(output, persist);
2743 [ + + ]: 80 : if (persist) {
2744 : 1 : WalletBatch batch(GetDatabase());
2745 [ + - ]: 1 : return batch.WriteLockedUTXO(output);
2746 : 1 : }
2747 : : return true;
2748 : : }
2749 : :
2750 : 13337 : bool CWallet::UnlockCoin(const COutPoint& output)
2751 : : {
2752 : 13337 : AssertLockHeld(cs_wallet);
2753 : 13337 : auto locked_coin_it = m_locked_coins.find(output);
2754 [ + + ]: 13337 : if (locked_coin_it != m_locked_coins.end()) {
2755 : 10 : bool persisted = locked_coin_it->second;
2756 : 10 : m_locked_coins.erase(locked_coin_it);
2757 [ + + ]: 10 : if (persisted) {
2758 : 1 : WalletBatch batch(GetDatabase());
2759 [ + - ]: 1 : return batch.EraseLockedUTXO(output);
2760 : 1 : }
2761 : : }
2762 : : return true;
2763 : : }
2764 : :
2765 : 4 : bool CWallet::UnlockAllCoins()
2766 : : {
2767 : 4 : AssertLockHeld(cs_wallet);
2768 : 4 : bool success = true;
2769 : 4 : WalletBatch batch(GetDatabase());
2770 [ - + + + ]: 56 : for (const auto& [coin, persistent] : m_locked_coins) {
2771 [ - + - - : 52 : if (persistent) success = success && batch.EraseLockedUTXO(coin);
- - - - ]
2772 : : }
2773 : 4 : m_locked_coins.clear();
2774 : 4 : return success;
2775 : 4 : }
2776 : :
2777 : 467768 : bool CWallet::IsLockedCoin(const COutPoint& output) const
2778 : : {
2779 : 467768 : AssertLockHeld(cs_wallet);
2780 : 467768 : return m_locked_coins.contains(output);
2781 : : }
2782 : :
2783 : 9 : void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const
2784 : : {
2785 : 9 : AssertLockHeld(cs_wallet);
2786 [ + + ]: 13 : for (const auto& [coin, _] : m_locked_coins) {
2787 : 4 : vOutpts.push_back(coin);
2788 : : }
2789 : 9 : }
2790 : :
2791 : : /**
2792 : : * Compute smart timestamp for a transaction being added to the wallet.
2793 : : *
2794 : : * Logic:
2795 : : * - If sending a transaction, assign its timestamp to the current time.
2796 : : * - If receiving a transaction outside a block, assign its timestamp to the
2797 : : * current time.
2798 : : * - If receiving a transaction during a rescanning process, assign all its
2799 : : * (not already known) transactions' timestamps to the block time.
2800 : : * - If receiving a block with a future timestamp, assign all its (not already
2801 : : * known) transactions' timestamps to the current time.
2802 : : * - If receiving a block with a past timestamp, before the most recent known
2803 : : * transaction (that we care about), assign all its (not already known)
2804 : : * transactions' timestamps to the same timestamp as that most-recent-known
2805 : : * transaction.
2806 : : * - If receiving a block with a past timestamp, but after the most recent known
2807 : : * transaction, assign all its (not already known) transactions' timestamps to
2808 : : * the block time.
2809 : : *
2810 : : * For more information see CWalletTx::nTimeSmart,
2811 : : * https://bitcointalk.org/?topic=54527, or
2812 : : * https://github.com/bitcoin/bitcoin/pull/1393.
2813 : : */
2814 : 19092 : unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const
2815 : : {
2816 : 19092 : std::optional<uint256> block_hash;
2817 [ + + ]: 19092 : if (auto* conf = wtx.state<TxStateConfirmed>()) {
2818 : 15542 : block_hash = conf->confirmed_block_hash;
2819 [ - + ]: 3550 : } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
2820 : 0 : block_hash = conf->conflicting_block_hash;
2821 : : }
2822 : :
2823 : 19092 : unsigned int nTimeSmart = wtx.nTimeReceived;
2824 [ + + ]: 19092 : if (block_hash) {
2825 : 15542 : int64_t blocktime;
2826 : 15542 : int64_t block_max_time;
2827 [ + - ]: 15542 : if (chain().findBlock(*block_hash, FoundBlock().time(blocktime).maxTime(block_max_time))) {
2828 [ + + ]: 15542 : if (rescanning_old_block) {
2829 : 4501 : nTimeSmart = block_max_time;
2830 : : } else {
2831 : 11041 : int64_t latestNow = wtx.nTimeReceived;
2832 : 11041 : int64_t latestEntry = 0;
2833 : :
2834 : : // Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future
2835 : 11041 : int64_t latestTolerated = latestNow + 300;
2836 : 11041 : const TxItems& txOrdered = wtxOrdered;
2837 [ + + ]: 22084 : for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) {
2838 : 21960 : CWalletTx* const pwtx = it->second;
2839 [ + + ]: 21960 : if (pwtx == &wtx) {
2840 : 11041 : continue;
2841 : : }
2842 : 10919 : int64_t nSmartTime;
2843 : 10919 : nSmartTime = pwtx->nTimeSmart;
2844 [ - + ]: 10919 : if (!nSmartTime) {
2845 : 0 : nSmartTime = pwtx->nTimeReceived;
2846 : : }
2847 [ + + ]: 10919 : if (nSmartTime <= latestTolerated) {
2848 : 10917 : latestEntry = nSmartTime;
2849 [ + + ]: 10917 : if (nSmartTime > latestNow) {
2850 : 1 : latestNow = nSmartTime;
2851 : : }
2852 : : break;
2853 : : }
2854 : : }
2855 : :
2856 [ + + + + ]: 12194 : nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow));
2857 : : }
2858 : : } else {
2859 [ # # # # ]: 0 : WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), block_hash->ToString());
2860 : : }
2861 : : }
2862 : 19092 : return nTimeSmart;
2863 : : }
2864 : :
2865 : 19 : bool CWallet::SetAddressPreviouslySpent(WalletBatch& batch, const CTxDestination& dest, bool used)
2866 : : {
2867 [ + - ]: 19 : if (std::get_if<CNoDestination>(&dest))
2868 : : return false;
2869 : :
2870 [ - + ]: 19 : if (!used) {
2871 [ # # ]: 0 : if (auto* data{common::FindKey(m_address_book, dest)}) data->previously_spent = false;
2872 : 0 : return batch.WriteAddressPreviouslySpent(dest, false);
2873 : : }
2874 : :
2875 : 19 : LoadAddressPreviouslySpent(dest);
2876 : 19 : return batch.WriteAddressPreviouslySpent(dest, true);
2877 : : }
2878 : :
2879 : 26 : void CWallet::LoadAddressPreviouslySpent(const CTxDestination& dest)
2880 : : {
2881 : 26 : m_address_book[dest].previously_spent = true;
2882 : 26 : }
2883 : :
2884 : 3 : void CWallet::LoadAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& request)
2885 : : {
2886 : 3 : m_address_book[dest].receive_requests[id] = request;
2887 : 3 : }
2888 : :
2889 : 1652 : bool CWallet::IsAddressPreviouslySpent(const CTxDestination& dest) const
2890 : : {
2891 [ + + ]: 1652 : if (auto* data{common::FindKey(m_address_book, dest)}) return data->previously_spent;
2892 : : return false;
2893 : : }
2894 : :
2895 : 2 : std::vector<std::string> CWallet::GetAddressReceiveRequests() const
2896 : : {
2897 : 2 : std::vector<std::string> values;
2898 [ + + ]: 5 : for (const auto& [dest, entry] : m_address_book) {
2899 [ + - + + ]: 6 : for (const auto& [id, request] : entry.receive_requests) {
2900 [ + - ]: 3 : values.emplace_back(request);
2901 : : }
2902 : : }
2903 : 2 : return values;
2904 : 0 : }
2905 : :
2906 : 4 : bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value)
2907 : : {
2908 [ + - ]: 4 : if (!batch.WriteAddressReceiveRequest(dest, id, value)) return false;
2909 : 4 : m_address_book[dest].receive_requests[id] = value;
2910 : 4 : return true;
2911 : : }
2912 : :
2913 : 1 : bool CWallet::EraseAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id)
2914 : : {
2915 [ + - ]: 1 : if (!batch.EraseAddressReceiveRequest(dest, id)) return false;
2916 : 1 : m_address_book[dest].receive_requests.erase(id);
2917 : 1 : return true;
2918 : : }
2919 : :
2920 : 1435 : static util::Result<fs::path> GetWalletPath(const std::string& name)
2921 : : {
2922 : : // Do some checking on wallet path. It should be either a:
2923 : : //
2924 : : // 1. Path where a directory can be created.
2925 : : // 2. Path to an existing directory.
2926 : : // 3. Path to a symlink to a directory.
2927 : : // 4. For backwards compatibility, the name of a data file in -walletdir.
2928 [ + - + - ]: 2870 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(name));
2929 [ + - ]: 1435 : fs::file_type path_type = fs::symlink_status(wallet_path).type();
2930 [ + + + + : 2874 : if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory ||
+ + + + ]
2931 [ + - + + ]: 16 : (path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) ||
2932 [ + - + - : 1441 : (path_type == fs::file_type::regular && fs::PathFromString(name).filename() == fs::PathFromString(name)))) {
+ - - + +
+ + + - -
- - ]
2933 [ + - + - ]: 8 : return util::Error{Untranslated(strprintf(
2934 : : "Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and "
2935 : : "database/log.?????????? files can be stored, a location where such a directory could be created, "
2936 : : "or (for backwards compatibility) the name of an existing data file in -walletdir (%s)",
2937 [ + - + - ]: 20 : name, fs::quoted(fs::PathToString(GetWalletDir()))))};
2938 : : }
2939 [ + - ]: 2862 : return wallet_path;
2940 : 1435 : }
2941 : :
2942 : 1387 : std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string)
2943 : : {
2944 : 1387 : const auto& wallet_path = GetWalletPath(name);
2945 [ + + ]: 1387 : if (!wallet_path) {
2946 [ + - ]: 4 : error_string = util::ErrorString(wallet_path);
2947 : 4 : status = DatabaseStatus::FAILED_BAD_PATH;
2948 : 4 : return nullptr;
2949 : : }
2950 [ + - ]: 1383 : return MakeDatabase(*wallet_path, options, status, error_string);
2951 : 1387 : }
2952 : :
2953 : 966 : bool CWallet::LoadWalletArgs(std::shared_ptr<CWallet> wallet, const WalletContext& context, bilingual_str& error, std::vector<bilingual_str>& warnings)
2954 : : {
2955 : 966 : interfaces::Chain* chain = context.chain;
2956 [ - + ]: 966 : const ArgsManager& args = *Assert(context.args);
2957 : :
2958 [ + - + - : 966 : if (!args.GetArg("-addresstype", "").empty()) {
+ + ]
2959 [ + - + - : 219 : std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-addresstype", ""));
+ - ]
2960 [ - + ]: 73 : if (!parsed) {
2961 [ # # # # : 0 : error = strprintf(_("Unknown address type '%s'"), args.GetArg("-addresstype", ""));
# # ]
2962 : 0 : return false;
2963 : : }
2964 : 73 : wallet->m_default_address_type = parsed.value();
2965 : : }
2966 : :
2967 [ + - + - : 966 : if (!args.GetArg("-changetype", "").empty()) {
+ + ]
2968 [ + - + - : 42 : std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-changetype", ""));
+ - ]
2969 [ - + ]: 14 : if (!parsed) {
2970 [ # # # # : 0 : error = strprintf(_("Unknown change type '%s'"), args.GetArg("-changetype", ""));
# # ]
2971 : 0 : return false;
2972 : : }
2973 : 14 : wallet->m_default_change_type = parsed.value();
2974 : : }
2975 : :
2976 [ + - + + ]: 1932 : if (const auto arg{args.GetArg("-mintxfee")}) {
2977 [ + - ]: 13 : std::optional<CAmount> min_tx_fee = ParseMoney(*arg);
2978 [ - + ]: 13 : if (!min_tx_fee) {
2979 [ # # # # ]: 0 : error = AmountErrMsg("mintxfee", *arg);
2980 : 0 : return false;
2981 [ - + ]: 13 : } else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
2982 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") +
# # ]
2983 [ # # # # ]: 0 : _("This is the minimum transaction fee you pay on every transaction."));
2984 : : }
2985 : :
2986 : 13 : wallet->m_min_fee = CFeeRate{min_tx_fee.value()};
2987 : 0 : }
2988 : :
2989 [ + - + + ]: 1932 : if (const auto arg{args.GetArg("-maxapsfee")}) {
2990 [ - + ]: 2 : const std::string& max_aps_fee{*arg};
2991 [ - + ]: 2 : if (max_aps_fee == "-1") {
2992 : 0 : wallet->m_max_aps_fee = -1;
2993 [ + - + - ]: 2 : } else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) {
2994 [ - + ]: 2 : if (max_fee.value() > HIGH_APS_FEE) {
2995 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") +
# # ]
2996 [ # # # # ]: 0 : _("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection."));
2997 : : }
2998 : 2 : wallet->m_max_aps_fee = max_fee.value();
2999 : : } else {
3000 [ # # # # ]: 0 : error = AmountErrMsg("maxapsfee", max_aps_fee);
3001 : 0 : return false;
3002 : : }
3003 : 0 : }
3004 : :
3005 [ + - + + ]: 1932 : if (const auto arg{args.GetArg("-fallbackfee")}) {
3006 [ + - ]: 961 : std::optional<CAmount> fallback_fee = ParseMoney(*arg);
3007 [ - + ]: 961 : if (!fallback_fee) {
