Branch data Line data Source code
1 : : // Copyright (c) 2009-2010 Satoshi Nakamoto
2 : : // Copyright (c) 2009-present The Bitcoin Core developers
3 : : // Distributed under the MIT software license, see the accompanying
4 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
5 : :
6 : : #include <wallet/wallet.h>
7 : :
8 : : #include <bitcoin-build-config.h> // IWYU pragma: keep
9 : : #include <addresstype.h>
10 : : #include <blockfilter.h>
11 : : #include <chain.h>
12 : : #include <coins.h>
13 : : #include <common/args.h>
14 : : #include <common/messages.h>
15 : : #include <common/settings.h>
16 : : #include <common/signmessage.h>
17 : : #include <common/system.h>
18 : : #include <consensus/amount.h>
19 : : #include <consensus/consensus.h>
20 : : #include <consensus/validation.h>
21 : : #include <external_signer.h>
22 : : #include <interfaces/chain.h>
23 : : #include <interfaces/handler.h>
24 : : #include <interfaces/wallet.h>
25 : : #include <kernel/mempool_removal_reason.h>
26 : : #include <kernel/types.h>
27 : : #include <key.h>
28 : : #include <key_io.h>
29 : : #include <logging.h>
30 : : #include <node/types.h>
31 : : #include <outputtype.h>
32 : : #include <policy/feerate.h>
33 : : #include <policy/truc_policy.h>
34 : : #include <primitives/block.h>
35 : : #include <primitives/transaction.h>
36 : : #include <psbt.h>
37 : : #include <pubkey.h>
38 : : #include <random.h>
39 : : #include <script/descriptor.h>
40 : : #include <script/interpreter.h>
41 : : #include <script/script.h>
42 : : #include <script/sign.h>
43 : : #include <script/signingprovider.h>
44 : : #include <script/solver.h>
45 : : #include <serialize.h>
46 : : #include <span.h>
47 : : #include <streams.h>
48 : : #include <support/allocators/secure.h>
49 : : #include <support/allocators/zeroafterfree.h>
50 : : #include <support/cleanse.h>
51 : : #include <sync.h>
52 : : #include <tinyformat.h>
53 : : #include <uint256.h>
54 : : #include <univalue.h>
55 : : #include <util/check.h>
56 : : #include <util/fs.h>
57 : : #include <util/fs_helpers.h>
58 : : #include <util/moneystr.h>
59 : : #include <util/result.h>
60 : : #include <util/string.h>
61 : : #include <util/time.h>
62 : : #include <util/translation.h>
63 : : #include <wallet/coincontrol.h>
64 : : #include <wallet/context.h>
65 : : #include <wallet/crypter.h>
66 : : #include <wallet/db.h>
67 : : #include <wallet/external_signer_scriptpubkeyman.h>
68 : : #include <wallet/scriptpubkeyman.h>
69 : : #include <wallet/transaction.h>
70 : : #include <wallet/types.h>
71 : : #include <wallet/walletdb.h>
72 : : #include <wallet/walletutil.h>
73 : :
74 : : #include <algorithm>
75 : : #include <cassert>
76 : : #include <condition_variable>
77 : : #include <exception>
78 : : #include <optional>
79 : : #include <stdexcept>
80 : : #include <thread>
81 : : #include <tuple>
82 : : #include <variant>
83 : :
84 : : struct KeyOriginInfo;
85 : :
86 : : using common::AmountErrMsg;
87 : : using common::AmountHighWarn;
88 : : using common::PSBTError;
89 : : using interfaces::FoundBlock;
90 : : using kernel::ChainstateRole;
91 : : using util::ReplaceAll;
92 : : using util::ToString;
93 : :
94 : : namespace wallet {
95 : :
96 : 183 : bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
97 : : {
98 : 366 : const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
99 [ + + ]: 183 : if (!setting_value.isArray()) setting_value.setArray();
100 [ + + ]: 360 : for (const auto& value : setting_value.getValues()) {
101 [ + - + - ]: 177 : if (value.isStr() && value.get_str() == wallet_name) return interfaces::SettingsAction::SKIP_WRITE;
102 : : }
103 [ + - ]: 183 : setting_value.push_back(wallet_name);
104 : 183 : return interfaces::SettingsAction::WRITE;
105 : 183 : };
106 [ + - + - ]: 183 : return chain.updateRwSetting("wallet", update_function);
107 : : }
108 : :
109 : 15 : bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
110 : : {
111 : 30 : const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
112 [ + + ]: 15 : if (!setting_value.isArray()) return interfaces::SettingsAction::SKIP_WRITE;
113 : 13 : common::SettingsValue new_value(common::SettingsValue::VARR);
114 [ + - + + ]: 47 : for (const auto& value : setting_value.getValues()) {
115 [ + - + - : 34 : if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value);
+ + + - +
- ]
116 : : }
117 [ - + - + : 13 : if (new_value.size() == setting_value.size()) return interfaces::SettingsAction::SKIP_WRITE;
+ + ]
118 : 9 : setting_value = std::move(new_value);
119 : 9 : return interfaces::SettingsAction::WRITE;
120 : 13 : };
121 [ + - + - ]: 15 : return chain.updateRwSetting("wallet", update_function);
122 : : }
123 : :
124 : 1682 : static void UpdateWalletSetting(interfaces::Chain& chain,
125 : : const std::string& wallet_name,
126 : : std::optional<bool> load_on_startup,
127 : : std::vector<bilingual_str>& warnings)
128 : : {
129 [ + + ]: 1682 : if (!load_on_startup) return;
130 [ + + - + ]: 188 : if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) {
131 [ # # # # ]: 0 : warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup."));
132 [ + + - + ]: 188 : } else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) {
133 [ # # # # ]: 0 : warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup."));
134 : : }
135 : : }
136 : :
137 : : /**
138 : : * Refresh mempool status so the wallet is in an internally consistent state and
139 : : * immediately knows the transaction's status: Whether it can be considered
140 : : * trusted and is eligible to be abandoned ...
141 : : */
142 : 18746 : static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain)
143 : : {
144 [ + + ]: 18746 : if (chain.isInMempool(tx.GetHash())) {
145 [ - + ]: 3638 : tx.m_state = TxStateInMempool();
146 [ + + ]: 15108 : } else if (tx.state<TxStateInMempool>()) {
147 [ - + ]: 275 : tx.m_state = TxStateInactive();
148 : : }
149 : 18746 : }
150 : :
151 : 880 : bool AddWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
152 : : {
153 : 880 : LOCK(context.wallets_mutex);
154 [ - + ]: 880 : assert(wallet);
155 [ + - ]: 880 : std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
156 [ + - ]: 880 : if (i != context.wallets.end()) return false;
157 [ + - ]: 880 : context.wallets.push_back(wallet);
158 [ + - ]: 880 : wallet->ConnectScriptPubKeyManNotifiers();
159 [ + - ]: 880 : wallet->NotifyCanGetAddressesChanged();
160 : : return true;
161 : 880 : }
162 : :
163 : 880 : bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings)
164 : : {
165 [ - + ]: 880 : assert(wallet);
166 : :
167 : 880 : interfaces::Chain& chain = wallet->chain();
168 [ - + ]: 880 : std::string name = wallet->GetName();
169 [ + - + - ]: 2640 : WITH_LOCK(wallet->cs_wallet, wallet->WriteBestBlock());
170 : :
171 : : // Unregister with the validation interface which also drops shared pointers.
172 [ + - ]: 880 : wallet->DisconnectChainNotifications();
173 : 880 : {
174 [ + - ]: 880 : LOCK(context.wallets_mutex);
175 : 880 : std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
176 [ - + - - ]: 880 : if (i == context.wallets.end()) return false;
177 [ + - ]: 880 : context.wallets.erase(i);
178 : 0 : }
179 : : // Notify unload so that upper layers release the shared pointer.
180 [ + - ]: 880 : wallet->NotifyUnload();
181 : :
182 : : // Write the wallet setting
183 [ + - ]: 880 : UpdateWalletSetting(chain, name, load_on_start, warnings);
184 : :
185 : : return true;
186 : 880 : }
187 : :
188 : 0 : bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start)
189 : : {
190 : 0 : std::vector<bilingual_str> warnings;
191 [ # # ]: 0 : return RemoveWallet(context, wallet, load_on_start, warnings);
192 : 0 : }
193 : :
194 : 1328 : std::vector<std::shared_ptr<CWallet>> GetWallets(WalletContext& context)
195 : : {
196 : 1328 : LOCK(context.wallets_mutex);
197 [ + - ]: 1328 : return context.wallets;
198 : 1328 : }
199 : :
200 : 4751 : std::shared_ptr<CWallet> GetDefaultWallet(WalletContext& context, size_t& count)
201 : : {
202 : 4751 : LOCK(context.wallets_mutex);
203 [ - + ]: 4751 : count = context.wallets.size();
204 [ + + + - : 9493 : return count == 1 ? context.wallets[0] : nullptr;
+ - ]
205 : 4751 : }
206 : :
207 : 14933 : std::shared_ptr<CWallet> GetWallet(WalletContext& context, const std::string& name)
208 : : {
209 : 14933 : LOCK(context.wallets_mutex);
210 [ + + ]: 68892 : for (const std::shared_ptr<CWallet>& wallet : context.wallets) {
211 [ + + + - : 83774 : if (wallet->GetName() == name) return wallet;
+ - ]
212 : : }
213 : 51 : return nullptr;
214 : 14933 : }
215 : :
216 : 1 : std::unique_ptr<interfaces::Handler> HandleLoadWallet(WalletContext& context, LoadWalletFn load_wallet)
217 : : {
218 : 1 : LOCK(context.wallets_mutex);
219 [ + - ]: 1 : auto it = context.wallet_load_fns.emplace(context.wallet_load_fns.end(), std::move(load_wallet));
220 [ + - + - : 3 : return interfaces::MakeCleanupHandler([&context, it] { LOCK(context.wallets_mutex); context.wallet_load_fns.erase(it); });
+ - ]
221 : 1 : }
222 : :
223 : 885 : void NotifyWalletLoaded(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
224 : : {
225 : 885 : LOCK(context.wallets_mutex);
226 [ + + ]: 886 : for (auto& load_wallet : context.wallet_load_fns) {
227 [ + - + - ]: 1 : load_wallet(interfaces::MakeWallet(context, wallet));
228 : : }
229 : 885 : }
230 : :
231 : : static GlobalMutex g_loading_wallet_mutex;
232 : : static GlobalMutex g_wallet_release_mutex;
233 : : static std::condition_variable g_wallet_release_cv;
234 : : static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex);
235 : : static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex);
236 : :
237 : : // Custom deleter for shared_ptr<CWallet>.
238 : 958 : static void FlushAndDeleteWallet(CWallet* wallet)
239 : : {
240 [ - + ]: 958 : const std::string name = wallet->GetName();
241 [ + - ]: 958 : wallet->WalletLogPrintf("Releasing wallet %s..\n", name);
242 : 958 : delete wallet;
243 : : // Wallet is now released, notify WaitForDeleteWallet, if any.
244 : 958 : {
245 [ + - ]: 958 : LOCK(g_wallet_release_mutex);
246 [ + + ]: 958 : if (g_unloading_wallet_set.erase(name) == 0) {
247 : : // WaitForDeleteWallet was not called for this wallet, all done.
248 [ + - ]: 73 : return;
249 : : }
250 : 73 : }
251 : 885 : g_wallet_release_cv.notify_all();
252 : 958 : }
253 : :
254 : 885 : void WaitForDeleteWallet(std::shared_ptr<CWallet>&& wallet)
255 : : {
256 : : // Mark wallet for unloading.
257 [ - + ]: 885 : const std::string name = wallet->GetName();
258 : 885 : {
259 [ + - ]: 885 : LOCK(g_wallet_release_mutex);
260 [ + - ]: 885 : g_unloading_wallet_set.insert(name);
261 : : // Do not expect to be the only one removing this wallet.
262 : : // Multiple threads could simultaneously be waiting for deletion.
263 : 0 : }
264 : :
265 : : // Time to ditch our shared_ptr and wait for FlushAndDeleteWallet call.
266 : 885 : wallet.reset();
267 : 885 : {
268 [ + - ]: 885 : WAIT_LOCK(g_wallet_release_mutex, lock);
269 [ - + ]: 885 : while (g_unloading_wallet_set.contains(name)) {
270 [ # # ]: 0 : g_wallet_release_cv.wait(lock);
271 : : }
272 : 885 : }
273 : 885 : }
274 : :
275 : : namespace {
276 : 231 : std::shared_ptr<CWallet> LoadWalletInternal(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
277 : : {
278 : 231 : try {
279 [ + - ]: 231 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
280 [ + + ]: 231 : if (!database) {
281 [ + - + - : 133 : error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
+ - + - +
- ]
282 : 19 : return nullptr;
283 : : }
284 : :
285 [ + - + - ]: 212 : context.chain->initMessage(_("Loading wallet…"));
286 [ + - ]: 212 : std::shared_ptr<CWallet> wallet = CWallet::LoadExisting(context, name, std::move(database), error, warnings);
287 [ + + ]: 212 : if (!wallet) {
288 [ + - + - : 70 : error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error;
+ - + - +
- ]
289 : 10 : status = DatabaseStatus::FAILED_LOAD;
290 : 10 : return nullptr;
291 : : }
292 : :
293 [ + - ]: 202 : NotifyWalletLoaded(context, wallet);
294 [ + - ]: 202 : AddWallet(context, wallet);
295 [ + - ]: 202 : wallet->postInitProcess();
296 : :
297 : : // Write the wallet setting
298 [ + - ]: 202 : UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
299 : :
300 : 202 : return wallet;
301 [ - - ]: 231 : } catch (const std::runtime_error& e) {
302 [ - - - - ]: 0 : error = Untranslated(e.what());
303 : 0 : status = DatabaseStatus::FAILED_LOAD;
304 : 0 : return nullptr;
305 : 0 : }
306 : : }
307 : :
308 : : class FastWalletRescanFilter
309 : : {
310 : : public:
311 [ + - ]: 5 : FastWalletRescanFilter(const CWallet& wallet) : m_wallet(wallet)
312 : : {
313 : : // create initial filter with scripts from all ScriptPubKeyMans
314 [ + - + + ]: 50 : for (auto spkm : m_wallet.GetAllScriptPubKeyMans()) {
315 [ + - ]: 45 : auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(spkm)};
316 [ - + ]: 45 : assert(desc_spkm != nullptr);
317 [ + - ]: 45 : AddScriptPubKeys(desc_spkm);
318 : : // save each range descriptor's end for possible future filter updates
319 [ + - + + ]: 45 : if (desc_spkm->IsHDEnabled()) {
320 [ + - + - : 40 : m_last_range_ends.emplace(desc_spkm->GetID(), desc_spkm->GetEndRange());
+ - ]
321 : : }
322 : 0 : }
323 : 5 : }
324 : :
325 : 616 : void UpdateIfNeeded()
326 : : {
327 : : // repopulate filter with new scripts if top-up has happened since last iteration
328 [ + + ]: 5544 : for (const auto& [desc_spkm_id, last_range_end] : m_last_range_ends) {
329 [ + - ]: 4928 : auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(m_wallet.GetScriptPubKeyMan(desc_spkm_id))};
330 [ - + ]: 4928 : assert(desc_spkm != nullptr);
331 : 4928 : int32_t current_range_end{desc_spkm->GetEndRange()};
332 [ + + ]: 4928 : if (current_range_end > last_range_end) {
333 : 64 : AddScriptPubKeys(desc_spkm, last_range_end);
334 : 64 : m_last_range_ends.at(desc_spkm->GetID()) = current_range_end;
335 : : }
336 : : }
337 : 616 : }
338 : :
339 : 616 : std::optional<bool> MatchesBlock(const uint256& block_hash) const
340 : : {
341 : 616 : return m_wallet.chain().blockFilterMatchesAny(BlockFilterType::BASIC, block_hash, m_filter_set);
342 : : }
343 : :
344 : : private:
345 : : const CWallet& m_wallet;
346 : : /** Map for keeping track of each range descriptor's last seen end range.
347 : : * This information is used to detect whether new addresses were derived
348 : : * (that is, if the current end range is larger than the saved end range)
349 : : * after processing a block and hence a filter set update is needed to
350 : : * take possible keypool top-ups into account.
351 : : */
352 : : std::map<uint256, int32_t> m_last_range_ends;
353 : : GCSFilter::ElementSet m_filter_set;
354 : :
355 : 109 : void AddScriptPubKeys(const DescriptorScriptPubKeyMan* desc_spkm, int32_t last_range_end = 0)
356 : : {
357 [ + + + - ]: 9728 : for (const auto& script_pub_key : desc_spkm->GetScriptPubKeys(last_range_end)) {
358 [ + - + - ]: 19238 : m_filter_set.emplace(script_pub_key.begin(), script_pub_key.end());
359 : 109 : }
360 : 109 : }
361 : : };
362 : : } // namespace
363 : :
364 : 235 : std::shared_ptr<CWallet> LoadWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
365 : : {
366 [ + - ]: 705 : auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name));
367 [ + + ]: 235 : if (!result.second) {
368 [ + - ]: 8 : error = Untranslated("Wallet already loading.");
369 : 4 : status = DatabaseStatus::FAILED_LOAD;
370 : 4 : return nullptr;
371 : : }
372 : 231 : auto wallet = LoadWalletInternal(context, name, load_on_start, options, status, error, warnings);
373 [ + - + - ]: 462 : WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first));
374 [ - + ]: 231 : return wallet;
375 : 231 : }
376 : :
377 : 621 : std::shared_ptr<CWallet> CreateWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
378 : : {
379 : : // Wallet must have a non-empty name
380 [ + + ]: 621 : if (name.empty()) {
381 [ + - ]: 4 : error = Untranslated("Wallet name cannot be empty");
382 : 2 : status = DatabaseStatus::FAILED_NEW_UNNAMED;
383 : 2 : return nullptr;
384 : : }
385 : :
386 : 619 : uint64_t wallet_creation_flags = options.create_flags;
387 : 619 : const SecureString& passphrase = options.create_passphrase;
388 : :
389 : : // Only descriptor wallets can be created
390 [ - + ]: 619 : Assert(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS);
391 : 619 : options.require_format = DatabaseFormat::SQLITE;
392 : :
393 : : // Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted
394 : 619 : bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET);
395 : :
396 : : // Born encrypted wallets need to be created blank first.
397 [ + + ]: 619 : if (!passphrase.empty()) {
398 : 12 : wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET;
399 : : }
400 : :
401 : : // Private keys must be disabled for an external signer wallet
402 [ + + + + ]: 619 : if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
403 [ + - ]: 2 : error = Untranslated("Private keys must be disabled when using an external signer");
404 : 1 : status = DatabaseStatus::FAILED_CREATE;
405 : 1 : return nullptr;
406 : : }
407 : :
408 : : // Do not allow a passphrase when private keys are disabled
409 [ + + + + ]: 618 : if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
410 [ + - ]: 8 : error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled.");
411 : 4 : status = DatabaseStatus::FAILED_CREATE;
412 : 4 : return nullptr;
413 : : }
414 : :
415 : : // Wallet::Verify will check if we're trying to create a wallet with a duplicate name.
416 : 614 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
417 [ + + ]: 614 : if (!database) {
418 [ + - + - : 196 : error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
+ - + - +
- ]
419 : 28 : status = DatabaseStatus::FAILED_VERIFY;
420 : 28 : return nullptr;
421 : : }
422 : :
423 : : // Make the wallet
424 [ + - + - ]: 586 : context.chain->initMessage(_("Creating wallet…"));
425 [ + + ]: 586 : std::shared_ptr<CWallet> wallet = CWallet::CreateNew(context, name, std::move(database), wallet_creation_flags, error, warnings);
426 [ - + ]: 583 : if (!wallet) {
427 [ # # # # : 0 : error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error;
# # # # #
# ]
428 : 0 : status = DatabaseStatus::FAILED_CREATE;
429 : 0 : return nullptr;
430 : : }
431 : :
432 : : // Encrypt the wallet
433 [ + + + - ]: 583 : if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
434 [ + - - + ]: 8 : if (!wallet->EncryptWallet(passphrase)) {
435 [ # # # # ]: 0 : error = Untranslated("Error: Wallet created but failed to encrypt.");
436 : 0 : status = DatabaseStatus::FAILED_ENCRYPT;
437 : 0 : return nullptr;
438 : : }
439 [ + + ]: 8 : if (!create_blank) {
440 : : // Unlock the wallet
441 [ + - - + ]: 4 : if (!wallet->Unlock(passphrase)) {
442 [ # # # # ]: 0 : error = Untranslated("Error: Wallet was encrypted but could not be unlocked");
443 : 0 : status = DatabaseStatus::FAILED_ENCRYPT;
444 : 0 : return nullptr;
445 : : }
446 : :
447 : : // Set a seed for the wallet
448 : 4 : {
449 [ + - ]: 4 : LOCK(wallet->cs_wallet);
450 [ + - ]: 4 : wallet->SetupDescriptorScriptPubKeyMans();
451 : 0 : }
452 : :
453 : : // Relock the wallet
454 [ + - ]: 4 : wallet->Lock();
455 : : }
456 : : }
457 : :
458 [ + - + - ]: 1749 : WITH_LOCK(wallet->cs_wallet, wallet->LogStats());
459 [ + - ]: 583 : NotifyWalletLoaded(context, wallet);
460 [ + - ]: 583 : AddWallet(context, wallet);
461 [ + - ]: 583 : wallet->postInitProcess();
462 : :
463 : : // Write the wallet settings
464 [ + - ]: 583 : UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
465 : :
466 : 583 : status = DatabaseStatus::SUCCESS;
467 : 583 : return wallet;
468 : 614 : }
469 : :
470 : : // Re-creates wallet from the backup file by renaming and moving it into the wallet's directory.
471 : : // If 'load_after_restore=true', the wallet object will be fully initialized and appended to the context.