3008 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-fallbackfee", *arg);
3009 : 0 : return false;
3010 [ - + ]: 961 : } else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) {
3011 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") +
# # ]
3012 [ # # # # ]: 0 : _("This is the transaction fee you may pay when fee estimates are not available."));
3013 : : }
3014 : 961 : wallet->m_fallback_fee = CFeeRate{fallback_fee.value()};
3015 : 0 : }
3016 : :
3017 : : // Disable fallback fee in case value was set to 0, enable if non-null value
3018 : 966 : wallet->m_allow_fallback_fee = wallet->m_fallback_fee.GetFeePerK() != 0;
3019 : :
3020 [ + - + + ]: 1932 : if (const auto arg{args.GetArg("-discardfee")}) {
3021 [ + - ]: 6 : std::optional<CAmount> discard_fee = ParseMoney(*arg);
3022 [ - + ]: 6 : if (!discard_fee) {
3023 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-discardfee", *arg);
3024 : 0 : return false;
3025 [ + + ]: 6 : } else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) {
3026 [ + - + - : 24 : warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") +
+ - ]
3027 [ + - + - ]: 8 : _("This is the transaction fee you may discard if change is smaller than dust at this level"));
3028 : : }
3029 : 6 : wallet->m_discard_rate = CFeeRate{discard_fee.value()};
3030 : 0 : }
3031 : :
3032 [ + - + + ]: 1932 : if (const auto arg{args.GetArg("-maxtxfee")}) {
3033 [ + - ]: 1 : std::optional<CAmount> max_fee = ParseMoney(*arg);
3034 [ - + ]: 1 : if (!max_fee) {
3035 [ # # # # ]: 0 : error = AmountErrMsg("maxtxfee", *arg);
3036 : 0 : return false;
3037 [ - + ]: 1 : } else if (max_fee.value() > HIGH_MAX_TX_FEE) {
3038 [ # # ]: 0 : warnings.push_back(strprintf(_("%s is set very high! Fees this large could be paid on a single transaction."), "-maxtxfee"));
3039 : : }
3040 : :
3041 [ + - + - : 2 : if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) {
+ - - + ]
3042 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),
3043 [ # # # # ]: 0 : "-maxtxfee", *arg, chain->relayMinFee().ToString());
3044 : 0 : return false;
3045 : : }
3046 : :
3047 [ + - ]: 1 : wallet->m_default_max_tx_fee = max_fee.value();
3048 : 0 : }
3049 : :
3050 [ + - - + ]: 1932 : if (const auto arg{args.GetArg("-consolidatefeerate")}) {
3051 [ # # # # ]: 0 : if (std::optional<CAmount> consolidate_feerate = ParseMoney(*arg)) {
3052 : 0 : wallet->m_consolidate_feerate = CFeeRate(*consolidate_feerate);
3053 : : } else {
3054 [ # # # # ]: 0 : error = AmountErrMsg("consolidatefeerate", *arg);
3055 : 0 : return false;
3056 : : }
3057 : 0 : }
3058 : :
3059 [ + + + + ]: 966 : if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB) {
3060 [ + - + - : 12 : warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") +
+ - ]
3061 [ + - ]: 4 : _("The wallet will avoid paying less than the minimum relay fee."));
3062 : : }
3063 : :
3064 : 1932 : wallet->m_confirm_target = args.GetIntArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET);
3065 [ + - ]: 966 : wallet->m_spend_zero_conf_change = args.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE);
3066 [ + - ]: 966 : wallet->m_signal_rbf = args.GetBoolArg("-walletrbf", DEFAULT_WALLET_RBF);
3067 : :
3068 [ + + ]: 2895 : wallet->m_keypool_size = std::max(args.GetIntArg("-keypool", DEFAULT_KEYPOOL_SIZE), int64_t{1});
3069 [ + - + - ]: 966 : wallet->m_notify_tx_changed_script = args.GetArg("-walletnotify", "");
3070 [ + - ]: 966 : wallet->SetBroadcastTransactions(args.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST));
3071 : :
3072 : 966 : return true;
3073 : : }
3074 : :
3075 : 609 : std::shared_ptr<CWallet> CWallet::CreateNew(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings)
3076 : : {
3077 : 609 : interfaces::Chain* chain = context.chain;
3078 : 609 : const std::string& walletFile = database->Filename();
3079 : :
3080 : 609 : const auto start{SteadyClock::now()};
3081 : : // TODO: Can't use std::make_shared because we need a custom deleter but
3082 : : // should be possible to use std::allocate_shared.
3083 [ + - + - : 1218 : std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
+ - - - ]
3084 : :
3085 [ + - + - : 1827 : if (!LoadWalletArgs(walletInstance, context, error, warnings)) {
+ - - + ]
3086 : 0 : return nullptr;
3087 : : }
3088 : :
3089 : : // Initialize version key.
3090 [ + - + - : 1218 : if(!WalletBatch(walletInstance->GetDatabase()).WriteVersion(CLIENT_VERSION)) {
- + ]
3091 [ # # ]: 0 : error = strprintf(_("Error creating %s: Could not write version metadata."), walletFile);
3092 : 0 : return nullptr;
3093 : : }
3094 : 609 : {
3095 [ + - ]: 609 : LOCK(walletInstance->cs_wallet);
3096 : :
3097 : : // Init with passed flags.
3098 : : // Always set the cache upgrade flag as this feature is supported from the beginning.
3099 [ + - ]: 609 : walletInstance->InitWalletFlags(wallet_creation_flags | WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
3100 : :
3101 : : // Only descriptor wallets can be created
3102 [ + - - + ]: 609 : assert(walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3103 : :
3104 [ + + + + ]: 609 : if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) || !(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) {
3105 [ + + ]: 391 : walletInstance->SetupDescriptorScriptPubKeyMans();
3106 : : }
3107 : :
3108 [ + + ]: 606 : if (chain) {
3109 [ + - ]: 587 : std::optional<int> tip_height = chain->getHeight();
3110 [ + - ]: 587 : if (tip_height) {
3111 [ + - + - ]: 587 : walletInstance->SetLastBlockProcessed(*tip_height, chain->getBlockHash(*tip_height));
3112 : : }
3113 : : }
3114 : 3 : }
3115 : :
3116 [ + - ]: 606 : walletInstance->WalletLogPrintf("Wallet completed creation in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3117 : :
3118 : : // Try to top up keypool. No-op if the wallet is locked.
3119 [ + - ]: 606 : walletInstance->TopUpKeyPool();
3120 : :
3121 [ + + + - : 606 : if (chain && !AttachChain(walletInstance, *chain, /*rescan_required=*/false, error, warnings)) {
- + ]
3122 [ # # ]: 0 : walletInstance->DisconnectChainNotifications();
3123 : 0 : return nullptr;
3124 : : }
3125 : :
3126 : 606 : return walletInstance;
3127 : 609 : }
3128 : :
3129 : 357 : std::shared_ptr<CWallet> CWallet::LoadExisting(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, bilingual_str& error, std::vector<bilingual_str>& warnings)
3130 : : {
3131 : 357 : interfaces::Chain* chain = context.chain;
3132 : 357 : const std::string& walletFile = database->Filename();
3133 : :
3134 : 357 : const auto start{SteadyClock::now()};
3135 [ + - + - : 714 : std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
+ - - - ]
3136 : :
3137 [ + - + - : 1071 : if (!LoadWalletArgs(walletInstance, context, error, warnings)) {
+ - - + ]
3138 : 0 : return nullptr;
3139 : : }
3140 : :
3141 : : // Load wallet
3142 [ + - ]: 357 : auto nLoadWalletRet = walletInstance->PopulateWalletFromDB(error, warnings);
3143 : 357 : bool rescan_required = nLoadWalletRet == DBErrors::NEED_RESCAN;
3144 [ + + + - ]: 357 : if (nLoadWalletRet != DBErrors::LOAD_OK && nLoadWalletRet != DBErrors::NONCRITICAL_ERROR && !rescan_required) {
3145 : 1 : return nullptr;
3146 : : }
3147 : :
3148 [ + - + + ]: 356 : if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
3149 [ + - + + ]: 104 : for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
3150 [ + - - + ]: 16 : if (spk_man->HavePrivateKeys()) {
3151 [ # # ]: 0 : warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));
3152 : 0 : break;
3153 : : }
3154 : : }
3155 : : }
3156 : :
3157 [ + - ]: 356 : walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3158 : :
3159 : : // Try to top up keypool. No-op if the wallet is locked.
3160 [ + - ]: 356 : walletInstance->TopUpKeyPool();
3161 : :
3162 [ + + + - : 356 : if (chain && !AttachChain(walletInstance, *chain, rescan_required, error, warnings)) {
+ + ]
3163 [ + - ]: 9 : walletInstance->DisconnectChainNotifications();
3164 : 9 : return nullptr;
3165 : : }
3166 : :
3167 [ + - + - ]: 1041 : WITH_LOCK(walletInstance->cs_wallet, walletInstance->LogStats());
3168 : :
3169 : 347 : return walletInstance;
3170 : 357 : }
3171 : :
3172 : :
3173 : 897 : bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, const bool rescan_required, bilingual_str& error, std::vector<bilingual_str>& warnings)
3174 : : {
3175 : 897 : LOCK(walletInstance->cs_wallet);
3176 : : // allow setting the chain if it hasn't been set already but prevent changing it
3177 [ + - - + ]: 897 : assert(!walletInstance->m_chain || walletInstance->m_chain == &chain);
3178 [ + - ]: 897 : walletInstance->m_chain = &chain;
3179 : :
3180 : : // Unless allowed, ensure wallet files are not reused across chains:
3181 [ + - + - : 897 : if (!gArgs.GetBoolArg("-walletcrosschain", DEFAULT_WALLETCROSSCHAIN)) {
+ - ]
3182 [ + - ]: 897 : WalletBatch batch(walletInstance->GetDatabase());
3183 : 897 : CBlockLocator locator;
3184 [ + - + + : 1793 : if (batch.ReadBestBlock(locator) && locator.vHave.size() > 0 && chain.getHeight()) {
+ - + - +
+ ]
3185 : : // Wallet is assumed to be from another chain, if genesis block in the active
3186 : : // chain differs from the genesis block known to the wallet.
3187 [ + - + + ]: 888 : if (chain.getBlockHash(0) != locator.vHave.back()) {
3188 [ + - + - ]: 2 : error = Untranslated("Wallet files should not be reused across chains. Restart bitcoind with -walletcrosschain to override.");
3189 : 1 : return false;
3190 : : }
3191 : : }
3192 : 1794 : }
3193 : :
3194 : : // Register wallet with validationinterface. It's done before rescan to avoid
3195 : : // missing block connections during the rescan.
3196 : : // Because of the wallet lock being held, block connection notifications are going to
3197 : : // be pending on the validation-side until lock release. Blocks that are connected while the
3198 : : // rescan is ongoing will not be processed in the rescan but with the block connected notifications,
3199 : : // so the wallet will only be completeley synced after the notifications delivery.
3200 [ + - - + ]: 896 : walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance);
3201 : :
3202 : : // If rescan_required = true, rescan_height remains equal to 0
3203 : 896 : int rescan_height = 0;
3204 [ + - ]: 896 : if (!rescan_required)
3205 : : {
3206 [ + - ]: 896 : WalletBatch batch(walletInstance->GetDatabase());
3207 : 896 : CBlockLocator locator;
3208 [ + - + + ]: 896 : if (batch.ReadBestBlock(locator)) {
3209 [ + - + + ]: 895 : if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) {
3210 : 887 : rescan_height = *fork_height;
3211 : : }
3212 : : }
3213 : 1792 : }
3214 : :
3215 [ + - ]: 896 : const std::optional<int> tip_height = chain.getHeight();
3216 [ + + ]: 896 : if (tip_height) {
3217 [ + - + - ]: 888 : walletInstance->SetLastBlockProcessedInMem(*tip_height, chain.getBlockHash(*tip_height));
3218 : : } else {
3219 [ + - ]: 8 : walletInstance->SetLastBlockProcessedInMem(-1, uint256());
3220 : : }
3221 : :
3222 [ + + + + ]: 896 : if (tip_height && *tip_height != rescan_height)
3223 : : {
3224 : : // No need to read and scan block if block was created before
3225 : : // our wallet birthday (as adjusted for block time variability)
3226 [ + - ]: 66 : std::optional<int64_t> time_first_key = walletInstance->m_birth_time.load();
3227 [ + - ]: 66 : if (time_first_key) {
3228 [ + - ]: 66 : FoundBlock found = FoundBlock().height(rescan_height);
3229 [ + - ]: 66 : chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, found);
3230 [ - + ]: 66 : if (!found.found) {
3231 : : // We were unable to find a block that had a time more recent than our earliest timestamp
3232 : : // or a height higher than the wallet was synced to, indicating that the wallet is newer than the
3233 : : // current chain tip. Skip rescanning in this case.