472 : 43 : std::shared_ptr<CWallet> RestoreWallet(WalletContext& context, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings, bool load_after_restore, bool allow_unnamed)
473 : : {
474 : : // Error if the wallet name is empty and allow_unnamed == false
475 : : // allow_unnamed == true is only used by migration to migrate an unnamed wallet
476 [ + + + + ]: 43 : if (!allow_unnamed && wallet_name.empty()) {
477 [ + - ]: 2 : error = Untranslated("Wallet name cannot be empty");
478 : 1 : status = DatabaseStatus::FAILED_NEW_UNNAMED;
479 : 1 : return nullptr;
480 : : }
481 : :
482 [ + - ]: 42 : DatabaseOptions options;
483 [ + - ]: 42 : ReadDatabaseArgs(*context.args, options);
484 : 42 : options.require_existing = true;
485 : :
486 [ - + + - : 84 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name));
+ - + - ]
487 [ + - + - ]: 84 : auto wallet_file = wallet_path / "wallet.dat";
488 : 42 : std::shared_ptr<CWallet> wallet;
489 : 42 : bool wallet_file_copied = false;
490 : 42 : bool created_parent_dir = false;
491 : :
492 : 42 : try {
493 [ + - + + ]: 42 : if (!fs::exists(backup_file)) {
494 [ + - + - ]: 2 : error = Untranslated("Backup file does not exist");
495 : 1 : status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE;
496 : 1 : return nullptr;
497 : : }
498 : :
499 : : // Wallet directories are allowed to exist, but must not contain a .dat file.
500 : : // Any existing wallet database is treated as a hard failure to prevent overwriting.
501 [ + - + + ]: 41 : if (fs::exists(wallet_path)) {
502 : : // If this is a file, it is the db and we don't want to overwrite it.
503 [ + - - + ]: 11 : if (!fs::is_directory(wallet_path)) {
504 [ # # # # : 0 : error = Untranslated(strprintf("Failed to restore wallet. Database file exists '%s'.", fs::PathToString(wallet_path)));
# # ]
505 : 0 : status = DatabaseStatus::FAILED_ALREADY_EXISTS;
506 : 0 : return nullptr;
507 : : }
508 : :
509 : : // Check we are not going to overwrite an existing db file
510 [ + - + + ]: 11 : if (fs::exists(wallet_file)) {
511 [ - + + - : 6 : error = Untranslated(strprintf("Failed to restore wallet. Database file exists in '%s'.", fs::PathToString(wallet_file)));
+ - ]
512 : 2 : status = DatabaseStatus::FAILED_ALREADY_EXISTS;
513 : 2 : return nullptr;
514 : : }
515 : : } else {
516 : : // The directory doesn't exist, create it
517 [ + - - + ]: 30 : if (!TryCreateDirectories(wallet_path)) {
518 [ # # # # : 0 : error = Untranslated(strprintf("Failed to restore database path '%s'.", fs::PathToString(wallet_path)));
# # ]
519 : 0 : status = DatabaseStatus::FAILED_ALREADY_EXISTS;
520 : 0 : return nullptr;
521 : : }
522 : : created_parent_dir = true;
523 : : }
524 : :
525 [ + - ]: 39 : fs::copy_file(backup_file, wallet_file, fs::copy_options::none);
526 : 39 : wallet_file_copied = true;
527 : :
528 [ + + ]: 39 : if (load_after_restore) {
529 [ + - - + ]: 66 : wallet = LoadWallet(context, wallet_name, load_on_start, options, status, error, warnings);
530 : : }
531 [ - - ]: 0 : } catch (const std::exception& e) {
532 [ - - ]: 0 : assert(!wallet);
533 [ - - - - : 0 : if (!error.empty()) error += Untranslated("\n");
- - - - ]
534 [ - - - - : 0 : error += Untranslated(strprintf("Unexpected exception: %s", e.what()));
- - ]
535 : 0 : }
536 : :
537 : : // Remove created wallet path only when loading fails
538 [ + - + + ]: 33 : if (load_after_restore && !wallet) {
539 [ + - + - ]: 14 : if (wallet_file_copied) fs::remove(wallet_file);
540 : : // Clean up the parent directory if we created it during restoration.
541 : : // As we have created it, it must be empty after deleting the wallet file.
542 [ + - ]: 14 : if (created_parent_dir) {
543 [ + - + - ]: 14 : Assume(fs::is_empty(wallet_path));
544 [ + - ]: 14 : fs::remove(wallet_path);
545 : : }
546 : : }
547 : :
548 : 39 : return wallet;
549 : 126 : }
550 : :
551 : : /** @defgroup mapWallet
552 : : *
553 : : * @{
554 : : */
555 : :
556 : 84603 : const CWalletTx* CWallet::GetWalletTx(const Txid& hash) const
557 : : {
558 : 84603 : AssertLockHeld(cs_wallet);
559 : 84603 : const auto it = mapWallet.find(hash);
560 [ + + ]: 84603 : if (it == mapWallet.end())
561 : : return nullptr;
562 : 84217 : return &(it->second);
563 : : }
564 : :
565 : 425 : void CWallet::UpgradeDescriptorCache()
566 : : {
567 [ + + + + : 425 : if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) {
+ + ]
568 : 416 : return;
569 : : }
570 : :
571 [ + + ]: 53 : for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) {
572 [ + - ]: 44 : DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
573 [ + - ]: 44 : desc_spkm->UpgradeDescriptorCache();
574 : : }
575 : 9 : SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
576 : : }
577 : :
578 : : /* Given a wallet passphrase string and an unencrypted master key, determine the proper key
579 : : * derivation parameters (should take at least 100ms) and encrypt the master key. */
580 : 24 : static bool EncryptMasterKey(const SecureString& wallet_passphrase, const CKeyingMaterial& plain_master_key, CMasterKey& master_key)
581 : : {
582 : 24 : constexpr MillisecondsDouble target_time{100};
583 : 24 : CCrypter crypter;
584 : :
585 : : // Get the weighted average of iterations we can do in 100ms over 2 runs.
586 [ + + ]: 68 : for (int i = 0; i < 2; i++){
587 : 46 : auto start_time{NodeClock::now()};
588 [ - + + - ]: 46 : crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod);
589 : 46 : auto elapsed_time{NodeClock::now() - start_time};
590 : :
591 [ + + ]: 46 : if (elapsed_time <= 0s) {
592 : : // We are probably in a test with a mocked clock.
593 : 2 : master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS;
594 : 2 : break;
595 : : }
596 : :
597 : : // target_iterations : elapsed_iterations :: target_time : elapsed_time
598 : 44 : unsigned int target_iterations = master_key.nDeriveIterations * target_time / elapsed_time;
599 : : // Get the weighted average with previous runs.
600 : 44 : master_key.nDeriveIterations = (i * master_key.nDeriveIterations + target_iterations) / (i + 1);
601 : : }
602 : :
603 [ + + ]: 24 : if (master_key.nDeriveIterations < CMasterKey::DEFAULT_DERIVE_ITERATIONS) {
604 : 3 : master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS;
605 : : }
606 : :
607 [ - + + - : 24 : if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
+ - ]
608 : : return false;
609 : : }
610 [ + - - + ]: 24 : if (!crypter.Encrypt(plain_master_key, master_key.vchCryptedKey)) {
611 : 0 : return false;
612 : : }
613 : :
614 : : return true;
615 : 24 : }
616 : :
617 : 79 : static bool DecryptMasterKey(const SecureString& wallet_passphrase, const CMasterKey& master_key, CKeyingMaterial& plain_master_key)
618 : : {
619 : 79 : CCrypter crypter;
620 [ - + + - : 79 : if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
+ - ]
621 : : return false;
622 : : }
623 [ - + + - : 79 : if (!crypter.Decrypt(master_key.vchCryptedKey, plain_master_key)) {
+ + ]
624 : 9 : return false;
625 : : }
626 : :
627 : : return true;
628 : 79 : }
629 : :
630 : 75 : bool CWallet::Unlock(const SecureString& strWalletPassphrase)
631 : : {
632 : 75 : CKeyingMaterial plain_master_key;
633 : :
634 : 75 : {
635 [ + - ]: 75 : LOCK(cs_wallet);
636 [ + - + + ]: 82 : for (const auto& [_, master_key] : mapMasterKeys)
637 : : {
638 [ + - + + ]: 75 : if (!DecryptMasterKey(strWalletPassphrase, master_key, plain_master_key)) {
639 : 7 : continue; // try another master key
640 : : }
641 [ + - + - ]: 68 : if (Unlock(plain_master_key)) {
642 : : // Now that we've unlocked, upgrade the descriptor cache
643 [ + - ]: 68 : UpgradeDescriptorCache();
644 [ + - ]: 68 : return true;
645 : : }
646 : : }
647 : 68 : }
648 : 7 : return false;
649 : 75 : }
650 : :
651 : 4 : bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase)
652 : : {
653 : 4 : bool fWasLocked = IsLocked();
654 : :
655 : 4 : {
656 [ + - ]: 4 : LOCK2(m_relock_mutex, cs_wallet);
657 [ + - ]: 4 : Lock();
658 : :
659 : 4 : CKeyingMaterial plain_master_key;
660 [ + - + - ]: 4 : for (auto& [master_key_id, master_key] : mapMasterKeys)
661 : : {
662 [ + - + + ]: 4 : if (!DecryptMasterKey(strOldWalletPassphrase, master_key, plain_master_key)) {
663 : : return false;
664 : : }
665 [ + - + - ]: 2 : if (Unlock(plain_master_key))
666 : : {
667 [ + - + - ]: 2 : if (!EncryptMasterKey(strNewWalletPassphrase, plain_master_key, master_key)) {
668 : : return false;
669 : : }
670 [ + - ]: 2 : WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", master_key.nDeriveIterations);
671 : :
672 [ + - + - ]: 2 : WalletBatch(GetDatabase()).WriteMasterKey(master_key_id, master_key);
673 [ + - ]: 2 : if (fWasLocked)
674 [ + - ]: 2 : Lock();
675 : 2 : return true;
676 : : }
677 : : }
678 [ - - - - : 12 : }
+ - + - ]
679 : :
680 : 0 : return false;
681 : : }
682 : :
683 : 47156 : void CWallet::SetLastBlockProcessedInMem(int block_height, uint256 block_hash)
684 : : {
685 : 47156 : AssertLockHeld(cs_wallet);
686 : :
687 : 47156 : m_last_block_processed = block_hash;
688 : 47156 : m_last_block_processed_height = block_height;
689 : 47156 : }
690 : :
691 : 4104 : void CWallet::SetLastBlockProcessed(int block_height, uint256 block_hash)
692 : : {
693 : 4104 : AssertLockHeld(cs_wallet);
694 : :
695 : 4104 : SetLastBlockProcessedInMem(block_height, block_hash);
696 : 4104 : WriteBestBlock();
697 : 4104 : }
698 : :
699 : 3405 : std::set<Txid> CWallet::GetConflicts(const Txid& txid) const
700 : : {
701 : 3405 : std::set<Txid> result;
702 : 3405 : AssertLockHeld(cs_wallet);
703 : :
704 : 3405 : const auto it = mapWallet.find(txid);
705 [ + - ]: 6810 : if (it == mapWallet.end())
706 : : return result;
707 : 3405 : const CWalletTx& wtx = it->second;
708 : :
709 : 3405 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
710 : :
711 [ + + ]: 9007 : for (const CTxIn& txin : wtx.tx->vin)
712 : : {
713 [ + + ]: 5602 : if (mapTxSpends.count(txin.prevout) <= 1)
714 : 5271 : continue; // No conflict if zero or one spends
715 : 331 : range = mapTxSpends.equal_range(txin.prevout);
716 [ + + ]: 6338 : for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it)
717 [ + - ]: 736 : result.insert(_it->second);
718 : : }
719 : : return result;
720 : 0 : }
721 : :
722 : 227 : bool CWallet::HasWalletSpend(const CTransactionRef& tx) const
723 : : {
724 : 227 : AssertLockHeld(cs_wallet);
725 : 227 : const Txid& txid = tx->GetHash();
726 [ - + + + ]: 809 : for (unsigned int i = 0; i < tx->vout.size(); ++i) {
727 [ + + ]: 585 : if (IsSpent(COutPoint(txid, i))) {
728 : : return true;
729 : : }
730 : : }
731 : : return false;
732 : : }
733 : :
734 : 14 : void CWallet::Close()
735 : : {
736 : 14 : GetDatabase().Close();
737 : 14 : }
738 : :
739 : 13379 : void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range)
740 : : {
741 : : // We want all the wallet transactions in range to have the same metadata as
742 : : // the oldest (smallest nOrderPos).
743 : : // So: find smallest nOrderPos:
744 : :
745 : 13379 : int nMinOrderPos = std::numeric_limits<int>::max();
746 : 13379 : const CWalletTx* copyFrom = nullptr;
747 [ + + ]: 29425 : for (TxSpends::iterator it = range.first; it != range.second; ++it) {
748 : 16046 : const CWalletTx* wtx = &mapWallet.at(it->second);
749 [ + + ]: 16046 : if (wtx->nOrderPos < nMinOrderPos) {
750 : 16018 : nMinOrderPos = wtx->nOrderPos;
751 : 16018 : copyFrom = wtx;
752 : : }
753 : : }
754 : :
755 [ + - ]: 13379 : if (!copyFrom) {
756 : : return;
757 : : }
758 : :
759 : : // Now copy data from copyFrom to rest:
760 [ + + ]: 29425 : for (TxSpends::iterator it = range.first; it != range.second; ++it)
761 : : {
762 : 16046 : const Txid& hash = it->second;
763 : 16046 : CWalletTx* copyTo = &mapWallet.at(hash);
764 [ + + ]: 16046 : if (copyFrom == copyTo) continue;
765 : 2667 : assert(copyFrom && "Oldest wallet transaction in range assumed to have been found.");
766 [ + + ]: 2667 : if (!copyFrom->IsEquivalentTo(*copyTo)) continue;
767 : 3 : copyTo->mapValue = copyFrom->mapValue;
768 : 3 : copyTo->vOrderForm = copyFrom->vOrderForm;
769 : : // nTimeReceived not copied on purpose
770 : 3 : copyTo->nTimeSmart = copyFrom->nTimeSmart;
771 : : // nOrderPos not copied on purpose
772 : : // cached members not copied on purpose
773 : : }
774 : : }
775 : :
776 : : /**
777 : : * Outpoint is spent if any non-conflicted transaction
778 : : * spends it:
779 : : */
780 : 468724 : bool CWallet::IsSpent(const COutPoint& outpoint) const
781 : : {
782 : 468724 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
783 : 468724 : range = mapTxSpends.equal_range(outpoint);
784 : :
785 [ + + ]: 469883 : for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
786 : 289532 : const Txid& txid = it->second;
787 : 289532 : const auto mit = mapWallet.find(txid);
788 [ + - ]: 290691 : if (mit != mapWallet.end()) {
789 [ + + ]: 289532 : const auto& wtx = mit->second;
790 [ + + + + : 289591 : if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted())
+ + ]
791 : : return true; // Spent
792 : : }
793 : : }
794 : : return false;
795 : : }
796 : :
797 : 82404 : CWallet::SpendType CWallet::HowSpent(const COutPoint& outpoint) const
798 : : {
799 : 82404 : SpendType st{SpendType::UNSPENT};
800 : :
801 : 82404 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
802 : 82404 : range = mapTxSpends.equal_range(outpoint);
803 : :
804 [ + + ]: 84227 : for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
805 : 49798 : const Txid& txid = it->second;
806 : 49798 : const auto mit = mapWallet.find(txid);
807 [ + - ]: 51621 : if (mit != mapWallet.end()) {
808 [ + + ]: 49798 : const auto& wtx = mit->second;
809 [ + + ]: 49798 : if (wtx.isConfirmed()) return SpendType::CONFIRMED;
810 [ + + ]: 1823 : if (wtx.InMempool()) {
811 : : st = SpendType::MEMPOOL;
812 [ + + + + : 2167 : } else if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted()) {
+ + ]
813 [ + + ]: 151 : if (st == SpendType::UNSPENT) st = SpendType::NONMEMPOOL;
814 : : }
815 : : }
816 : : }
817 : : return st;
818 : : }
819 : :
820 : 13379 : void CWallet::AddToSpends(const COutPoint& outpoint, const Txid& txid)
821 : : {
822 : 13379 : mapTxSpends.insert(std::make_pair(outpoint, txid));
823 : :
824 : 13379 : UnlockCoin(outpoint);
825 : :
826 : 13379 : std::pair<TxSpends::iterator, TxSpends::iterator> range;
827 : 13379 : range = mapTxSpends.equal_range(outpoint);
828 : 13379 : SyncMetaData(range);
829 : 13379 : }
830 : :
831 : :
832 : 27404 : void CWallet::AddToSpends(const CWalletTx& wtx)
833 : : {
834 [ + + ]: 27404 : if (wtx.IsCoinBase()) // Coinbases don't spend anything!
835 : : return;
836 : :
837 [ + + ]: 20032 : for (const CTxIn& txin : wtx.tx->vin)
838 : 13379 : AddToSpends(txin.prevout, wtx.GetHash());
839 : : }
840 : :
841 : 22 : bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
842 : : {
843 : : // Only descriptor wallets can be encrypted
844 [ - + ]: 22 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
845 : :
846 [ + - ]: 22 : if (HasEncryptionKeys())
847 : : return false;
848 : :
849 : 22 : CKeyingMaterial plain_master_key;
850 : :
851 [ + - ]: 22 : plain_master_key.resize(WALLET_CRYPTO_KEY_SIZE);
852 [ - + ]: 22 : GetStrongRandBytes(plain_master_key);
853 : :
854 [ + - ]: 22 : CMasterKey master_key;
855 : :
856 [ + - ]: 22 : master_key.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE);
857 [ - + ]: 22 : GetStrongRandBytes(master_key.vchSalt);
858 : :
859 [ + - + - ]: 22 : if (!EncryptMasterKey(strWalletPassphrase, plain_master_key, master_key)) {
860 : : return false;
861 : : }
862 [ + - ]: 22 : WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", master_key.nDeriveIterations);
863 : :
864 : 22 : {
865 [ + - + - ]: 22 : LOCK2(m_relock_mutex, cs_wallet);
866 [ + - + - ]: 22 : mapMasterKeys[++nMasterKeyMaxID] = master_key;
867 [ + - + - ]: 22 : WalletBatch* encrypted_batch = new WalletBatch(GetDatabase());
868 [ + - - + ]: 22 : if (!encrypted_batch->TxnBegin()) {
869 [ # # ]: 0 : delete encrypted_batch;
870 : 0 : encrypted_batch = nullptr;
871 [ # # ]: 0 : return false;
872 : : }
873 [ + - ]: 22 : encrypted_batch->WriteMasterKey(nMasterKeyMaxID, master_key);
874 : :
875 [ + + ]: 108 : for (const auto& spk_man_pair : m_spk_managers) {
876 [ + - ]: 86 : auto spk_man = spk_man_pair.second.get();
877 [ + - - + ]: 86 : if (!spk_man->Encrypt(plain_master_key, encrypted_batch)) {
878 [ # # ]: 0 : encrypted_batch->TxnAbort();
879 : 0 : delete encrypted_batch;
880 : 0 : encrypted_batch = nullptr;
881 : : // We now probably have half of our keys encrypted in memory, and half not...
882 : : // die and let the user reload the unencrypted wallet.
883 : 0 : assert(false);
884 : : }
885 : : }
886 : :
887 [ + - - + ]: 22 : if (!encrypted_batch->TxnCommit()) {
888 [ # # ]: 0 : delete encrypted_batch;
889 : 0 : encrypted_batch = nullptr;
890 : : // We now have keys encrypted in memory, but not on disk...
891 : : // die to avoid confusion and let the user reload the unencrypted wallet.
892 : 0 : assert(false);
893 : : }
894 : :
895 [ + - ]: 44 : delete encrypted_batch;
896 : 22 : encrypted_batch = nullptr;
897 : :
898 [ + - ]: 22 : Lock();
899 [ + - ]: 22 : Unlock(strWalletPassphrase);
900 : :
901 : : // Make new descriptors with a new seed
902 [ + - + + ]: 22 : if (!IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
903 [ + - ]: 10 : SetupDescriptorScriptPubKeyMans();
904 : : }
905 [ + - ]: 22 : Lock();
906 : :
907 : : // Need to completely rewrite the wallet file; if we don't, the database might keep
908 : : // bits of the unencrypted private key in slack space in the database file.
909 [ + - ]: 22 : GetDatabase().Rewrite();
910 [ - - + - ]: 22 : }
911 [ + - ]: 22 : NotifyStatusChanged(this);
912 : :
913 : : return true;
914 : 22 : }
915 : :
916 : 0 : DBErrors CWallet::ReorderTransactions()
917 : : {
918 : 0 : LOCK(cs_wallet);
919 [ # # ]: 0 : WalletBatch batch(GetDatabase());
920 : :
921 : : // Old wallets didn't have any defined order for transactions
922 : : // Probably a bad idea to change the output of this
923 : :
924 : : // First: get all CWalletTx into a sorted-by-time multimap.
925 : 0 : typedef std::multimap<int64_t, CWalletTx*> TxItems;
926 : 0 : TxItems txByTime;
927 : :
928 [ # # # # ]: 0 : for (auto& entry : mapWallet)
929 : : {
930 : 0 : CWalletTx* wtx = &entry.second;
931 [ # # ]: 0 : txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx));
932 : : }
933 : :
934 : 0 : nOrderPosNext = 0;
935 : 0 : std::vector<int64_t> nOrderPosOffsets;
936 [ # # ]: 0 : for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it)
937 : : {
938 [ # # ]: 0 : CWalletTx *const pwtx = (*it).second;
939 : 0 : int64_t& nOrderPos = pwtx->nOrderPos;
940 : :
941 [ # # ]: 0 : if (nOrderPos == -1)
942 : : {
943 : 0 : nOrderPos = nOrderPosNext++;
944 [ # # ]: 0 : nOrderPosOffsets.push_back(nOrderPos);
945 : :
946 [ # # # # ]: 0 : if (!batch.WriteTx(*pwtx))
947 : : return DBErrors::LOAD_FAIL;
948 : : }
949 : : else
950 : : {
951 : 0 : int64_t nOrderPosOff = 0;
952 [ # # ]: 0 : for (const int64_t& nOffsetStart : nOrderPosOffsets)
953 : : {
954 [ # # ]: 0 : if (nOrderPos >= nOffsetStart)
955 : 0 : ++nOrderPosOff;
956 : : }
957 : 0 : nOrderPos += nOrderPosOff;
958 [ # # ]: 0 : nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1);
959 : :
960 [ # # ]: 0 : if (!nOrderPosOff)
961 : 0 : continue;
962 : :
963 : : // Since we're changing the order, write it back
964 [ # # # # ]: 0 : if (!batch.WriteTx(*pwtx))
965 : : return DBErrors::LOAD_FAIL;
966 : : }
967 : : }
968 [ # # ]: 0 : batch.WriteOrderPosNext(nOrderPosNext);
969 : :
970 : : return DBErrors::LOAD_OK;
971 [ # # ]: 0 : }
972 : :
973 : 18984 : int64_t CWallet::IncOrderPosNext(WalletBatch* batch)
974 : : {
975 : 18984 : AssertLockHeld(cs_wallet);
976 : 18984 : int64_t nRet = nOrderPosNext++;
977 [ + - ]: 18984 : if (batch) {
978 : 18984 : batch->WriteOrderPosNext(nOrderPosNext);
979 : : } else {
980 [ # # ]: 0 : WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext);
981 : : }
982 : 18984 : return nRet;
983 : : }
984 : :
985 : 859 : void CWallet::MarkDirty()
986 : : {
987 : 859 : {
988 : 859 : LOCK(cs_wallet);
989 [ + + + - ]: 3958 : for (auto& [_, wtx] : mapWallet)
990 : 3099 : wtx.MarkDirty();
991 : 859 : }
992 : 859 : }
993 : :
994 : 98 : bool CWallet::MarkReplaced(const Txid& originalHash, const Txid& newHash)
995 : : {
996 : 98 : LOCK(cs_wallet);
997 : :
998 : 98 : auto mi = mapWallet.find(originalHash);
999 : :
1000 : : // There is a bug if MarkReplaced is not called on an existing wallet transaction.