3234 : 0 : rescan_height = *tip_height;
3235 : : }
3236 : : }
3237 : :
3238 : : // Technically we could execute the code below in any case, but performing the
3239 : : // `while` loop below can make startup very slow, so only check blocks on disk
3240 : : // if necessary.
3241 [ + - + + : 66 : if (chain.havePruned() || chain.hasAssumedValidChain()) {
+ - + + ]
3242 : 13 : int block_height = *tip_height;
3243 [ + - + - : 2230 : while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) {
+ + + + ]
3244 : 2217 : --block_height;
3245 : : }
3246 : :
3247 [ + + ]: 13 : if (rescan_height != block_height) {
3248 : : // We can't rescan beyond blocks we don't have data for, stop and throw an error.
3249 : : // This might happen if a user uses an old wallet within a pruned node
3250 : : // or if they ran -disablewallet for a longer time, then decided to re-enable
3251 : : // Exit early and print an error.
3252 : : // It also may happen if an assumed-valid chain is in use and therefore not
3253 : : // all block data is available.
3254 : : // If a block is pruned after this check, we will load the wallet,
3255 : : // but fail the rescan with a generic error.
3256 : :
3257 [ + - + + : 8 : error = chain.havePruned() ?
+ - ]
3258 [ + - ]: 3 : _("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of a pruned node)") :
3259 : : strprintf(_(
3260 : : "Error loading wallet. Wallet requires blocks to be downloaded, "
3261 : : "and software does not currently support loading wallets while "
3262 : : "blocks are being downloaded out of order when using assumeutxo "
3263 : : "snapshots. Wallet should be able to load successfully after "
3264 : 8 : "node sync reaches height %s"), block_height);
3265 : 8 : return false;
3266 : : }
3267 : : }
3268 : :
3269 [ + - + - ]: 58 : chain.initMessage(_("Rescanning…"));
3270 [ + - ]: 58 : walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height);
3271 : :
3272 : 58 : {
3273 : 58 : WalletRescanReserver reserver(*walletInstance);
3274 [ - + ]: 58 : if (!reserver.reserve()) {
3275 [ # # ]: 0 : error = _("Failed to acquire rescan reserver during wallet initialization");
3276 : 0 : return false;
3277 : : }
3278 [ + - + - ]: 58 : ScanResult scan_res = walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, /*max_height=*/{}, reserver, /*fUpdate=*/true, /*save_progress=*/true);
3279 [ - + ]: 58 : if (ScanResult::SUCCESS != scan_res.status) {
3280 [ # # ]: 0 : error = _("Failed to rescan the wallet during initialization");
3281 : 0 : return false;
3282 : : }
3283 : : // Set and update the best block record
3284 : : // Set last block scanned as the last block processed as it may be different in case of a reorg.
3285 : : // Also save the best block locator because rescanning only updates it intermittently.
3286 [ + - ]: 58 : walletInstance->SetLastBlockProcessed(*scan_res.last_scanned_height, scan_res.last_scanned_block);
3287 : 58 : }
3288 : : }
3289 : :
3290 : : return true;
3291 : 897 : }
3292 : :
3293 : 50578 : const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const
3294 : : {
3295 : 50578 : const auto& address_book_it = m_address_book.find(dest);
3296 [ + + ]: 50578 : if (address_book_it == m_address_book.end()) return nullptr;
3297 [ + - + + ]: 37263 : if ((!allow_change) && address_book_it->second.IsChange()) {
3298 : : return nullptr;
3299 : : }
3300 : 37260 : return &address_book_it->second;
3301 : : }
3302 : :
3303 : 888 : void CWallet::postInitProcess()
3304 : : {
3305 : : // Add wallet transactions that aren't already in a block to mempool
3306 : : // Do this here as mempool requires genesis block to be loaded
3307 : 888 : ResubmitWalletTransactions(node::TxBroadcast::MEMPOOL_NO_BROADCAST, /*force=*/true);
3308 : :
3309 : : // Update wallet transactions with current mempool transactions.
3310 [ + - ]: 2664 : WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
3311 : 888 : }
3312 : :
3313 : 113 : bool CWallet::BackupWallet(const std::string& strDest) const
3314 : : {
3315 [ + - ]: 339 : WITH_LOCK(cs_wallet, WriteBestBlock());
3316 : 113 : return GetDatabase().Backup(strDest);
3317 : : }
3318 : :
3319 : 1240595 : int CWallet::GetTxDepthInMainChain(const CWalletTx& wtx) const
3320 : : {
3321 : 1240595 : AssertLockHeld(cs_wallet);
3322 [ + + ]: 1240595 : if (auto* conf = wtx.state<TxStateConfirmed>()) {
3323 [ - + ]: 1157671 : assert(conf->confirmed_block_height >= 0);
3324 : 1157671 : return GetLastBlockHeight() - conf->confirmed_block_height + 1;
3325 [ + + ]: 82924 : } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
3326 [ - + ]: 4170 : assert(conf->conflicting_block_height >= 0);
3327 : 4170 : return -1 * (GetLastBlockHeight() - conf->conflicting_block_height + 1);
3328 : : } else {
3329 : : return 0;
3330 : : }
3331 : : }
3332 : :
3333 : 709972 : int CWallet::GetTxBlocksToMaturity(const CWalletTx& wtx) const
3334 : : {
3335 : 709972 : AssertLockHeld(cs_wallet);
3336 : :
3337 [ + + ]: 709972 : if (!wtx.IsCoinBase()) {
3338 : : return 0;
3339 : : }
3340 : 425647 : int chain_depth = GetTxDepthInMainChain(wtx);
3341 [ - + ]: 425647 : assert(chain_depth >= 0); // coinbase tx should not be conflicted
3342 [ + + ]: 425647 : return std::max(0, (COINBASE_MATURITY+1) - chain_depth);
3343 : : }
3344 : :
3345 : 709972 : bool CWallet::IsTxImmatureCoinBase(const CWalletTx& wtx) const
3346 : : {
3347 : 709972 : AssertLockHeld(cs_wallet);
3348 : :
3349 : : // note GetBlocksToMaturity is 0 for non-coinbase tx
3350 : 709972 : return GetTxBlocksToMaturity(wtx) > 0;
3351 : : }
3352 : :
3353 : 8030 : bool CWallet::IsLocked() const
3354 : : {
3355 [ + + ]: 8030 : if (!HasEncryptionKeys()) {
3356 : : return false;
3357 : : }
3358 : 3678 : LOCK(cs_wallet);
3359 [ + - ]: 3678 : return vMasterKey.empty();
3360 : 3678 : }
3361 : :
3362 : 85 : bool CWallet::Lock()
3363 : : {
3364 [ + - ]: 85 : if (!HasEncryptionKeys())
3365 : : return false;
3366 : :
3367 : 85 : {
3368 [ + - ]: 85 : LOCK2(m_relock_mutex, cs_wallet);
3369 [ + + ]: 85 : if (!vMasterKey.empty()) {
3370 [ - + + - ]: 57 : memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type));
3371 [ + - + - ]: 142 : vMasterKey.clear();
3372 : : }
3373 [ + - ]: 85 : }
3374 : :
3375 : 85 : NotifyStatusChanged(this);
3376 : 85 : return true;
3377 : : }
3378 : :
3379 : 74 : bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn)
3380 : : {
3381 : 74 : {
3382 : 74 : LOCK(cs_wallet);
3383 [ + + ]: 794 : for (const auto& spk_man_pair : m_spk_managers) {
3384 [ + - - + ]: 720 : if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn)) {
3385 [ # # ]: 0 : return false;
3386 : : }
3387 : : }
3388 [ + - ]: 74 : vMasterKey = vMasterKeyIn;
3389 : 0 : }
3390 : 74 : NotifyStatusChanged(this);
3391 : 74 : return true;
3392 : : }
3393 : :
3394 : 33983 : std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const
3395 : : {
3396 : 33983 : std::set<ScriptPubKeyMan*> spk_mans;
3397 [ + + ]: 101949 : for (bool internal : {false, true}) {
3398 [ + + ]: 339830 : for (OutputType t : OUTPUT_TYPES) {
3399 [ + - ]: 271864 : auto spk_man = GetScriptPubKeyMan(t, internal);
3400 [ + + ]: 271864 : if (spk_man) {
3401 [ + - ]: 156147 : spk_mans.insert(spk_man);
3402 : : }
3403 : : }
3404 : : }
3405 : 33983 : return spk_mans;
3406 : 0 : }
3407 : :
3408 : 225 : bool CWallet::IsActiveScriptPubKeyMan(const ScriptPubKeyMan& spkm) const
3409 : : {
3410 [ + + + + ]: 841 : for (const auto& [_, ext_spkm] : m_external_spk_managers) {
3411 [ + + ]: 721 : if (ext_spkm == &spkm) return true;
3412 : : }
3413 [ + + + + ]: 342 : for (const auto& [_, int_spkm] : m_internal_spk_managers) {
3414 [ + + ]: 321 : if (int_spkm == &spkm) return true;
3415 : : }
3416 : : return false;
3417 : : }
3418 : :
3419 : 4285 : std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const
3420 : : {
3421 : 4285 : std::set<ScriptPubKeyMan*> spk_mans;
3422 [ + + ]: 40554 : for (const auto& spk_man_pair : m_spk_managers) {
3423 [ + - ]: 36269 : spk_mans.insert(spk_man_pair.second.get());
3424 : : }
3425 : 4285 : return spk_mans;
3426 : 0 : }
3427 : :
3428 : 330409 : ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const OutputType& type, bool internal) const
3429 : : {
3430 [ + + ]: 330409 : const std::map<OutputType, ScriptPubKeyMan*>& spk_managers = internal ? m_internal_spk_managers : m_external_spk_managers;
3431 : 330409 : std::map<OutputType, ScriptPubKeyMan*>::const_iterator it = spk_managers.find(type);
3432 [ + + ]: 330409 : if (it == spk_managers.end()) {
3433 : : return nullptr;
3434 : : }
3435 : 209031 : return it->second;
3436 : : }
3437 : :
3438 : 175961 : std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script) const
3439 : : {
3440 [ + - ]: 175961 : std::set<ScriptPubKeyMan*> spk_mans;
3441 : :
3442 : : // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3443 [ + - ]: 175961 : const auto& it = m_cached_spks.find(script);
3444 [ + + ]: 175961 : if (it != m_cached_spks.end()) {
3445 [ + - ]: 113783 : spk_mans.insert(it->second.begin(), it->second.end());
3446 : : }
3447 : 175961 : SignatureData sigdata;
3448 [ + - ]: 289753 : Assume(std::all_of(spk_mans.begin(), spk_mans.end(), [&script, &sigdata](ScriptPubKeyMan* spkm) { return spkm->CanProvide(script, sigdata); }));
3449 : :
3450 : 175961 : return spk_mans;
3451 : 175961 : }
3452 : :
3453 : 7498 : ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const
3454 : : {
3455 [ + + ]: 7498 : if (m_spk_managers.contains(id)) {
3456 : 7488 : return m_spk_managers.at(id).get();
3457 : : }
3458 : : return nullptr;
3459 : : }
3460 : :
3461 : 371433 : std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const
3462 : : {
3463 : 371433 : SignatureData sigdata;
3464 [ + - ]: 742866 : return GetSolvingProvider(script, sigdata);
3465 : 371433 : }
3466 : :
3467 : 371433 : std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const
3468 : : {
3469 : : // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3470 : 371433 : const auto& it = m_cached_spks.find(script);
3471 [ + + ]: 371433 : if (it != m_cached_spks.end()) {
3472 : : // All spkms for a given script must already be able to make a SigningProvider for the script, so just return the first one.
3473 : 261197 : Assume(it->second.at(0)->CanProvide(script, sigdata));
3474 : 261197 : return it->second.at(0)->GetSolvingProvider(script);
3475 : : }
3476 : :
3477 : 110236 : return nullptr;
3478 : : }
3479 : :
3480 : 36075 : std::vector<WalletDescriptor> CWallet::GetWalletDescriptors(const CScript& script) const
3481 : : {
3482 : 36075 : std::vector<WalletDescriptor> descs;
3483 [ + - + + ]: 72151 : for (const auto spk_man: GetScriptPubKeyMans(script)) {
3484 [ + - + - ]: 36076 : if (const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man)) {
3485 [ + - ]: 36076 : LOCK(desc_spk_man->cs_desc_man);
3486 [ + - + - ]: 72152 : descs.push_back(desc_spk_man->GetWalletDescriptor());
3487 : 36076 : }
3488 : : }
3489 : 36075 : return descs;
3490 : 0 : }
3491 : :
3492 : 763 : LegacyDataSPKM* CWallet::GetLegacyDataSPKM() const
3493 : : {
3494 [ + - ]: 763 : if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3495 : : return nullptr;
3496 : : }
3497 : 763 : auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3498 [ + - ]: 763 : if (it == m_internal_spk_managers.end()) return nullptr;
3499 [ + - ]: 763 : return dynamic_cast<LegacyDataSPKM*>(it->second);
3500 : : }
3501 : :
3502 : 7283 : void CWallet::AddScriptPubKeyMan(const uint256& id, std::unique_ptr<ScriptPubKeyMan> spkm_man)
3503 : : {
3504 : : // Add spkm_man to m_spk_managers before calling any method
3505 : : // that might access it.
3506 : 7283 : const auto& spkm = m_spk_managers[id] = std::move(spkm_man);
3507 : :
3508 : : // Update birth time if needed
3509 : 7283 : MaybeUpdateBirthTime(spkm->GetTimeFirstKey());
3510 : 7283 : }
3511 : :
3512 : 656 : LegacyDataSPKM* CWallet::GetOrCreateLegacyDataSPKM()
3513 : : {
3514 : 656 : SetupLegacyScriptPubKeyMan();
3515 : 656 : return GetLegacyDataSPKM();
3516 : : }
3517 : :
3518 : 656 : void CWallet::SetupLegacyScriptPubKeyMan()
3519 : : {
3520 [ + + + - : 656 : if (!m_internal_spk_managers.empty() || !m_external_spk_managers.empty() || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
+ - - + ]
3521 : 613 : return;
3522 : : }
3523 : :
3524 [ + - - + : 43 : Assert(m_database->Format() == "bdb_ro" || m_database->Format() == "mock");
- - - - -
+ - + - -
- - ]
3525 : 43 : std::unique_ptr<ScriptPubKeyMan> spk_manager = std::make_unique<LegacyDataSPKM>(*this);
3526 : :
3527 [ + + + - ]: 172 : for (const auto& type : LEGACY_OUTPUT_TYPES) {
3528 [ + - ]: 129 : m_internal_spk_managers[type] = spk_manager.get();
3529 [ + - ]: 129 : m_external_spk_managers[type] = spk_manager.get();
3530 : : }
3531 [ + - ]: 43 : uint256 id = spk_manager->GetID();
3532 [ + - ]: 43 : AddScriptPubKeyMan(id, std::move(spk_manager));
3533 : 43 : }
3534 : :
3535 : 2447 : bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const
3536 : : {
3537 : 2447 : LOCK(cs_wallet);
3538 [ + - + - ]: 2447 : return cb(vMasterKey);
3539 : 2447 : }
3540 : :
3541 : 114386 : bool CWallet::HasEncryptionKeys() const
3542 : : {
3543 : 114386 : return !mapMasterKeys.empty();
3544 : : }
3545 : :
3546 : 1 : bool CWallet::HaveCryptedKeys() const
3547 : : {
3548 [ - + ]: 1 : for (const auto& spkm : GetAllScriptPubKeyMans()) {
3549 [ # # # # ]: 0 : if (spkm->HaveCryptedKeys()) return true;
3550 : : }
3551 : 1 : return false;
3552 : : }
3553 : :
3554 : 1535 : void CWallet::ConnectScriptPubKeyManNotifiers()
3555 : : {
3556 [ + + ]: 9283 : for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
3557 [ + - + - ]: 15496 : spk_man->NotifyCanGetAddressesChanged.connect(NotifyCanGetAddressesChanged);
3558 [ + - + - ]: 23244 : spk_man->NotifyFirstKeyTimeChanged.connect([this](const ScriptPubKeyMan*, int64_t time) {
3559 : 48 : MaybeUpdateBirthTime(time);
3560 : : });
3561 : : }
3562 : 1535 : }
3563 : :
3564 : 2559 : DescriptorScriptPubKeyMan& CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc)
3565 : : {
3566 : 2559 : DescriptorScriptPubKeyMan* spk_manager;
3567 [ + + ]: 2559 : if (IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3568 [ + - ]: 8 : spk_manager = new ExternalSignerScriptPubKeyMan(*this, desc, m_keypool_size);
3569 : : } else {
3570 [ + - ]: 2551 : spk_manager = new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size);
3571 : : }
3572 [ + - ]: 2559 : AddScriptPubKeyMan(id, std::unique_ptr<ScriptPubKeyMan>(spk_manager));
3573 : 2559 : return *spk_manager;
3574 : : }
3575 : :
3576 : 3714 : DescriptorScriptPubKeyMan& CWallet::SetupDescriptorScriptPubKeyMan(WalletBatch& batch, const CExtKey& master_key, const OutputType& output_type, bool internal)
3577 : : {
3578 : 3714 : AssertLockHeld(cs_wallet);
3579 [ + - + - ]: 3714 : auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, m_keypool_size));
3580 [ + - + + ]: 3714 : if (HasEncryptionKeys()) {
3581 [ + - - + ]: 138 : if (IsLocked()) {
3582 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors");
3583 : : }
3584 [ + - - + : 138 : if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, &batch)) {
- - - - ]
3585 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors");
3586 : : }
3587 : : }
3588 [ + - ]: 3714 : spk_manager->SetupDescriptorGeneration(batch, master_key, output_type, internal);
3589 [ + - ]: 3714 : DescriptorScriptPubKeyMan* out = spk_manager.get();
3590 [ + - ]: 3714 : uint256 id = spk_manager->GetID();
3591 [ + - ]: 3714 : AddScriptPubKeyMan(id, std::move(spk_manager));
3592 [ + - ]: 3714 : AddActiveScriptPubKeyManWithDb(batch, id, output_type, internal);
3593 : 3714 : return *out;
3594 : 3714 : }
3595 : :
3596 : 463 : void CWallet::SetupDescriptorScriptPubKeyMans(WalletBatch& batch, const CExtKey& master_key)
3597 : : {
3598 : 463 : AssertLockHeld(cs_wallet);
3599 [ + + ]: 1389 : for (bool internal : {false, true}) {
3600 [ + + ]: 4630 : for (OutputType t : OUTPUT_TYPES) {
3601 : 3704 : SetupDescriptorScriptPubKeyMan(batch, master_key, t, internal);
3602 : : }
3603 : : }
3604 : 463 : }
3605 : :
3606 : 435 : void CWallet::SetupOwnDescriptorScriptPubKeyMans(WalletBatch& batch)
3607 : : {
3608 : 435 : AssertLockHeld(cs_wallet);
3609 [ - + ]: 435 : assert(!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER));
3610 : : // Make a seed
3611 : 435 : CKey seed_key = GenerateRandomKey();
3612 [ + - ]: 435 : CPubKey seed = seed_key.GetPubKey();
3613 [ + - - + ]: 435 : assert(seed_key.VerifyPubKey(seed));
3614 : :
3615 : : // Get the extended key
3616 [ + - ]: 435 : CExtKey master_key;
3617 [ + - + - ]: 870 : master_key.SetSeed(seed_key);
3618 : :
3619 [ + - ]: 435 : SetupDescriptorScriptPubKeyMans(batch, master_key);
3620 : 435 : }
3621 : :
3622 : 439 : void CWallet::SetupDescriptorScriptPubKeyMans()
3623 : : {
3624 : 439 : AssertLockHeld(cs_wallet);
3625 : :
3626 [ + + ]: 439 : if (!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3627 [ + - - + ]: 434 : if (!RunWithinTxn(GetDatabase(), /*process_desc=*/"setup descriptors", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet){
3628 : 434 : SetupOwnDescriptorScriptPubKeyMans(batch);
3629 : 434 : return true;
3630 [ # # ]: 0 : })) throw std::runtime_error("Error: cannot process db transaction for descriptors setup");
3631 : : } else {
3632 : 5 : auto signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
3633 [ + + + - : 5 : if (!signer) throw std::runtime_error(util::ErrorString(signer).original);
+ - ]
3634 : :
3635 : : // TODO: add account parameter
3636 : 3 : int account = 0;
3637 [ + - ]: 3 : UniValue signer_res = signer->GetDescriptors(account);
3638 : :
3639 [ - + - - : 3 : if (!signer_res.isObject()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
- - ]
3640 : :
3641 [ + - ]: 3 : WalletBatch batch(GetDatabase());
3642 [ + - - + : 3 : if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors import");
- - ]
3643 : :
3644 [ + + ]: 7 : for (bool internal : {false, true}) {
3645 [ + + + - ]: 8 : const UniValue& descriptor_vals = signer_res.find_value(internal ? "internal" : "receive");
3646 [ - + - - : 5 : if (!descriptor_vals.isArray()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
- - ]
3647 [ + - + - : 21 : for (const UniValue& desc_val : descriptor_vals.get_array().getValues()) {
+ + ]
3648 : 17 : const std::string& desc_str = desc_val.getValStr();
3649 : 17 : FlatSigningProvider keys;
3650 [ - + ]: 17 : std::string desc_error;
3651 [ - + + - ]: 17 : auto descs = Parse(desc_str, keys, desc_error, false);
3652 [ + + ]: 17 : if (descs.empty()) {
3653 [ + - + - : 5 : throw std::runtime_error(std::string(__func__) + ": Invalid descriptor \"" + desc_str + "\" (" + desc_error + ")");
+ - + - ]
3654 : : }
3655 [ + - ]: 16 : auto& desc = descs.at(0);
3656 [ + - - + ]: 16 : if (!desc->GetOutputType()) {
3657 : 0 : continue;
3658 : : }
3659 [ + - ]: 16 : OutputType t = *desc->GetOutputType();
3660 [ + - + - : 16 : auto spk_manager = std::unique_ptr<ExternalSignerScriptPubKeyMan>(new ExternalSignerScriptPubKeyMan(*this, m_keypool_size));
+ - ]
3661 [ + - ]: 16 : spk_manager->SetupDescriptor(batch, std::move(desc));
3662 [ + - ]: 16 : uint256 id = spk_manager->GetID();
3663 [ + - ]: 16 : AddScriptPubKeyMan(id, std::move(spk_manager));
3664 [ + - ]: 16 : AddActiveScriptPubKeyManWithDb(batch, id, t, internal);
3665 : 18 : }
3666 : : }
3667 : :
3668 : : // Ensure imported descriptors are committed to disk
3669 [ + - - + : 2 : if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors import");
- - ]
3670 : 3 : }
3671 : 436 : }
3672 : :
3673 : 372 : void CWallet::AddActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3674 : : {
3675 : 372 : WalletBatch batch(GetDatabase());
3676 [ + - ]: 372 : return AddActiveScriptPubKeyManWithDb(batch, id, type, internal);
3677 : 372 : }
3678 : :
3679 : 4102 : void CWallet::AddActiveScriptPubKeyManWithDb(WalletBatch& batch, uint256 id, OutputType type, bool internal)
3680 : : {
3681 [ - + ]: 4102 : if (!batch.WriteActiveScriptPubKeyMan(static_cast<uint8_t>(type), id, internal)) {
3682 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed");
3683 : : }
3684 : 4102 : LoadActiveScriptPubKeyMan(id, type, internal);
3685 : 4102 : }
3686 : :
3687 : 6256 : void CWallet::LoadActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3688 : : {
3689 : : // Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets.
3690 : : // Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types.