1001 [ - + ]: 98 : assert(mi != mapWallet.end());
1002 : :
1003 [ + - ]: 98 : CWalletTx& wtx = (*mi).second;
1004 : :
1005 : : // Ensure for now that we're not overwriting data
1006 [ + - - + ]: 98 : assert(!wtx.mapValue.contains("replaced_by_txid"));
1007 : :
1008 [ + - + - : 98 : wtx.mapValue["replaced_by_txid"] = newHash.ToString();
+ - ]
1009 : :
1010 : : // Refresh mempool status without waiting for transactionRemovedFromMempool or transactionAddedToMempool
1011 [ + - ]: 98 : RefreshMempoolStatus(wtx, chain());
1012 : :
1013 [ + - ]: 98 : WalletBatch batch(GetDatabase());
1014 : :
1015 : 98 : bool success = true;
1016 [ + - - + ]: 98 : if (!batch.WriteTx(wtx)) {
1017 [ # # # # ]: 0 : WalletLogPrintf("%s: Updating batch tx %s failed\n", __func__, wtx.GetHash().ToString());
1018 : 0 : success = false;
1019 : : }
1020 : :
1021 [ + - ]: 98 : NotifyTransactionChanged(originalHash, CT_UPDATED);
1022 : :
1023 : 98 : return success;
1024 [ + - ]: 196 : }
1025 : :
1026 : 2025 : void CWallet::SetSpentKeyState(WalletBatch& batch, const Txid& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations)
1027 : : {
1028 : 2025 : AssertLockHeld(cs_wallet);
1029 : 2025 : const CWalletTx* srctx = GetWalletTx(hash);
1030 [ + + ]: 2025 : if (!srctx) return;
1031 : :
1032 : 1883 : CTxDestination dst;
1033 [ + - + - ]: 1883 : if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) {
1034 [ + - + + ]: 1883 : if (IsMine(dst)) {
1035 [ + - + + ]: 1208 : if (used != IsAddressPreviouslySpent(dst)) {
1036 [ + - ]: 19 : if (used) {
1037 [ + - ]: 19 : tx_destinations.insert(dst);
1038 : : }
1039 [ + - ]: 19 : SetAddressPreviouslySpent(batch, dst, used);
1040 : : }
1041 : : }
1042 : : }
1043 : 1883 : }
1044 : :
1045 : 439 : bool CWallet::IsSpentKey(const CScript& scriptPubKey) const
1046 : : {
1047 : 439 : AssertLockHeld(cs_wallet);
1048 : 439 : CTxDestination dest;
1049 [ + - + - ]: 439 : if (!ExtractDestination(scriptPubKey, dest)) {
1050 : : return false;
1051 : : }
1052 [ + - + + ]: 439 : if (IsAddressPreviouslySpent(dest)) {
1053 : 6 : return true;
1054 : : }
1055 : : return false;
1056 : 439 : }
1057 : :
1058 : 26465 : CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const TxState& state, const UpdateWalletTxFn& update_wtx, bool rescanning_old_block)
1059 : : {
1060 : 26465 : LOCK(cs_wallet);
1061 : :
1062 [ + - ]: 26465 : WalletBatch batch(GetDatabase());
1063 : :
1064 [ + - ]: 26465 : Txid hash = tx->GetHash();
1065 : :
1066 [ + - + + ]: 26465 : if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
1067 : : // Mark used destinations
1068 : 862 : std::set<CTxDestination> tx_destinations;
1069 : :
1070 [ + + ]: 2887 : for (const CTxIn& txin : tx->vin) {
1071 : 2025 : const COutPoint& op = txin.prevout;
1072 [ + - ]: 2025 : SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations);
1073 : : }
1074 : :
1075 [ + - ]: 862 : MarkDestinationsDirty(tx_destinations);
1076 : 862 : }
1077 : :
1078 : : // Inserts only if not already there, returns tx inserted or tx found
1079 [ + - ]: 26465 : auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(tx, state));
1080 [ + + ]: 26465 : CWalletTx& wtx = (*ret.first).second;
1081 : 26465 : bool fInsertedNew = ret.second;
1082 [ + + + - : 26465 : bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew);
- + ]
1083 [ + + ]: 26465 : if (fInsertedNew) {
1084 [ + - ]: 18984 : wtx.nTimeReceived = GetTime();
1085 [ + - ]: 18984 : wtx.nOrderPos = IncOrderPosNext(&batch);
1086 [ + - + - ]: 18984 : wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1087 [ + - ]: 18984 : wtx.nTimeSmart = ComputeTimeSmart(wtx, rescanning_old_block);
1088 [ + - ]: 18984 : AddToSpends(wtx);
1089 : :
1090 : : // Update birth time when tx time is older than it.
1091 [ + - + - ]: 18984 : MaybeUpdateBirthTime(wtx.GetTxTime());
1092 : : }
1093 : :
1094 : 7481 : if (!fInsertedNew)
1095 : : {
1096 [ + + ]: 7481 : if (state.index() != wtx.m_state.index()) {
1097 : 4372 : wtx.m_state = state;
1098 : 4372 : fUpdated = true;
1099 : : } else {
1100 [ - + ]: 3109 : assert(TxStateSerializedIndex(wtx.m_state) == TxStateSerializedIndex(state));
1101 [ - + ]: 3109 : assert(TxStateSerializedBlockHash(wtx.m_state) == TxStateSerializedBlockHash(state));
1102 : : }
1103 : : // If we have a witness-stripped version of this transaction, and we
1104 : : // see a new version with a witness, then we must be upgrading a pre-segwit
1105 : : // wallet. Store the new version of the transaction with the witness,
1106 : : // as the stripped-version must be invalid.
1107 : : // TODO: Store all versions of the transaction, instead of just one.
1108 [ + + - + ]: 7481 : if (tx->HasWitness() && !wtx.tx->HasWitness()) {
1109 [ # # # # ]: 0 : wtx.SetTx(tx);
1110 : 0 : fUpdated = true;
1111 : : }
1112 : : }
1113 : :
1114 : : // Mark inactive coinbase transactions and their descendants as abandoned
1115 [ + + ]: 26465 : if (wtx.IsCoinBase() && wtx.isInactive()) {
1116 [ + - ]: 540 : std::vector<CWalletTx*> txs{&wtx};
1117 : :
1118 : 540 : TxStateInactive inactive_state = TxStateInactive{/*abandoned=*/true};
1119 : :
1120 [ + + ]: 1081 : while (!txs.empty()) {
1121 : 541 : CWalletTx* desc_tx = txs.back();
1122 [ + + ]: 541 : txs.pop_back();
1123 [ + + ]: 541 : desc_tx->m_state = inactive_state;
1124 : : // Break caches since we have changed the state
1125 : 541 : desc_tx->MarkDirty();
1126 [ + - ]: 541 : batch.WriteTx(*desc_tx);
1127 [ + - ]: 541 : MarkInputsDirty(desc_tx->tx);
1128 [ - + + + ]: 1623 : for (unsigned int i = 0; i < desc_tx->tx->vout.size(); ++i) {
1129 : 1082 : COutPoint outpoint(desc_tx->GetHash(), i);
1130 : 1082 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(outpoint);
1131 [ + + ]: 1083 : for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
1132 : 1 : const auto wit = mapWallet.find(it->second);
1133 [ + - ]: 1 : if (wit != mapWallet.end()) {
1134 [ + - ]: 1 : txs.push_back(&wit->second);
1135 : : }
1136 : : }
1137 : : }
1138 : : }
1139 : 540 : }
1140 : :
1141 : : //// debug print
1142 [ + - ]: 26465 : std::string status{"no-change"};
1143 [ + + ]: 26465 : if (fInsertedNew || fUpdated) {
1144 [ + + + + ]: 23357 : status = fInsertedNew ? (fUpdated ? "new, update" : "new") : "update";
1145 : : }
1146 [ + - + - ]: 79395 : WalletLogPrintf("AddToWallet %s %s %s", hash.ToString(), status, TxStateString(state));
1147 : :
1148 : : // Write to disk
1149 [ + + ]: 26465 : if (fInsertedNew || fUpdated)
1150 [ + - + - ]: 23357 : if (!batch.WriteTx(wtx))
1151 : : return nullptr;
1152 : :
1153 : : // Break debit/credit balance caches:
1154 : 26465 : wtx.MarkDirty();
1155 : :
1156 : : // Cache the outputs that belong to the wallet
1157 [ + - ]: 26465 : RefreshTXOsFromTx(wtx);
1158 : :
1159 : : // Notify UI of new or updated transaction
1160 [ + + + - ]: 33946 : NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED);
1161 : :
1162 : : #if HAVE_SYSTEM
1163 : : // notify an external script when a wallet transaction comes in or is updated
1164 [ - + ]: 26465 : std::string strCmd = m_notify_tx_changed_script;
1165 : :
1166 [ + + ]: 26465 : if (!strCmd.empty())
1167 : : {
1168 [ + - + - : 52 : ReplaceAll(strCmd, "%s", hash.GetHex());
+ - ]
1169 [ + + ]: 26 : if (auto* conf = wtx.state<TxStateConfirmed>())
1170 : : {
1171 [ + - + - : 44 : ReplaceAll(strCmd, "%b", conf->confirmed_block_hash.GetHex());
+ - ]
1172 [ + - + - : 44 : ReplaceAll(strCmd, "%h", ToString(conf->confirmed_block_height));
+ - ]
1173 : : } else {
1174 [ + - + - : 8 : ReplaceAll(strCmd, "%b", "unconfirmed");
+ - ]
1175 [ + - + - : 8 : ReplaceAll(strCmd, "%h", "-1");
+ - ]
1176 : : }
1177 : : #ifndef WIN32
1178 : : // Substituting the wallet name isn't currently supported on windows
1179 : : // because windows shell escaping has not been implemented yet:
1180 : : // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
1181 : : // A few ways it could be implemented in the future are described in:
1182 : : // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
1183 [ + - + - : 52 : ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
+ - ]
1184 : : #endif
1185 [ + - ]: 26 : std::thread t(runCommand, strCmd);
1186 [ + - ]: 26 : t.detach(); // thread runs free
1187 : 26 : }
1188 : : #endif
1189 : :
1190 : 26465 : return &wtx;
1191 [ + - ]: 105860 : }
1192 : :
1193 : 8420 : bool CWallet::LoadToWallet(const Txid& hash, const UpdateWalletTxFn& fill_wtx)
1194 : : {
1195 : 8420 : const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(nullptr, TxStateInactive{}));
1196 : 8420 : CWalletTx& wtx = ins.first->second;
1197 [ + - ]: 8420 : if (!fill_wtx(wtx, ins.second)) {
1198 : : return false;
1199 : : }
1200 : : // If wallet doesn't have a chain (e.g when using bitcoin-wallet tool),
1201 : : // don't bother to update txn.
1202 [ + + ]: 8420 : if (HaveChain()) {
1203 : 8342 : wtx.updateState(chain());
1204 : : }
1205 [ + - ]: 8420 : if (/* insertion took place */ ins.second) {
1206 : 8420 : wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1207 : : }
1208 : 8420 : AddToSpends(wtx);
1209 [ + + ]: 17014 : for (const CTxIn& txin : wtx.tx->vin) {
1210 : 8594 : auto it = mapWallet.find(txin.prevout.hash);
1211 [ + + ]: 8594 : if (it != mapWallet.end()) {
1212 [ + + ]: 474 : CWalletTx& prevtx = it->second;
1213 [ + + ]: 8600 : if (auto* prev = prevtx.state<TxStateBlockConflicted>()) {
1214 : 6 : MarkConflicted(prev->conflicting_block_hash, prev->conflicting_block_height, wtx.GetHash());
1215 : : }
1216 : : }
1217 : : }
1218 : :
1219 : : // Update birth time when tx time is older than it.
1220 : 8420 : MaybeUpdateBirthTime(wtx.GetTxTime());
1221 : :
1222 : : // Make sure the tx outputs are known by the wallet
1223 : 8420 : RefreshTXOsFromTx(wtx);
1224 : 8420 : return true;
1225 : : }
1226 : :
1227 : 155895 : bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, const SyncTxState& state, bool fUpdate, bool rescanning_old_block)
1228 : : {
1229 [ + + ]: 155895 : const CTransaction& tx = *ptx;
1230 : 155895 : {
1231 : 155895 : AssertLockHeld(cs_wallet);
1232 : :
1233 [ + + ]: 155895 : if (auto* conf = std::get_if<TxStateConfirmed>(&state)) {
1234 [ + + ]: 328471 : for (const CTxIn& txin : tx.vin) {
1235 : 183469 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout);
1236 [ + + ]: 191449 : while (range.first != range.second) {
1237 [ + + ]: 7980 : if (range.first->second != tx.GetHash()) {
1238 [ + - + - : 328 : WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), conf->confirmed_block_hash.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n);
+ - + - ]
1239 : 164 : MarkConflicted(conf->confirmed_block_hash, conf->confirmed_block_height, range.first->second);
1240 : : }
1241 : 7980 : range.first++;
1242 : : }
1243 : : }
1244 : : }
1245 : :
1246 : 155895 : bool fExisted = mapWallet.contains(tx.GetHash());
1247 [ + - ]: 155895 : if (fExisted && !fUpdate) return false;
1248 [ + + + + : 155895 : if (fExisted || IsMine(tx) || IsFromMe(tx))
+ + ]
1249 : : {
1250 : : /* Check if any keys in the wallet keypool that were supposed to be unused
1251 : : * have appeared in a new transaction. If so, remove those keys from the keypool.
1252 : : * This can happen when restoring an old wallet backup that does not contain
1253 : : * the mostly recently created transactions from newer versions of the wallet.
1254 : : */
1255 : :
1256 : : // loop though all outputs
1257 [ + + ]: 133610 : for (const CTxOut& txout: tx.vout) {
1258 [ + + ]: 155570 : for (const auto& spk_man : GetScriptPubKeyMans(txout.scriptPubKey)) {
1259 [ + - + + ]: 71321 : for (auto &dest : spk_man->MarkUnusedAddresses(txout.scriptPubKey)) {
1260 : : // If internal flag is not defined try to infer it from the ScriptPubKeyMan
1261 [ + - ]: 24443 : if (!dest.internal.has_value()) {
1262 [ + - ]: 24443 : dest.internal = IsInternalScriptPubKeyMan(spk_man);
1263 : : }
1264 : :
1265 : : // skip if can't determine whether it's a receiving address or not
1266 [ + + ]: 24443 : if (!dest.internal.has_value()) continue;
1267 : :
1268 : : // If this is a receiving address and it's not in the address book yet
1269 : : // (e.g. it wasn't generated on this node or we're restoring from backup)
1270 : : // add it to the address book for proper transaction accounting
1271 [ + + + - : 16238 : if (!*dest.internal && !FindAddressBookEntry(dest.dest, /* allow_change= */ false)) {
+ + ]
1272 [ + - + - ]: 20352 : SetAddressBook(dest.dest, "", AddressPurpose::RECEIVE);
1273 : : }
1274 : 46878 : }
1275 : 108692 : }
1276 : : }
1277 : :
1278 : : // Block disconnection override an abandoned tx as unconfirmed
1279 : : // which means user may have to call abandontransaction again
1280 [ + - ]: 49836 : TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);
1281 [ + - + - : 74754 : CWalletTx* wtx = AddToWallet(MakeTransactionRef(tx), tx_state, /*update_wtx=*/nullptr, rescanning_old_block);
+ - ]
1282 [ - + ]: 24918 : if (!wtx) {
1283 : : // Can only be nullptr if there was a db write error (missing db, read-only db or a db engine internal writing error).
1284 : : // As we only store arriving transaction in this process, and we don't want an inconsistent state, let's throw an error.
1285 [ # # ]: 0 : throw std::runtime_error("DB error adding transaction to wallet, write failed");
1286 : : }
1287 : : return true;
1288 : : }
1289 : : }
1290 : : return false;
1291 : : }
1292 : :
1293 : 0 : bool CWallet::TransactionCanBeAbandoned(const Txid& hashTx) const
1294 : : {
1295 : 0 : LOCK(cs_wallet);
1296 [ # # ]: 0 : const CWalletTx* wtx = GetWalletTx(hashTx);
1297 [ # # # # : 0 : return wtx && !wtx->isAbandoned() && GetTxDepthInMainChain(*wtx) == 0 && !wtx->InMempool();
# # # # #
# # # ]
1298 : 0 : }
1299 : :
1300 : 62 : void CWallet::UpdateTrucSiblingConflicts(const CWalletTx& parent_wtx, const Txid& child_txid, bool add_conflict) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet)
1301 : : {
1302 : : // Find all other txs in our wallet that spend utxos from this parent
1303 : : // so that we can mark them as mempool-conflicted by this new tx.
1304 [ - + + + ]: 242 : for (long unsigned int i = 0; i < parent_wtx.tx->vout.size(); i++) {
1305 [ + + ]: 225 : for (auto range = mapTxSpends.equal_range(COutPoint(parent_wtx.tx->GetHash(), i)); range.first != range.second; range.first++) {
1306 [ + + ]: 45 : const Txid& sibling_txid = range.first->second;
1307 : : // Skip the child_tx itself
1308 [ + + ]: 45 : if (sibling_txid == child_txid) continue;
1309 [ + - ]: 34 : RecursiveUpdateTxState(/*batch=*/nullptr, sibling_txid, [&child_txid, add_conflict](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1310 [ + + + + ]: 17 : return add_conflict ? (wtx.mempool_conflicts.insert(child_txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED)
1311 [ + + ]: 9 : : (wtx.mempool_conflicts.erase(child_txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED);
1312 : : });
1313 : : }
1314 : : }
1315 : 62 : }
1316 : :
1317 : 31121 : void CWallet::MarkInputsDirty(const CTransactionRef& tx)
1318 : : {
1319 [ + + ]: 73058 : for (const CTxIn& txin : tx->vin) {
1320 : 41937 : auto it = mapWallet.find(txin.prevout.hash);
1321 [ + + ]: 64152 : if (it != mapWallet.end()) {
1322 : 22215 : it->second.MarkDirty();
1323 : : }
1324 : : }
1325 : 31121 : }
1326 : :
1327 : 9 : bool CWallet::AbandonTransaction(const Txid& hashTx)
1328 : : {
1329 : 9 : LOCK(cs_wallet);
1330 : 9 : auto it = mapWallet.find(hashTx);
1331 [ - + ]: 9 : assert(it != mapWallet.end());
1332 [ + - + - ]: 9 : return AbandonTransaction(it->second);
1333 : 9 : }
1334 : :
1335 : 441 : bool CWallet::AbandonTransaction(CWalletTx& tx)
1336 : : {
1337 : : // Can't mark abandoned if confirmed or in mempool
1338 [ + + + + ]: 441 : if (GetTxDepthInMainChain(tx) != 0 || tx.InMempool()) {
1339 : 3 : return false;
1340 : : }
1341 : :
1342 : 898 : auto try_updating_state = [](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1343 : : // If the orig tx was not in block/mempool, none of its spends can be.
1344 [ + - ]: 460 : assert(!wtx.isConfirmed());
1345 [ - + ]: 460 : assert(!wtx.InMempool());
1346 : : // If already conflicted or abandoned, no need to set abandoned
1347 [ + - + - ]: 460 : if (!wtx.isBlockConflicted() && !wtx.isAbandoned()) {
1348 [ + - ]: 351 : wtx.m_state = TxStateInactive{/*abandoned=*/true};
1349 : 351 : return TxUpdate::NOTIFY_CHANGED;
1350 : : }
1351 : : return TxUpdate::UNCHANGED;
1352 : : };
1353 : :
1354 : : // Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too.
1355 : : // States are not permanent, so these transactions can become unabandoned if they are re-added to the
1356 : : // mempool, or confirmed in a block, or conflicted.
1357 : : // Note: If the reorged coinbase is re-added to the main chain, the descendants that have not had their
1358 : : // states change will remain abandoned and will require manual broadcast if the user wants them.
1359 : :
1360 [ + - ]: 438 : RecursiveUpdateTxState(tx.GetHash(), try_updating_state);
1361 : :
1362 : 438 : return true;
1363 : : }
1364 : :
1365 : 170 : void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const Txid& hashTx)
1366 : : {
1367 : 170 : LOCK(cs_wallet);
1368 : :
1369 : : // If number of conflict confirms cannot be determined, this means
1370 : : // that the block is still unknown or not yet part of the main chain,
1371 : : // for example when loading the wallet during a reindex. Do nothing in that
1372 : : // case.
1373 [ + + + - ]: 170 : if (m_last_block_processed_height < 0 || conflicting_height < 0) {
1374 : : return;
1375 : : }
1376 : 164 : int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1;
1377 [ + - ]: 164 : if (conflictconfirms >= 0)
1378 : : return;
1379 : :
1380 : 337 : auto try_updating_state = [&](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1381 [ + + ]: 173 : if (conflictconfirms < GetTxDepthInMainChain(wtx)) {
1382 : : // Block is 'more conflicted' than current confirm; update.
1383 : : // Mark transaction as conflicted with this block.