3691 [ - + ]: 6256 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3692 : :
3693 [ + + + - ]: 9425 : WalletLogPrintf("Setting spkMan to active: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3694 [ + + ]: 6256 : auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3695 : 6256 : auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers;
3696 : 6256 : auto spk_man = m_spk_managers.at(id).get();
3697 : 6256 : spk_mans[type] = spk_man;
3698 : :
3699 : 6256 : const auto it = spk_mans_other.find(type);
3700 [ + + + + ]: 6256 : if (it != spk_mans_other.end() && it->second == spk_man) {
3701 : 2 : spk_mans_other.erase(type);
3702 : : }
3703 : :
3704 : 6256 : NotifyCanGetAddressesChanged();
3705 : 6256 : }
3706 : :
3707 : 224 : void CWallet::DeactivateScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3708 : : {
3709 : 224 : auto spk_man = GetScriptPubKeyMan(type, internal);
3710 [ + + + + ]: 224 : if (spk_man != nullptr && spk_man->GetID() == id) {
3711 [ - + + - ]: 1 : WalletLogPrintf("Deactivate spkMan: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3712 : 1 : WalletBatch batch(GetDatabase());
3713 [ + - - + ]: 1 : if (!batch.EraseActiveScriptPubKeyMan(static_cast<uint8_t>(type), internal)) {
3714 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed");
3715 : : }
3716 : :
3717 [ + - ]: 1 : auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3718 : 1 : spk_mans.erase(type);
3719 : 1 : }
3720 : :
3721 : 224 : NotifyCanGetAddressesChanged();
3722 : 224 : }
3723 : :
3724 : 853 : DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const
3725 : : {
3726 : 853 : auto spk_man_pair = m_spk_managers.find(desc.id);
3727 : :
3728 [ + + ]: 853 : if (spk_man_pair != m_spk_managers.end()) {
3729 : : // Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match
3730 [ + - ]: 21 : DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair->second.get());
3731 [ + - + - ]: 21 : if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) {
3732 : 21 : return spk_manager;
3733 : : }
3734 : : }
3735 : :
3736 : : return nullptr;
3737 : : }
3738 : :
3739 : 29814 : std::optional<bool> CWallet::IsInternalScriptPubKeyMan(ScriptPubKeyMan* spk_man) const
3740 : : {
3741 : : // only active ScriptPubKeyMan can be internal
3742 [ + + ]: 29814 : if (!GetActiveScriptPubKeyMans().contains(spk_man)) {
3743 : 9859 : return std::nullopt;
3744 : : }
3745 : :
3746 [ + - ]: 19955 : const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man);
3747 [ - + ]: 19955 : if (!desc_spk_man) {
3748 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": unexpected ScriptPubKeyMan type.");
3749 : : }
3750 : :
3751 : 19955 : LOCK(desc_spk_man->cs_desc_man);
3752 [ + - + - ]: 19955 : const auto& type = desc_spk_man->GetWalletDescriptor().descriptor->GetOutputType();
3753 [ - + ]: 19955 : assert(type.has_value());
3754 : :
3755 [ + - + - ]: 19955 : return GetScriptPubKeyMan(*type, /* internal= */ true) == desc_spk_man;
3756 : 19955 : }
3757 : :
3758 : 853 : util::Result<std::reference_wrapper<DescriptorScriptPubKeyMan>> CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal)
3759 : : {
3760 : 853 : AssertLockHeld(cs_wallet);
3761 : :
3762 [ - + ]: 853 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3763 : :
3764 : 853 : auto spk_man = GetDescriptorScriptPubKeyMan(desc);
3765 [ + + ]: 853 : if (spk_man) {
3766 [ + - ]: 21 : WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString());
3767 [ + + ]: 21 : if (auto spkm_res = spk_man->UpdateWalletDescriptor(desc); !spkm_res) {
3768 [ + - ]: 9 : return util::Error{util::ErrorString(spkm_res)};
3769 : 21 : }
3770 : : } else {
3771 [ + - + - ]: 832 : auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size));
3772 [ + - ]: 832 : spk_man = new_spk_man.get();
3773 : :
3774 : : // Save the descriptor to memory
3775 [ + - ]: 832 : uint256 id = new_spk_man->GetID();
3776 [ + - ]: 832 : AddScriptPubKeyMan(id, std::move(new_spk_man));
3777 : 832 : }
3778 : :
3779 : : // Add the private keys to the descriptor
3780 [ + + ]: 1504 : for (const auto& entry : signing_provider.keys) {
3781 : 654 : const CKey& key = entry.second;
3782 : 654 : spk_man->AddDescriptorKey(key, key.GetPubKey());
3783 : : }
3784 : :
3785 : : // Top up key pool, the manager will generate new scriptPubKeys internally
3786 [ - + ]: 850 : if (!spk_man->TopUp()) {
3787 : 0 : return util::Error{_("Could not top up scriptPubKeys")};
3788 : : }
3789 : :
3790 : : // Apply the label if necessary
3791 : : // Note: we disable labels for ranged descriptors
3792 [ + + ]: 850 : if (!desc.descriptor->IsRange()) {
3793 : 335 : auto script_pub_keys = spk_man->GetScriptPubKeys();
3794 [ - + ]: 335 : if (script_pub_keys.empty()) {
3795 [ # # ]: 0 : return util::Error{_("Could not generate scriptPubKeys (cache is empty)")};
3796 : : }
3797 : :
3798 [ + + ]: 335 : if (!internal) {
3799 [ + + + - ]: 1221 : for (const auto& script : script_pub_keys) {
3800 : 886 : CTxDestination dest;
3801 [ + + + - ]: 886 : if (ExtractDestination(script, dest)) {
3802 [ + - ]: 692 : SetAddressBook(dest, label, AddressPurpose::RECEIVE);
3803 : : }
3804 : 886 : }
3805 : : }
3806 : 335 : }
3807 : :
3808 : : // Save the descriptor to DB
3809 : 850 : spk_man->WriteDescriptor();
3810 : :
3811 : : // Break balance caches so that outputs that are now IsMine in already known txs will be included in the balance
3812 : 850 : MarkDirty();
3813 : :
3814 : 850 : return std::reference_wrapper(*spk_man);
3815 : : }
3816 : :
3817 : 43 : bool CWallet::MigrateToSQLite(bilingual_str& error)
3818 : : {
3819 : 43 : AssertLockHeld(cs_wallet);
3820 : :
3821 : 43 : WalletLogPrintf("Migrating wallet storage database from BerkeleyDB to SQLite.\n");
3822 : :
3823 [ - + ]: 43 : if (m_database->Format() == "sqlite") {
3824 : 0 : error = _("Error: This wallet already uses SQLite");
3825 : 0 : return false;
3826 : : }
3827 : :
3828 : : // Get all of the records for DB type migration
3829 : 43 : std::unique_ptr<DatabaseBatch> batch = m_database->MakeBatch();
3830 [ + - ]: 43 : std::unique_ptr<DatabaseCursor> cursor = batch->GetNewCursor();
3831 : 43 : std::vector<std::pair<SerializeData, SerializeData>> records;
3832 [ - + ]: 43 : if (!cursor) {
3833 [ # # ]: 0 : error = _("Error: Unable to begin reading all records in the database");
3834 : 0 : return false;
3835 : : }
3836 : 1222 : DatabaseCursor::Status status = DatabaseCursor::Status::FAIL;
3837 : 2401 : while (true) {
3838 : 1222 : DataStream ss_key{};
3839 : 1222 : DataStream ss_value{};
3840 [ + - ]: 1222 : status = cursor->Next(ss_key, ss_value);
3841 [ + + ]: 1222 : if (status != DatabaseCursor::Status::MORE) {
3842 : : break;
3843 : : }
3844 [ + - ]: 1179 : SerializeData key(ss_key.begin(), ss_key.end());
3845 [ + - ]: 1179 : SerializeData value(ss_value.begin(), ss_value.end());
3846 [ + - ]: 1179 : records.emplace_back(key, value);
3847 : 1222 : }
3848 [ + - ]: 43 : cursor.reset();
3849 [ + - ]: 43 : batch.reset();
3850 [ - + ]: 43 : if (status != DatabaseCursor::Status::DONE) {
3851 [ # # ]: 0 : error = _("Error: Unable to read all records in the database");
3852 : 0 : return false;
3853 : : }
3854 : :
3855 : : // Close this database and delete the file
3856 [ + - + - ]: 43 : fs::path db_path = fs::PathFromString(m_database->Filename());
3857 [ + - ]: 43 : m_database->Close();
3858 [ + - ]: 43 : fs::remove(db_path);
3859 : :
3860 : : // Generate the path for the location of the migrated wallet
3861 : : // Wallets that are plain files rather than wallet directories will be migrated to be wallet directories.
3862 [ + - + - : 86 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(m_name));
+ - ]
3863 : :
3864 : : // Make new DB
3865 [ + - ]: 43 : DatabaseOptions opts;
3866 : 43 : opts.require_create = true;
3867 : 43 : opts.require_format = DatabaseFormat::SQLITE;
3868 : 43 : DatabaseStatus db_status;
3869 [ + - ]: 43 : std::unique_ptr<WalletDatabase> new_db = MakeDatabase(wallet_path, opts, db_status, error);
3870 [ - + ]: 43 : assert(new_db); // This is to prevent doing anything further with this wallet. The original file was deleted, but a backup exists.
3871 [ + - ]: 43 : m_database.reset();
3872 : 43 : m_database = std::move(new_db);
3873 : :
3874 : : // Write existing records into the new DB
3875 [ + - ]: 86 : batch = m_database->MakeBatch();
3876 [ + - ]: 43 : bool began = batch->TxnBegin();
3877 [ - + ]: 43 : assert(began); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3878 [ - + + + ]: 1222 : for (const auto& [key, value] : records) {
3879 [ - + - + : 1179 : if (!batch->Write(std::span{key}, std::span{value})) {
+ - - + ]
3880 [ # # ]: 0 : batch->TxnAbort();
3881 [ # # ]: 0 : m_database->Close();
3882 [ # # # # : 0 : fs::remove(m_database->Filename());
# # ]
3883 : 0 : assert(false); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3884 : : }
3885 : : }
3886 [ + - ]: 43 : bool committed = batch->TxnCommit();
3887 [ - + ]: 43 : assert(committed); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3888 : 43 : return true;
3889 : 129 : }
3890 : :
3891 : 40 : std::optional<MigrationData> CWallet::GetDescriptorsForLegacy(bilingual_str& error) const
3892 : : {
3893 : 40 : AssertLockHeld(cs_wallet);
3894 : :
3895 : 40 : LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3896 [ - + ]: 40 : if (!Assume(legacy_spkm)) {
3897 : : // This shouldn't happen
3898 [ # # ]: 0 : error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));
3899 : 0 : return std::nullopt;
3900 : : }
3901 : :
3902 : 40 : std::optional<MigrationData> res = legacy_spkm->MigrateToDescriptor();
3903 [ - + ]: 40 : if (res == std::nullopt) {
3904 [ # # ]: 0 : error = _("Error: Unable to produce descriptors for this legacy wallet. Make sure to provide the wallet's passphrase if it is encrypted.");
3905 : 0 : return std::nullopt;
3906 : : }
3907 : 40 : return res;
3908 : 40 : }
3909 : :
3910 : 34 : util::Result<void> CWallet::ApplyMigrationData(WalletBatch& local_wallet_batch, MigrationData& data)
3911 : : {
3912 : 34 : AssertLockHeld(cs_wallet);
3913 : :
3914 : 34 : LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3915 [ - + ]: 34 : if (!Assume(legacy_spkm)) {
3916 : : // This shouldn't happen
3917 [ # # ]: 0 : return util::Error{Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"))};
3918 : : }
3919 : :
3920 : : // Note: when the legacy wallet has no spendable scripts, it must be empty at the end of the process.
3921 [ + + - + ]: 34 : bool has_spendable_material = !data.desc_spkms.empty() || data.master_key.key.IsValid();
3922 : :
3923 : : // Get all invalid or non-watched scripts that will not be migrated
3924 [ + - ]: 34 : std::set<CTxDestination> not_migrated_dests;
3925 [ + - + + : 38 : for (const auto& script : legacy_spkm->GetNotMineScriptPubKeys()) {
+ - ]
3926 : 4 : CTxDestination dest;
3927 [ + - + - : 4 : if (ExtractDestination(script, dest)) not_migrated_dests.emplace(dest);
+ - ]
3928 : 4 : }
3929 : :
3930 : : // When the legacy wallet has no spendable scripts, the main wallet will be empty, leaving its script cache empty as well.
3931 : : // The watch-only and/or solvable wallet(s) will contain the scripts in their respective caches.
3932 [ + + ]: 34 : if (!data.desc_spkms.empty()) Assume(!m_cached_spks.empty());
3933 [ + + ]: 34 : if (!data.watch_descs.empty()) Assume(!data.watchonly_wallet->m_cached_spks.empty());
3934 [ + + ]: 34 : if (!data.solvable_descs.empty()) Assume(!data.solvable_wallet->m_cached_spks.empty());
3935 : :
3936 [ + + ]: 153 : for (auto& desc_spkm : data.desc_spkms) {
3937 [ + - - + ]: 119 : if (m_spk_managers.contains(desc_spkm->GetID())) {
3938 [ # # ]: 0 : return util::Error{_("Error: Duplicate descriptors created during migration. Your wallet may be corrupted.")};
3939 : : }
3940 [ + - ]: 119 : uint256 id = desc_spkm->GetID();
3941 [ + - ]: 119 : AddScriptPubKeyMan(id, std::move(desc_spkm));
3942 : : }
3943 : :
3944 : : // Remove the LegacyScriptPubKeyMan from disk
3945 [ + - - + ]: 34 : if (!legacy_spkm->DeleteRecordsWithDB(local_wallet_batch)) {
3946 [ # # ]: 0 : return util::Error{_("Error: cannot remove legacy wallet records")};
3947 : : }
3948 : :
3949 : : // Remove the LegacyScriptPubKeyMan from memory
3950 [ + - ]: 34 : m_spk_managers.erase(legacy_spkm->GetID());
3951 : 34 : m_external_spk_managers.clear();
3952 : 34 : m_internal_spk_managers.clear();
3953 : :
3954 : : // Setup new descriptors (only if we are migrating any key material)
3955 [ + - ]: 34 : SetWalletFlagWithDB(local_wallet_batch, WALLET_FLAG_DESCRIPTORS | WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
3956 [ + + + - : 34 : if (has_spendable_material && !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
+ + ]
3957 : : // Use the existing master key if we have it
3958 [ + + ]: 29 : if (data.master_key.key.IsValid()) {
3959 [ + - ]: 28 : SetupDescriptorScriptPubKeyMans(local_wallet_batch, data.master_key);
3960 : : } else {
3961 : : // Setup with a new seed if we don't.