1384 : 159 : wtx.m_state = TxStateBlockConflicted{hashBlock, conflicting_height};
1385 : 159 : return TxUpdate::CHANGED;
1386 : : }
1387 : : return TxUpdate::UNCHANGED;
1388 : 164 : };
1389 : :
1390 : : // Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too.
1391 [ + - + - : 328 : RecursiveUpdateTxState(hashTx, try_updating_state);
+ - ]
1392 : :
1393 : 170 : }
1394 : :
1395 : 610 : void CWallet::RecursiveUpdateTxState(const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1396 : 610 : WalletBatch batch(GetDatabase());
1397 [ + - ]: 610 : RecursiveUpdateTxState(&batch, tx_hash, try_updating_state);
1398 : 610 : }
1399 : :
1400 : 16933 : void CWallet::RecursiveUpdateTxState(WalletBatch* batch, const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1401 [ + - ]: 16933 : std::set<Txid> todo;
1402 : 16933 : std::set<Txid> done;
1403 : :
1404 [ + - ]: 16933 : todo.insert(tx_hash);
1405 : :
1406 [ + + ]: 33918 : while (!todo.empty()) {
1407 : 16985 : Txid now = *todo.begin();
1408 : 16985 : todo.erase(now);
1409 [ + - ]: 16985 : done.insert(now);
1410 : 16985 : auto it = mapWallet.find(now);
1411 [ - + ]: 16985 : assert(it != mapWallet.end());
1412 [ + - ]: 16985 : CWalletTx& wtx = it->second;
1413 : :
1414 [ + - ]: 16985 : TxUpdate update_state = try_updating_state(wtx);
1415 [ + + ]: 16985 : if (update_state != TxUpdate::UNCHANGED) {
1416 : 5662 : wtx.MarkDirty();
1417 [ + + + - ]: 5662 : if (batch) batch->WriteTx(wtx);
1418 : : // Iterate over all its outputs, and update those tx states as well (if applicable)
1419 [ - + + + ]: 17024 : for (unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
1420 : 11362 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(COutPoint(now, i));
1421 [ + + ]: 11414 : for (TxSpends::const_iterator iter = range.first; iter != range.second; ++iter) {
1422 [ + - ]: 52 : if (!done.contains(iter->second)) {
1423 [ + - ]: 52 : todo.insert(iter->second);
1424 : : }
1425 : : }
1426 : : }
1427 : :
1428 [ + + ]: 5662 : if (update_state == TxUpdate::NOTIFY_CHANGED) {
1429 [ + - ]: 351 : NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED);
1430 : : }
1431 : :
1432 : : // If a transaction changes its tx state, that usually changes the balance
1433 : : // available of the outputs it spends. So force those to be recomputed
1434 [ + - ]: 5662 : MarkInputsDirty(wtx.tx);
1435 : : }
1436 : : }
1437 : 16933 : }
1438 : :
1439 : 155895 : bool CWallet::SyncTransaction(const CTransactionRef& ptx, const SyncTxState& state, bool update_tx, bool rescanning_old_block)
1440 : : {
1441 [ + + ]: 155895 : if (!AddToWalletIfInvolvingMe(ptx, state, update_tx, rescanning_old_block))
1442 : : return false; // Not one of ours
1443 : :
1444 : : // If a transaction changes 'conflicted' state, that changes the balance
1445 : : // available of the outputs it spends. So force those to be
1446 : : // recomputed, also:
1447 : 24918 : MarkInputsDirty(ptx);
1448 : 24918 : return true;
1449 : : }
1450 : :
1451 : 7375 : void CWallet::transactionAddedToMempool(const CTransactionRef& tx) {
1452 : 7375 : LOCK(cs_wallet);
1453 [ + - ]: 7375 : SyncTransaction(tx, TxStateInMempool{});
1454 : :
1455 : 7375 : auto it = mapWallet.find(tx->GetHash());
1456 [ + + ]: 7375 : if (it != mapWallet.end()) {
1457 [ + - ]: 3747 : RefreshMempoolStatus(it->second, chain());
1458 : : }
1459 : :
1460 : 7375 : const Txid& txid = tx->GetHash();
1461 : :
1462 [ + + ]: 20997 : for (const CTxIn& tx_in : tx->vin) {
1463 : : // For each wallet transaction spending this prevout..
1464 [ + + ]: 24643 : for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1465 [ + + ]: 11021 : const Txid& spent_id = range.first->second;
1466 : : // Skip the recently added tx
1467 [ + + ]: 11021 : if (spent_id == txid) continue;
1468 [ + - ]: 5158 : RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1469 [ + + ]: 2588 : return wtx.mempool_conflicts.insert(txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1470 : : });
1471 : : }
1472 : :
1473 : : }
1474 : :
1475 [ + + ]: 7375 : if (tx->version == TRUC_VERSION) {
1476 : : // Unconfirmed TRUC transactions are only allowed a 1-parent-1-child topology.
1477 : : // For any unconfirmed v3 parents (there should be a maximum of 1 except in reorgs),
1478 : : // record this child so the wallet doesn't try to spend any other outputs
1479 [ + + ]: 576 : for (const CTxIn& tx_in : tx->vin) {
1480 : 411 : auto parent_it = mapWallet.find(tx_in.prevout.hash);
1481 [ + + ]: 583 : if (parent_it != mapWallet.end()) {
1482 [ + + ]: 172 : CWalletTx& parent_wtx = parent_it->second;
1483 [ + + ]: 172 : if (parent_wtx.isUnconfirmed()) {
1484 [ - + ]: 31 : parent_wtx.truc_child_in_mempool = tx->GetHash();
1485 : : // Even though these siblings do not spend the same utxos, they can't
1486 : : // be present in the mempool at the same time because of TRUC policy rules
1487 [ + - ]: 31 : UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/true);
1488 : : }
1489 : : }
1490 : : }
1491 : : }
1492 : 7375 : }
1493 : :
1494 : 50658 : void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason) {
1495 : 50658 : LOCK(cs_wallet);
1496 : 50658 : auto it = mapWallet.find(tx->GetHash());
1497 [ + + ]: 50658 : if (it != mapWallet.end()) {
1498 [ + - ]: 14901 : RefreshMempoolStatus(it->second, chain());
1499 : : }
1500 : : // Handle transactions that were removed from the mempool because they
1501 : : // conflict with transactions in a newly connected block.
1502 [ + + ]: 50658 : if (reason == MemPoolRemovalReason::CONFLICT) {
1503 : : // Trigger external -walletnotify notifications for these transactions.
1504 : : // Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons:
1505 : : //
1506 : : // 1. The transactionRemovedFromMempool callback does not currently
1507 : : // provide the conflicting block's hash and height, and for backwards
1508 : : // compatibility reasons it may not be not safe to store conflicted
1509 : : // wallet transactions with a null block hash. See
1510 : : // https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993.
1511 : : // 2. For most of these transactions, the wallet's internal conflict
1512 : : // detection in the blockConnected handler will subsequently call
1513 : : // MarkConflicted and update them with CONFLICTED status anyway. This
1514 : : // applies to any wallet transaction that has inputs spent in the
1515 : : // block, or that has ancestors in the wallet with inputs spent by
1516 : : // the block.
1517 : : // 3. Longstanding behavior since the sync implementation in
1518 : : // https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync
1519 : : // implementation before that was to mark these transactions
1520 : : // unconfirmed rather than conflicted.
1521 : : //
1522 : : // Nothing described above should be seen as an unchangeable requirement
1523 : : // when improving this code in the future. The wallet's heuristics for
1524 : : // distinguishing between conflicted and unconfirmed transactions are
1525 : : // imperfect, and could be improved in general, see
1526 : : // https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking
1527 [ + - ]: 14 : SyncTransaction(tx, TxStateInactive{});
1528 : : }
1529 : :
1530 : 50658 : const Txid& txid = tx->GetHash();
1531 : :
1532 [ + + ]: 109015 : for (const CTxIn& tx_in : tx->vin) {
1533 : : // Iterate over all wallet transactions spending txin.prev
1534 : : // and recursively mark them as no longer conflicting with
1535 : : // txid
1536 [ + + ]: 72084 : for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1537 [ + - ]: 13727 : const Txid& spent_id = range.first->second;
1538 : :
1539 [ + - ]: 27454 : RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1540 [ + + ]: 13735 : return wtx.mempool_conflicts.erase(txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1541 : : });
1542 : : }
1543 : : }
1544 : :
1545 [ + + ]: 50658 : if (tx->version == TRUC_VERSION) {
1546 : : // If this tx has a parent, unset its truc_child_in_mempool to make it possible
1547 : : // to spend from the parent again. If this tx was replaced by another
1548 : : // child of the same parent, transactionAddedToMempool
1549 : : // will update truc_child_in_mempool
1550 [ + + ]: 1244 : for (const CTxIn& tx_in : tx->vin) {
1551 : 860 : auto parent_it = mapWallet.find(tx_in.prevout.hash);
1552 [ + + ]: 1481 : if (parent_it != mapWallet.end()) {
1553 [ + + ]: 621 : CWalletTx& parent_wtx = parent_it->second;
1554 [ + + ]: 621 : if (parent_wtx.truc_child_in_mempool == tx->GetHash()) {
1555 [ + - ]: 31 : parent_wtx.truc_child_in_mempool = std::nullopt;
1556 [ + - ]: 31 : UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/false);
1557 : : }
1558 : : }
1559 : : }
1560 : : }
1561 : 50658 : }
1562 : :
1563 : 42260 : void CWallet::blockConnected(const ChainstateRole& role, const interfaces::BlockInfo& block)
1564 : : {
1565 [ + + ]: 42260 : if (role.historical) {
1566 : : return;
1567 : : }
1568 [ - + ]: 42160 : assert(block.data);
1569 : 42160 : LOCK(cs_wallet);
1570 : :
1571 : : // Update the best block in memory first. This will set the best block's height, which is
1572 : : // needed by MarkConflicted.
1573 [ + - ]: 42160 : SetLastBlockProcessedInMem(block.height, block.hash);
1574 : :
1575 : : // No need to scan block if it was created before the wallet birthday.
1576 : : // Uses chain max time and twice the grace period to adjust time for block time variability.
1577 [ + + + - ]: 42160 : if (block.chain_time_max < m_birth_time.load() - (TIMESTAMP_WINDOW * 2)) return;
1578 : :
1579 : : // Scan block
1580 : : bool wallet_updated = false;
1581 [ - + + + ]: 92098 : for (size_t index = 0; index < block.data->vtx.size(); index++) {
1582 [ + - ]: 50405 : wallet_updated |= SyncTransaction(block.data->vtx[index], TxStateConfirmed{block.hash, block.height, static_cast<int>(index)});
1583 [ + - ]: 50405 : transactionRemovedFromMempool(block.data->vtx[index], MemPoolRemovalReason::BLOCK);
1584 : : }
1585 : :
1586 : : // Update on disk if this block resulted in us updating a tx, or periodically every 144 blocks (~1 day)
1587 [ + + + + ]: 41693 : if (wallet_updated || block.height % 144 == 0) {
1588 [ + - ]: 12519 : WriteBestBlock();
1589 : : }
1590 : 42160 : }
1591 : :
1592 : 3448 : void CWallet::blockDisconnected(const interfaces::BlockInfo& block)
1593 : : {
1594 [ - + ]: 3448 : assert(block.data);
1595 : 3448 : LOCK(cs_wallet);
1596 : :
1597 : : // At block disconnection, this will change an abandoned transaction to
1598 : : // be unconfirmed, whether or not the transaction is added back to the mempool.