3962 [ + - ]: 1 : SetupOwnDescriptorScriptPubKeyMans(local_wallet_batch);
3963 : : }
3964 : : }
3965 : :
3966 : : // Get best block locator so that we can copy it to the watchonly and solvables
3967 : 34 : CBlockLocator best_block_locator;
3968 [ + - - + ]: 34 : if (!local_wallet_batch.ReadBestBlock(best_block_locator)) {
3969 [ # # ]: 0 : return util::Error{_("Error: Unable to read wallet's best block locator record")};
3970 : : }
3971 : :
3972 : : // Update m_txos to match the descriptors remaining in this wallet
3973 : 34 : m_txos.clear();
3974 [ + - ]: 34 : RefreshAllTXOs();
3975 : :
3976 : : // Check if the transactions in the wallet are still ours. Either they belong here, or they belong in the watchonly wallet.
3977 : : // We need to go through these in the tx insertion order so that lookups to spends works.
3978 : 34 : std::vector<Txid> txids_to_delete;
3979 : 34 : std::unique_ptr<WalletBatch> watchonly_batch;
3980 [ + + ]: 34 : if (data.watchonly_wallet) {
3981 [ + - ]: 22 : watchonly_batch = std::make_unique<WalletBatch>(data.watchonly_wallet->GetDatabase());
3982 [ + - - + : 11 : if (!watchonly_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.watchonly_wallet->GetName())};
- - ]
3983 : : // Copy the next tx order pos to the watchonly wallet
3984 [ + - ]: 11 : LOCK(data.watchonly_wallet->cs_wallet);
3985 [ + - ]: 11 : data.watchonly_wallet->nOrderPosNext = nOrderPosNext;
3986 [ + - ]: 11 : watchonly_batch->WriteOrderPosNext(data.watchonly_wallet->nOrderPosNext);
3987 : : // Write the best block locator to avoid rescanning on reload
3988 [ + - - + ]: 11 : if (!watchonly_batch->WriteBestBlock(best_block_locator)) {
3989 [ # # # # ]: 0 : return util::Error{_("Error: Unable to write watchonly wallet best block locator record")};
3990 : : }
3991 : 11 : }
3992 : 34 : std::unique_ptr<WalletBatch> solvables_batch;
3993 [ + + ]: 34 : if (data.solvable_wallet) {
3994 [ + - ]: 10 : solvables_batch = std::make_unique<WalletBatch>(data.solvable_wallet->GetDatabase());
3995 [ + - - + : 5 : if (!solvables_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.solvable_wallet->GetName())};
- - ]
3996 : : // Write the best block locator to avoid rescanning on reload
3997 [ + - - + ]: 5 : if (!solvables_batch->WriteBestBlock(best_block_locator)) {
3998 [ # # ]: 0 : return util::Error{_("Error: Unable to write solvable wallet best block locator record")};
3999 : : }
4000 : : }
4001 [ + - + + ]: 91 : for (const auto& [_pos, wtx] : wtxOrdered) {
4002 : : // Check it is the watchonly wallet's
4003 : : // solvable_wallet doesn't need to be checked because transactions for those scripts weren't being watched for
4004 [ + - + + : 57 : bool is_mine = IsMine(*wtx->tx) || IsFromMe(*wtx->tx);
+ - + + ]
4005 [ + + ]: 57 : if (data.watchonly_wallet) {
4006 [ + - ]: 22 : LOCK(data.watchonly_wallet->cs_wallet);
4007 [ + - + + : 22 : if (data.watchonly_wallet->IsMine(*wtx->tx) || data.watchonly_wallet->IsFromMe(*wtx->tx)) {
+ - + + ]
4008 : : // Add to watchonly wallet
4009 [ + - ]: 14 : const Txid& hash = wtx->GetHash();
4010 : 14 : const CWalletTx& to_copy_wtx = *wtx;
4011 [ + - - + ]: 14 : if (!data.watchonly_wallet->LoadToWallet(hash, [&](CWalletTx& ins_wtx, bool new_tx) EXCLUSIVE_LOCKS_REQUIRED(data.watchonly_wallet->cs_wallet) {
4012 [ + - ]: 14 : if (!new_tx) return false;
4013 [ + - - + ]: 28 : ins_wtx.SetTx(to_copy_wtx.tx);
4014 : 14 : ins_wtx.CopyFrom(to_copy_wtx);
4015 : 14 : return true;
4016 : : })) {
4017 [ # # # # : 0 : return util::Error{strprintf(_("Error: Could not add watchonly tx %s to watchonly wallet"), wtx->GetHash().GetHex())};
# # ]
4018 : : }
4019 [ + - + - ]: 14 : watchonly_batch->WriteTx(data.watchonly_wallet->mapWallet.at(hash));
4020 : : // Mark as to remove from the migrated wallet only if it does not also belong to it
4021 [ + + ]: 14 : if (!is_mine) {
4022 [ + - ]: 11 : txids_to_delete.push_back(hash);
4023 [ + - ]: 11 : continue;
4024 : : }
4025 : : }
4026 : 22 : }
4027 [ - + ]: 46 : if (!is_mine) {
4028 : : // Both not ours and not in the watchonly wallet
4029 [ # # # # ]: 0 : return util::Error{strprintf(_("Error: Transaction %s in wallet cannot be identified to belong to migrated wallets"), wtx->GetHash().GetHex())};
4030 : : }
4031 : : // Rewrite the transaction so that anything that may have changed about it in memory also persists to disk
4032 [ + - ]: 46 : local_wallet_batch.WriteTx(*wtx);
4033 : : }
4034 : :
4035 : : // Do the removes
4036 [ - + + + ]: 34 : if (txids_to_delete.size() > 0) {
4037 [ + - - + ]: 6 : if (auto res = RemoveTxs(local_wallet_batch, txids_to_delete); !res) {
4038 [ # # # # ]: 0 : return util::Error{_("Error: Could not delete watchonly transactions. ") + util::ErrorString(res)};
4039 : 6 : }
4040 : : }
4041 : :
4042 : : // Pair external wallets with their corresponding db handler
4043 : 34 : std::vector<std::pair<std::shared_ptr<CWallet>, std::unique_ptr<WalletBatch>>> wallets_vec;
4044 [ + + + - ]: 34 : if (data.watchonly_wallet) wallets_vec.emplace_back(data.watchonly_wallet, std::move(watchonly_batch));
4045 [ + + + - ]: 34 : if (data.solvable_wallet) wallets_vec.emplace_back(data.solvable_wallet, std::move(solvables_batch));
4046 : :
4047 : : // Write address book entry to disk
4048 : 92 : auto func_store_addr = [](WalletBatch& batch, const CTxDestination& dest, const CAddressBookData& entry) {
4049 : 58 : auto address{EncodeDestination(dest)};
4050 [ + - + - : 116 : if (entry.purpose) batch.WritePurpose(address, PurposeToString(*entry.purpose));
+ - ]
4051 [ + - + - ]: 58 : if (entry.label) batch.WriteName(address, *entry.label);
4052 [ - - - + ]: 58 : for (const auto& [id, request] : entry.receive_requests) {
4053 [ # # ]: 0 : batch.WriteAddressReceiveRequest(dest, id, request);
4054 : : }
4055 [ + + + - ]: 58 : if (entry.previously_spent) batch.WriteAddressPreviouslySpent(dest, true);
4056 : 58 : };
4057 : :
4058 : : // Check the address book data in the same way we did for transactions
4059 : 34 : std::vector<CTxDestination> dests_to_delete;
4060 [ + - + + ]: 121 : for (const auto& [dest, record] : m_address_book) {
4061 : : // Ensure "receive" entries that are no longer part of the original wallet are transferred to another wallet
4062 : : // Entries for everything else ("send") will be cloned to all wallets.
4063 [ + - + - : 167 : bool require_transfer = record.purpose == AddressPurpose::RECEIVE && !IsMine(dest);
+ + ]
4064 : 87 : bool copied = false;
4065 [ + - + + ]: 123 : for (auto& [wallet, batch] : wallets_vec) {
4066 [ + - ]: 59 : LOCK(wallet->cs_wallet);
4067 [ + + + - : 59 : if (require_transfer && !wallet->IsMine(dest)) continue;
+ + + - ]
4068 : :
4069 : : // Copy the entire address book entry
4070 [ + - + - ]: 58 : wallet->m_address_book[dest] = record;
4071 [ + - ]: 58 : func_store_addr(*batch, dest, record);
4072 : :
4073 : 58 : copied = true;
4074 : : // Only delete 'receive' records that are no longer part of the original wallet
4075 [ + + ]: 58 : if (require_transfer) {
4076 [ + - ]: 23 : dests_to_delete.push_back(dest);
4077 [ + - ]: 23 : break;
4078 : : }
4079 : 59 : }
4080 : :
4081 : : // Fail immediately if we ever found an entry that was ours and cannot be transferred
4082 : : // to any of the created wallets (watch-only, solvable).
4083 : : // Means that no inferred descriptor maps to the stored entry. Which mustn't happen.
4084 [ + + ]: 87 : if (require_transfer && !copied) {
4085 : :
4086 : : // Skip invalid/non-watched scripts that will not be migrated
4087 [ + - ]: 4 : if (not_migrated_dests.contains(dest)) {
4088 [ + - ]: 4 : dests_to_delete.push_back(dest);
4089 : 4 : continue;
4090 : : }
4091 : :
4092 [ # # ]: 0 : return util::Error{_("Error: Address book data in wallet cannot be identified to belong to migrated wallets")};
4093 : : }
4094 : : }
4095 : :
4096 : : // Persist external wallets address book entries
4097 [ + - + + ]: 50 : for (auto& [wallet, batch] : wallets_vec) {
4098 [ + - - + ]: 16 : if (!batch->TxnCommit()) {
4099 [ # # ]: 0 : return util::Error{strprintf(_("Error: Unable to write data to disk for wallet %s"), wallet->GetName())};
4100 : : }
4101 : : }
4102 : :
4103 : : // Remove the things to delete in this wallet
4104 [ - + + + ]: 34 : if (dests_to_delete.size() > 0) {
4105 [ + + ]: 38 : for (const auto& dest : dests_to_delete) {
4106 [ + - - + ]: 27 : if (!DelAddressBookWithDB(local_wallet_batch, dest)) {
4107 [ # # ]: 0 : return util::Error{_("Error: Unable to remove watchonly address book data")};
4108 : : }
4109 : : }
4110 : : }
4111 : :
4112 : : // If there was no key material in the main wallet, there should be no records on it anymore.
4113 : : // This wallet will be discarded at the end of the process. Only wallets that contain the
4114 : : // migrated records will be presented to the user.
4115 [ + + ]: 34 : if (!has_spendable_material) {
4116 [ - + - - ]: 3 : if (!m_address_book.empty()) return util::Error{_("Error: Not all address book records were migrated")};
4117 [ - + - - ]: 3 : if (!mapWallet.empty()) return util::Error{_("Error: Not all transaction records were migrated")};
4118 : : }
4119 : :
4120 : 34 : return {}; // all good
4121 : 102 : }
4122 : :
4123 : 144630 : bool CWallet::CanGrindR() const
4124 : : {
4125 : 144630 : return !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS);
4126 : : }
4127 : :
4128 : : // Returns wallet prefix for migration.
4129 : : // Used to name the backup file and newly created wallets.
4130 : : // E.g. a watch-only wallet is named "<prefix>_watchonly".
4131 : 28 : static std::string MigrationPrefixName(CWallet& wallet)
4132 : : {
4133 [ + + ]: 28 : const std::string& name{wallet.GetName()};
4134 [ + + ]: 28 : return name.empty() ? "default_wallet" : name;
4135 : : }
4136 : :
4137 : 40 : bool DoMigration(CWallet& wallet, WalletContext& context, bilingual_str& error, MigrationResult& res) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet)
4138 : : {
4139 : 40 : AssertLockHeld(wallet.cs_wallet);
4140 : :
4141 : : // Get all of the descriptors from the legacy wallet
4142 : 40 : std::optional<MigrationData> data = wallet.GetDescriptorsForLegacy(error);
4143 [ + - ]: 40 : if (data == std::nullopt) return false;
4144 : :
4145 : : // Create the watchonly and solvable wallets if necessary
4146 [ - + + + : 40 : if (data->watch_descs.size() > 0 || data->solvable_descs.size() > 0) {
- + + + ]
4147 [ + - ]: 18 : DatabaseOptions options;
4148 : 18 : options.require_existing = false;
4149 : 18 : options.require_create = true;
4150 : 18 : options.require_format = DatabaseFormat::SQLITE;
4151 : :
4152 [ + - ]: 18 : WalletContext empty_context;
4153 : 18 : empty_context.args = context.args;
4154 : :
4155 : : // Make the wallets
4156 : 18 : options.create_flags = WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET | WALLET_FLAG_DESCRIPTORS;
4157 [ + - + + ]: 18 : if (wallet.IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
4158 : 1 : options.create_flags |= WALLET_FLAG_AVOID_REUSE;
4159 : : }
4160 [ + - + + ]: 18 : if (wallet.IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
4161 : 14 : options.create_flags |= WALLET_FLAG_KEY_ORIGIN_METADATA;
4162 : : }
4163 [ - + + + ]: 18 : if (data->watch_descs.size() > 0) {
4164 [ + - ]: 17 : wallet.WalletLogPrintf("Making a new watchonly wallet containing the watched scripts\n");
4165 : :
4166 : 17 : DatabaseStatus status;
4167 : 17 : std::vector<bilingual_str> warnings;
4168 [ + - ]: 34 : std::string wallet_name = MigrationPrefixName(wallet) + "_watchonly";
4169 [ + - ]: 17 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4170 [ + + ]: 17 : if (!database) {
4171 [ + - ]: 4 : error = strprintf(_("Wallet file creation failed: %s"), error);
4172 : 4 : return false;
4173 : : }
4174 : :
4175 [ + - - + ]: 13 : data->watchonly_wallet = CWallet::CreateNew(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4176 [ - + ]: 13 : if (!data->watchonly_wallet) {
4177 [ # # ]: 0 : error = _("Error: Failed to create new watchonly wallet");
4178 : 0 : return false;
4179 : : }
4180 : 13 : res.watchonly_wallet = data->watchonly_wallet;
4181 [ + - ]: 13 : LOCK(data->watchonly_wallet->cs_wallet);
4182 : :
4183 : : // Parse the descriptors and add them to the new wallet
4184 [ + + ]: 50 : for (const auto& [desc_str, creation_time] : data->watch_descs) {
4185 : : // Parse the descriptor
4186 : 37 : FlatSigningProvider keys;
4187 [ - + ]: 37 : std::string parse_err;
4188 [ - + + - ]: 37 : std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /*require_checksum=*/ true);
4189 [ - + - + ]: 37 : assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4190 [ + - + - : 37 : assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
- + ]
4191 : :
4192 : : // Add to the wallet
4193 [ + - + - : 37 : WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
+ - ]
4194 [ + - + - : 74 : if (auto spkm_res = data->watchonly_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
- + ]
4195 [ # # # # ]: 0 : throw std::runtime_error(util::ErrorString(spkm_res).original);
4196 : 0 : }
4197 : 37 : }
4198 : :
4199 : : // Add the wallet to settings
4200 [ + - ]: 13 : UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4201 : 17 : }
4202 [ - + + + ]: 14 : if (data->solvable_descs.size() > 0) {
4203 [ + - ]: 7 : wallet.WalletLogPrintf("Making a new watchonly wallet containing the unwatched solvable scripts\n");
4204 : :
4205 : 7 : DatabaseStatus status;
4206 : 7 : std::vector<bilingual_str> warnings;
4207 [ + - ]: 14 : std::string wallet_name = MigrationPrefixName(wallet) + "_solvables";
4208 [ + - ]: 7 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4209 [ + + ]: 7 : if (!database) {
4210 [ + - ]: 2 : error = strprintf(_("Wallet file creation failed: %s"), error);
4211 : 2 : return false;
4212 : : }
4213 : :
4214 [ + - - + ]: 5 : data->solvable_wallet = CWallet::CreateNew(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4215 [ - + ]: 5 : if (!data->solvable_wallet) {
4216 [ # # ]: 0 : error = _("Error: Failed to create new watchonly wallet");
4217 : 0 : return false;
4218 : : }
4219 : 5 : res.solvables_wallet = data->solvable_wallet;
4220 [ + - ]: 5 : LOCK(data->solvable_wallet->cs_wallet);
4221 : :
4222 : : // Parse the descriptors and add them to the new wallet
4223 [ + + ]: 17 : for (const auto& [desc_str, creation_time] : data->solvable_descs) {
4224 : : // Parse the descriptor
4225 : 12 : FlatSigningProvider keys;
4226 [ - + ]: 12 : std::string parse_err;
4227 [ - + + - ]: 12 : std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /*require_checksum=*/ true);
4228 [ - + - + ]: 12 : assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4229 [ + - + - : 12 : assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
- + ]
4230 : :
4231 : : // Add to the wallet
4232 [ + - + - : 12 : WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
+ - ]
4233 [ + - + - : 24 : if (auto spkm_res = data->solvable_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
- + ]
4234 [ # # # # ]: 0 : throw std::runtime_error(util::ErrorString(spkm_res).original);
4235 : 0 : }
4236 : 12 : }
4237 : :
4238 : : // Add the wallet to settings
4239 [ + - ]: 5 : UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4240 : 7 : }
4241 : 18 : }
4242 : :
4243 : : // Add the descriptors to wallet, remove LegacyScriptPubKeyMan, and cleanup txs and address book data
4244 [ + - + - ]: 34 : return RunWithinTxn(wallet.GetDatabase(), /*process_desc=*/"apply migration process", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet){
4245 [ - + ]: 34 : if (auto res_migration = wallet.ApplyMigrationData(batch, *data); !res_migration) {
4246 [ # # ]: 0 : error = util::ErrorString(res_migration);
4247 : 0 : return false;
4248 : 0 : }
4249 : 34 : wallet.WalletLogPrintf("Wallet migration complete.\n");
4250 : 34 : return true;
4251 : : });
4252 : 40 : }
4253 : :
4254 : 49 : util::Result<MigrationResult> MigrateLegacyToDescriptor(const std::string& wallet_name, const SecureString& passphrase, WalletContext& context)
4255 : : {
4256 : 49 : std::vector<bilingual_str> warnings;
4257 [ + - ]: 49 : bilingual_str error;
4258 : :
4259 : : // The only kind of wallets that could be loaded are descriptor ones, which don't need to be migrated.
4260 [ + - + + ]: 49 : if (auto wallet = GetWallet(context, wallet_name)) {
4261 [ + - - + ]: 1 : assert(wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4262 [ + - ]: 3 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4263 : : } else {
4264 : : // Check if the wallet is BDB
4265 [ + - - + ]: 94 : const auto& wallet_path = GetWalletPath(wallet_name);
4266 [ - + ]: 48 : if (!wallet_path) {
4267 [ # # ]: 0 : return util::Error{util::ErrorString(wallet_path)};
4268 : : }
4269 [ + - + + ]: 48 : if (!fs::exists(*wallet_path)) {
4270 [ + - ]: 3 : return util::Error{_("Error: Wallet does not exist")};
4271 : : }
4272 [ + - + - : 94 : if (!IsBDBFile(BDBDataFile(*wallet_path))) {
+ + ]
4273 [ + - ]: 3 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4274 : : }
4275 : 3 : }
4276 : :
4277 : : // Load the wallet but only in the context of this function.
4278 : : // No signals should be connected nor should anything else be aware of this wallet
4279 [ + - ]: 46 : WalletContext empty_context;
4280 : 46 : empty_context.args = context.args;
4281 [ + - ]: 46 : DatabaseOptions options;
4282 : 46 : options.require_existing = true;
4283 : 46 : options.require_format = DatabaseFormat::BERKELEY_RO;
4284 : 46 : DatabaseStatus status;
4285 [ + - ]: 46 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4286 [ - + ]: 46 : if (!database) {
4287 [ # # # # : 0 : return util::Error{Untranslated("Wallet file verification failed.") + Untranslated(" ") + error};
# # # # #
# ]
4288 : : }
4289 : :
4290 : : // Make the local wallet
4291 [ + - ]: 46 : std::shared_ptr<CWallet> local_wallet = CWallet::LoadExisting(empty_context, wallet_name, std::move(database), error, warnings);
4292 [ - + ]: 46 : if (!local_wallet) {
4293 [ # # # # : 0 : return util::Error{Untranslated("Wallet loading failed.") + Untranslated(" ") + error};
# # # # #
# ]
4294 : : }
4295 : :
4296 [ + - ]: 92 : return MigrateLegacyToDescriptor(std::move(local_wallet), passphrase, context);
4297 : 95 : }
4298 : :
4299 : 46 : util::Result<MigrationResult> MigrateLegacyToDescriptor(std::shared_ptr<CWallet> local_wallet, const SecureString& passphrase, WalletContext& context)
4300 : : {
4301 : 46 : MigrationResult res;
4302 [ - + ]: 46 : bilingual_str error;
4303 : 46 : std::vector<bilingual_str> warnings;
4304 : :
4305 [ - + ]: 46 : DatabaseOptions options;
4306 : 46 : options.require_existing = true;
4307 : 46 : DatabaseStatus status;
4308 : :
4309 [ - + ]: 46 : const std::string wallet_name = local_wallet->GetName();
4310 : :
4311 : : // Before anything else, check if there is something to migrate.
4312 [ + - - + ]: 46 : if (local_wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4313 [ # # ]: 0 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4314 : : }
4315 : :
4316 : : // Make a backup of the DB in the wallet's directory with a unique filename
4317 : : // using the wallet name and current timestamp. The backup filename is based
4318 : : // on the name of the parent directory containing the wallet data in most
4319 : : // cases, but in the case where the wallet name is a path to a data file,
4320 : : // the name of the data file is used, and in the case where the wallet name
4321 : : // is blank, "default_wallet" is used.
4322 [ + + ]: 46 : const std::string backup_prefix = wallet_name.empty() ? MigrationPrefixName(*local_wallet) : [&] {
4323 : : // fs::weakly_canonical resolves relative specifiers and remove trailing slashes.
4324 [ + - + - ]: 168 : const auto legacy_wallet_path = fs::weakly_canonical(GetWalletDir() / fs::PathFromString(wallet_name));
4325 [ + - - + ]: 210 : return fs::PathToString(legacy_wallet_path.filename());
4326 [ + - + - ]: 88 : }();
4327 : :
4328 [ + - + - : 46 : fs::path backup_filename = fs::PathFromString(strprintf("%s_%d.legacy.bak", backup_prefix, GetTime()));
+ - ]
4329 [ + - + - ]: 46 : fs::path backup_path = fsbridge::AbsPathJoin(GetWalletDir(), backup_filename);
4330 [ - + + - : 92 : if (!local_wallet->BackupWallet(fs::PathToString(backup_path))) {
- + ]
4331 [ # # ]: 0 : return util::Error{_("Error: Unable to make a backup of your wallet")};
4332 : : }
4333 [ + - ]: 46 : res.backup_path = backup_path;
4334 : :
4335 : 46 : bool success = false;
4336 : :
4337 : : // Unlock the wallet if needed
4338 [ + - + + : 46 : if (local_wallet->IsLocked() && !local_wallet->Unlock(passphrase)) {
+ - + + ]
4339 [ + + ]: 3 : if (passphrase.find('\0') == std::string::npos) {
4340 [ + - + - ]: 6 : return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase was not provided or was incorrect.")};
4341 : : } else {
4342 [ + - + - ]: 2 : return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase entered was incorrect. "
4343 : : "The passphrase contains a null character (ie - a zero byte). "
4344 : : "If this passphrase was set with a version of this software prior to 25.0, "
4345 : : "please try again with only the characters up to — but not including — "
4346 : 1 : "the first null character.")};
4347 : : }
4348 : : }
4349 : :
4350 : : // Indicates whether the current wallet is empty after migration.
4351 : : // Notes:
4352 : : // When non-empty: the local wallet becomes the main spendable wallet.
4353 : : // When empty: The local wallet is excluded from the result, as the
4354 : : // user does not expect an empty spendable wallet after
4355 : : // migrating only watch-only scripts.
4356 : 43 : bool empty_local_wallet = false;
4357 : :
4358 : 43 : {
4359 [ + - ]: 43 : LOCK(local_wallet->cs_wallet);
4360 : : // First change to using SQLite
4361 [ + - - + : 43 : if (!local_wallet->MigrateToSQLite(error)) return util::Error{error};
- - - - ]
4362 : :
4363 : : // Do the migration of keys and scripts for non-empty wallets, and cleanup if it fails
4364 [ + - + + ]: 43 : if (HasLegacyRecords(*local_wallet)) {
4365 [ + - ]: 40 : success = DoMigration(*local_wallet, context, error, res);
4366 : : // No scripts mean empty wallet after migration
4367 [ + - ]: 40 : empty_local_wallet = local_wallet->GetAllScriptPubKeyMans().empty();
4368 : : } else {
4369 : : // Make sure that descriptors flag is actually set
4370 [ + - ]: 3 : local_wallet->SetWalletFlag(WALLET_FLAG_DESCRIPTORS);
4371 : : success = true;
4372 : : }
4373 : 0 : }
4374 : :
4375 : : // In case of loading failure, we need to remember the wallet files we have created to remove.
4376 : : // A `set` is used as it may be populated with the same wallet directory paths multiple times,
4377 : : // both before and after loading. This ensures the set is complete even if one of the wallets
4378 : : // fails to load.
4379 [ + + ]: 43 : std::set<fs::path> wallet_files_to_remove;
4380 : 43 : std::set<fs::path> wallet_empty_dirs_to_remove;
4381 : :
4382 : : // Helper to track wallet files and directories for cleanup on failure.
4383 : : // Only directories of wallets created during migration (not the main wallet) are tracked.
4384 : 101 : auto track_for_cleanup = [&](const CWallet& wallet) {
4385 : 58 : const auto files = wallet.GetDatabase().Files();
4386 [ + - ]: 58 : wallet_files_to_remove.insert(files.begin(), files.end());
4387 [ + + ]: 58 : if (wallet.GetName() != wallet_name) {
4388 : : // If this isn’t the main wallet, mark its directory for removal.
4389 : : // This applies to the watch-only and solvable wallets.
4390 : : // Wallets stored directly as files in the top-level directory
4391 : : // (e.g. default unnamed wallets) don’t have a removable parent directory.
4392 [ + - + - : 90 : wallet_empty_dirs_to_remove.insert(fs::PathFromString(wallet.GetDatabase().Filename()).parent_path());
+ - + - ]
4393 : : }
4394 : 58 : };
4395 : :
4396 : :
4397 [ + + ]: 43 : if (success) {
4398 [ + + ]: 37 : Assume(!res.wallet); // We will set it here.
4399 : : // Check if the local wallet is empty after migration
4400 [ + + ]: 37 : if (empty_local_wallet) {
4401 : : // This wallet has no records. We can safely remove it.
4402 [ + - ]: 3 : std::vector<fs::path> paths_to_remove = local_wallet->GetDatabase().Files();
4403 : 3 : local_wallet.reset();
4404 [ + - + + ]: 9 : for (const auto& path_to_remove : paths_to_remove) fs::remove(path_to_remove);
4405 : 3 : }
4406 : :
4407 [ + - ]: 37 : LogInfo("Loading new wallets after migration...\n");
4408 : : // Migration successful, load all the migrated wallets.
4409 [ + + ]: 142 : for (std::shared_ptr<CWallet>* wallet_ptr : {&local_wallet, &res.watchonly_wallet, &res.solvables_wallet}) {
4410 [ + + ]: 107 : if (success && *wallet_ptr) {
4411 : 50 : std::shared_ptr<CWallet>& wallet = *wallet_ptr;
4412 : : // Track db path and load wallet
4413 [ + - ]: 50 : track_for_cleanup(*wallet);
4414 [ - + ]: 50 : assert(wallet.use_count() == 1);
4415 [ - + ]: 50 : std::string wallet_name = wallet->GetName();
4416 : 50 : wallet.reset();
4417 [ + - - + ]: 100 : wallet = LoadWallet(context, wallet_name, /*load_on_start=*/std::nullopt, options, status, error, warnings);
4418 [ + + ]: 50 : if (!wallet) {
4419 [ + - ]: 2 : LogError("Failed to load wallet '%s' after migration. Rolling back migration to preserve consistency. "
4420 : : "Error cause: %s\n", wallet_name, error.original);
4421 : 2 : success = false;
4422 : 2 : break;
4423 : : }
4424 : :
4425 : : // Set the first successfully loaded wallet as the main one.
4426 : : // The loop order is intentional and must always start with the local wallet.
4427 [ + + ]: 48 : if (!res.wallet) {
4428 [ + - ]: 35 : res.wallet_name = wallet->GetName();
4429 : 35 : res.wallet = std::move(wallet);
4430 : : }
4431 : 48 : }
4432 : : }
4433 : : }
4434 : 2 : if (!success) {
4435 : : // Make list of wallets to cleanup
4436 : 8 : std::vector<std::shared_ptr<CWallet>> created_wallets;
4437 [ + + + - ]: 8 : if (local_wallet) created_wallets.push_back(std::move(local_wallet));
4438 [ + + + - ]: 8 : if (res.watchonly_wallet) created_wallets.push_back(std::move(res.watchonly_wallet));
4439 [ - + - - ]: 8 : if (res.solvables_wallet) created_wallets.push_back(std::move(res.solvables_wallet));
4440 : :
4441 : : // Get the directories to remove after unloading
4442 [ + + ]: 16 : for (std::shared_ptr<CWallet>& wallet : created_wallets) {
4443 [ + - ]: 8 : track_for_cleanup(*wallet);
4444 : : }
4445 : :
4446 : : // Unload the wallets
4447 [ + + ]: 16 : for (std::shared_ptr<CWallet>& w : created_wallets) {
4448 [ - + ]: 8 : if (w->HaveChain()) {
4449 : : // Unloading for wallets that were loaded for normal use
4450 [ # # # # ]: 0 : if (!RemoveWallet(context, w, /*load_on_start=*/false)) {
4451 [ # # # # ]: 0 : error += _("\nUnable to cleanup failed migration");
4452 [ # # ]: 0 : return util::Error{error};
4453 : : }
4454 [ # # ]: 0 : WaitForDeleteWallet(std::move(w));
4455 : : } else {
4456 : : // Unloading for wallets in local context
4457 [ - + ]: 8 : assert(w.use_count() == 1);
4458 : 8 : w.reset();
4459 : : }
4460 : : }
4461 : :
4462 : : // First, delete the db files we have created throughout this process and nothing else
4463 [ + + ]: 28 : for (const fs::path& file : wallet_files_to_remove) {
4464 [ + - ]: 20 : fs::remove(file);
4465 : : }
4466 : :
4467 : : // Second, delete the created wallet directories and nothing else. They must be empty at this point.
4468 [ + + ]: 10 : for (const fs::path& dir : wallet_empty_dirs_to_remove) {
4469 [ + - + - ]: 2 : Assume(fs::is_empty(dir));
4470 [ + - ]: 2 : fs::remove(dir);
4471 : : }
4472 : :
4473 : : // Restore the backup
4474 : : // Convert the backup file to the wallet db file by renaming it and moving it into the wallet's directory.
4475 [ + - ]: 8 : bilingual_str restore_error;
4476 [ + - ]: 16 : const auto& ptr_wallet = RestoreWallet(context, backup_path, wallet_name, /*load_on_start=*/std::nullopt, status, restore_error, warnings, /*load_after_restore=*/false, /*allow_unnamed=*/true);
4477 [ - + ]: 8 : if (!restore_error.empty()) {
4478 [ # # # # ]: 0 : error += restore_error + _("\nUnable to restore backup of wallet.");
4479 [ # # ]: 0 : return util::Error{error};
4480 : : }
4481 : : // Verify that the legacy wallet is not loaded after restoring from the backup.
4482 [ - + ]: 8 : assert(!ptr_wallet);
4483 : :
4484 [ + - ]: 24 : return util::Error{error};
4485 : 8 : }
4486 : 35 : return res;
4487 : 227 : }
4488 : :
4489 : 80695 : void CWallet::CacheNewScriptPubKeys(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4490 : : {
4491 [ + + ]: 583109 : for (const auto& script : spks) {
4492 : 502414 : m_cached_spks[script].push_back(spkm);
4493 : : }
4494 : 80695 : }
4495 : :
4496 : 80695 : void CWallet::TopUpCallback(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4497 : : {
4498 : : // Update scriptPubKey cache
4499 : 80695 : CacheNewScriptPubKeys(spks, spkm);
4500 : 80695 : }
4501 : :
4502 : 7 : std::set<CExtPubKey> CWallet::GetActiveHDPubKeys() const
4503 : : {
4504 : 7 : AssertLockHeld(cs_wallet);
4505 : :
4506 [ - + ]: 7 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4507 : :
4508 [ + - ]: 7 : std::set<CExtPubKey> active_xpubs;
4509 [ + - + + ]: 30 : for (const auto& spkm : GetActiveScriptPubKeyMans()) {
4510 [ + - ]: 23 : const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4511 [ - + ]: 23 : assert(desc_spkm);
4512 [ + - ]: 23 : LOCK(desc_spkm->cs_desc_man);
4513 [ + - ]: 23 : WalletDescriptor w_desc = desc_spkm->GetWalletDescriptor();
4514 : :
4515 [ + - ]: 23 : std::set<CPubKey> desc_pubkeys;
4516 : 23 : std::set<CExtPubKey> desc_xpubs;
4517 [ + - ]: 23 : w_desc.descriptor->GetPubKeys(desc_pubkeys, desc_xpubs);
4518 : 23 : active_xpubs.merge(std::move(desc_xpubs));
4519 [ + - ]: 46 : }
4520 : 7 : return active_xpubs;
4521 : 0 : }
4522 : :
4523 : 8 : std::optional<CKey> CWallet::GetKey(const CKeyID& keyid) const
4524 : : {
4525 [ - + ]: 8 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4526 : :
4527 [ + + ]: 9 : for (const auto& spkm : GetAllScriptPubKeyMans()) {
4528 [ + - ]: 8 : const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4529 [ - + ]: 8 : assert(desc_spkm);
4530 [ + - ]: 8 : LOCK(desc_spkm->cs_desc_man);
4531 [ + - + + ]: 8 : if (std::optional<CKey> key = desc_spkm->GetKey(keyid)) {
4532 [ + - ]: 7 : return key;
4533 [ + - ]: 1 : }
4534 : 8 : }
4535 : 1 : return std::nullopt;
4536 : : }
4537 : :
4538 : 17828 : void CWallet::WriteBestBlock() const
4539 : : {
4540 : 17828 : AssertLockHeld(cs_wallet);
4541 : :
4542 [ + + ]: 35656 : if (!m_last_block_processed.IsNull()) {
4543 : 17781 : CBlockLocator loc;
4544 [ + - ]: 17781 : chain().findBlock(m_last_block_processed, FoundBlock().locator(loc));
4545 : :
4546 [ + - ]: 17781 : if (!loc.IsNull()) {
4547 [ + - ]: 17781 : WalletBatch batch(GetDatabase());
4548 [ + - ]: 17781 : batch.WriteBestBlock(loc);
4549 : 17781 : }
4550 : 17781 : }
4551 : 17828 : }
4552 : :
4553 : 37339 : void CWallet::RefreshTXOsFromTx(const CWalletTx& wtx)
4554 : : {
4555 : 37339 : AssertLockHeld(cs_wallet);
4556 [ - + + + ]: 187688 : for (uint32_t i = 0; i < wtx.tx->vout.size(); ++i) {
4557 : 150349 : const CTxOut& txout = wtx.tx->vout.at(i);
4558 [ + + ]: 150349 : if (!IsMine(txout)) continue;
4559 : 60772 : COutPoint outpoint(wtx.GetHash(), i);
4560 [ + + ]: 60772 : if (m_txos.contains(outpoint)) {
4561 : : } else {
4562 : 46114 : m_txos.emplace(outpoint, WalletTXO{wtx, txout});
4563 : : }
4564 : : }
4565 : 37339 : }
4566 : :
4567 : 695 : void CWallet::RefreshAllTXOs()
4568 : : {
4569 : 695 : AssertLockHeld(cs_wallet);
4570 [ + + ]: 2964 : for (const auto& [_, wtx] : mapWallet) {
4571 : 2269 : RefreshTXOsFromTx(wtx);
4572 : : }
4573 : 695 : }
4574 : :
4575 : 188585 : std::optional<WalletTXO> CWallet::GetTXO(const COutPoint& outpoint) const
4576 : : {
4577 : 188585 : AssertLockHeld(cs_wallet);
4578 : 188585 : const auto& it = m_txos.find(outpoint);
4579 [ + + ]: 188585 : if (it == m_txos.end()) {
4580 : 178316 : return std::nullopt;
4581 : : }
4582 : 10269 : return it->second;
4583 : : }
4584 : :
4585 : 893 : void CWallet::DisconnectChainNotifications()
4586 : : {
4587 [ + + ]: 893 : if (m_chain_notifications_handler) {
4588 : 892 : m_chain_notifications_handler->disconnect();
4589 : 892 : chain().waitForNotifications();
4590 [ + - ]: 892 : m_chain_notifications_handler.reset();
4591 : : }
4592 : 893 : }
4593 : :
4594 : : } // namespace wallet
|