1599 : : // User may have to call abandontransaction again. It may be addressed in the
1600 : : // future with a stickier abandoned state or even removing abandontransaction call.
1601 : 3448 : int disconnect_height = block.height;
1602 : :
1603 [ - + + + ]: 6952 : for (size_t index = 0; index < block.data->vtx.size(); index++) {
1604 [ + - ]: 3504 : const CTransactionRef& ptx = block.data->vtx[index];
1605 : : // Coinbase transactions are not only inactive but also abandoned,
1606 : : // meaning they should never be relayed standalone via the p2p protocol.
1607 [ + - ]: 3504 : SyncTransaction(ptx, TxStateInactive{/*abandoned=*/index == 0});
1608 : :
1609 [ + + ]: 7113 : for (const CTxIn& tx_in : ptx->vin) {
1610 : : // No other wallet transactions conflicted with this transaction
1611 [ + + ]: 3609 : if (!mapTxSpends.contains(tx_in.prevout)) continue;
1612 : :
1613 : 89 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(tx_in.prevout);
1614 : :
1615 : : // For all of the spends that conflict with this transaction
1616 [ + + ]: 3706 : for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) {
1617 [ + + ]: 97 : CWalletTx& wtx = mapWallet.find(_it->second)->second;
1618 : :
1619 [ + + ]: 97 : if (!wtx.isBlockConflicted()) continue;
1620 : :
1621 : 20 : auto try_updating_state = [&](CWalletTx& tx) {
1622 [ + - ]: 12 : if (!tx.isBlockConflicted()) return TxUpdate::UNCHANGED;
1623 [ + + ]: 12 : if (tx.state<TxStateBlockConflicted>()->conflicting_block_height >= disconnect_height) {
1624 [ - + ]: 11 : tx.m_state = TxStateInactive{};
1625 : 11 : return TxUpdate::CHANGED;
1626 : : }
1627 : : return TxUpdate::UNCHANGED;
1628 : 8 : };
1629 : :
1630 [ + - ]: 16 : RecursiveUpdateTxState(wtx.tx->GetHash(), try_updating_state);
1631 : : }
1632 : : }
1633 : : }
1634 : :
1635 : : // Update the best block
1636 [ - + + - ]: 3448 : SetLastBlockProcessed(block.height - 1, *Assert(block.prev_hash));
1637 : 3448 : }
1638 : :
1639 : 40017 : void CWallet::updatedBlockTip()
1640 : : {
1641 : 40017 : m_best_block_time = GetTime();
1642 : 40017 : }
1643 : :
1644 : 6548 : void CWallet::BlockUntilSyncedToCurrentChain() const {
1645 : 6548 : AssertLockNotHeld(cs_wallet);
1646 : : // Skip the queue-draining stuff if we know we're caught up with
1647 : : // chain().Tip(), otherwise put a callback in the validation interface queue and wait
1648 : : // for the queue to drain enough to execute it (indicating we are caught up
1649 : : // at least with the time we entered this function).
1650 [ + - ]: 13096 : uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed);
1651 : 6548 : chain().waitForNotificationsIfTipChanged(last_block_hash);
1652 : 6548 : }
1653 : :
1654 : : // Note that this function doesn't distinguish between a 0-valued input,
1655 : : // and a not-"is mine" input.
1656 : 2395 : CAmount CWallet::GetDebit(const CTxIn &txin) const
1657 : : {
1658 : 2395 : LOCK(cs_wallet);
1659 [ + - ]: 2395 : auto txo = GetTXO(txin.prevout);
1660 [ + + ]: 2395 : if (txo) {
1661 : 1496 : return txo->GetTxOut().nValue;
1662 : : }
1663 : : return 0;
1664 : 2395 : }
1665 : :
1666 : 578143 : bool CWallet::IsMine(const CTxOut& txout) const
1667 : : {
1668 : 578143 : AssertLockHeld(cs_wallet);
1669 : 578143 : return IsMine(txout.scriptPubKey);
1670 : : }
1671 : :
1672 : 31816 : bool CWallet::IsMine(const CTxDestination& dest) const
1673 : : {
1674 : 31816 : AssertLockHeld(cs_wallet);
1675 [ + - ]: 31816 : return IsMine(GetScriptForDestination(dest));
1676 : : }
1677 : :
1678 : 613269 : bool CWallet::IsMine(const CScript& script) const
1679 : : {
1680 : 613269 : AssertLockHeld(cs_wallet);
1681 : :
1682 : : // Search the cache so that IsMine is called only on the relevant SPKMs instead of on everything in m_spk_managers
1683 : 613269 : const auto& it = m_cached_spks.find(script);
1684 [ + + ]: 613269 : if (it != m_cached_spks.end()) {
1685 : 195091 : bool res = false;
1686 [ + + ]: 390232 : for (const auto& spkm : it->second) {
1687 [ + + + - ]: 390232 : res = res || spkm->IsMine(script);
1688 : : }
1689 : 195091 : Assume(res);
1690 : 195091 : return res;
1691 : : }
1692 : :
1693 : : return false;
1694 : : }
1695 : :
1696 : 148498 : bool CWallet::IsMine(const CTransaction& tx) const
1697 : : {
1698 : 148498 : AssertLockHeld(cs_wallet);
1699 [ + + ]: 471507 : for (const CTxOut& txout : tx.vout)
1700 [ + + ]: 340296 : if (IsMine(txout))
1701 : : return true;
1702 : : return false;
1703 : : }
1704 : :
1705 : 2985 : bool CWallet::IsMine(const COutPoint& outpoint) const
1706 : : {
1707 : 2985 : AssertLockHeld(cs_wallet);
1708 : 2985 : auto wtx = GetWalletTx(outpoint.hash);
1709 [ + + ]: 2985 : if (!wtx) {
1710 : : return false;
1711 : : }
1712 [ - + + - ]: 2963 : if (outpoint.n >= wtx->tx->vout.size()) {
1713 : : return false;
1714 : : }
1715 : 2963 : return IsMine(wtx->tx->vout[outpoint.n]);
1716 : : }
1717 : :
1718 : 141639 : bool CWallet::IsFromMe(const CTransaction& tx) const
1719 : : {
1720 : 141639 : LOCK(cs_wallet);
1721 [ + + ]: 318890 : for (const CTxIn& txin : tx.vin) {
1722 [ + - + + ]: 180454 : if (GetTXO(txin.prevout)) return true;
1723 : : }
1724 : : return false;
1725 : 141639 : }
1726 : :
1727 : 1351 : CAmount CWallet::GetDebit(const CTransaction& tx) const
1728 : : {
1729 : 1351 : CAmount nDebit = 0;
1730 [ + + ]: 3733 : for (const CTxIn& txin : tx.vin)
1731 : : {
1732 : 2382 : nDebit += GetDebit(txin);
1733 [ - + ]: 2382 : if (!MoneyRange(nDebit))
1734 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": value out of range");
1735 : : }
1736 : 1351 : return nDebit;
1737 : : }
1738 : :
1739 : 4 : bool CWallet::IsHDEnabled() const
1740 : : {
1741 : : // All Active ScriptPubKeyMans must be HD for this to be true
1742 : 4 : bool result = false;
1743 [ + + ]: 36 : for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
1744 [ + - - + ]: 32 : if (!spk_man->IsHDEnabled()) return false;
1745 : 32 : result = true;
1746 : : }
1747 : 4 : return result;
1748 : : }
1749 : :
1750 : 11379 : bool CWallet::CanGetAddresses(bool internal) const
1751 : : {
1752 : 11379 : LOCK(cs_wallet);
1753 [ + + ]: 11379 : if (m_spk_managers.empty()) return false;
1754 [ + + ]: 12279 : for (OutputType t : OUTPUT_TYPES) {
1755 [ + - ]: 12266 : auto spk_man = GetScriptPubKeyMan(t, internal);
1756 [ + + + - : 12266 : if (spk_man && spk_man->CanGetAddresses(internal)) {
- + ]
1757 : : return true;
1758 : : }
1759 : : }
1760 : : return false;
1761 : 11379 : }
1762 : :
1763 : 69 : void CWallet::SetWalletFlag(uint64_t flags)
1764 : : {
1765 : 69 : WalletBatch batch(GetDatabase());
1766 [ + - ]: 69 : return SetWalletFlagWithDB(batch, flags);
1767 : 69 : }
1768 : :
1769 : 102 : void CWallet::SetWalletFlagWithDB(WalletBatch& batch, uint64_t flags)
1770 : : {
1771 : 102 : LOCK(cs_wallet);
1772 [ + - ]: 102 : m_wallet_flags |= flags;
1773 [ + - - + ]: 102 : if (!batch.WriteWalletFlags(m_wallet_flags))
1774 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1775 : 102 : }
1776 : :
1777 : 1 : void CWallet::UnsetWalletFlag(uint64_t flag)
1778 : : {
1779 : 1 : WalletBatch batch(GetDatabase());
1780 [ + - ]: 1 : UnsetWalletFlagWithDB(batch, flag);
1781 : 1 : }
1782 : :
1783 : 3667 : void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag)
1784 : : {
1785 : 3667 : LOCK(cs_wallet);
1786 [ + - ]: 3667 : m_wallet_flags &= ~flag;
1787 [ + - - + ]: 3667 : if (!batch.WriteWalletFlags(m_wallet_flags))
1788 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1789 : 3667 : }
1790 : :
1791 : 3666 : void CWallet::UnsetBlankWalletFlag(WalletBatch& batch)
1792 : : {
1793 : 3666 : UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET);
1794 : 3666 : }
1795 : :
1796 : 206342 : bool CWallet::IsWalletFlagSet(uint64_t flag) const
1797 : : {
1798 : 206342 : return (m_wallet_flags & flag);
1799 : : }
1800 : :
1801 : 962 : bool CWallet::LoadWalletFlags(uint64_t flags)
1802 : : {
1803 : 962 : LOCK(cs_wallet);
1804 [ + - ]: 962 : if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) {
1805 : : // contains unknown non-tolerable wallet flags
1806 : : return false;
1807 : : }
1808 : 962 : m_wallet_flags = flags;
1809 : :
1810 : 962 : return true;
1811 : 962 : }
1812 : :
1813 : 607 : void CWallet::InitWalletFlags(uint64_t flags)
1814 : : {
1815 : 607 : LOCK(cs_wallet);
1816 : :
1817 : : // We should never be writing unknown non-tolerable wallet flags
1818 [ - + ]: 607 : assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32));
1819 : : // This should only be used once, when creating a new wallet - so current flags are expected to be blank
1820 [ - + ]: 607 : assert(m_wallet_flags == 0);
1821 : :
1822 [ + - + - : 1214 : if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) {
- + ]
1823 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1824 : : }
1825 : :
1826 [ + - - + ]: 607 : if (!LoadWalletFlags(flags)) assert(false);
1827 : 607 : }
1828 : :
1829 : 422 : uint64_t CWallet::GetWalletFlags() const
1830 : : {
1831 : 422 : return m_wallet_flags;
1832 : : }
1833 : :
1834 : 34620 : void CWallet::MaybeUpdateBirthTime(int64_t time)
1835 : : {
1836 [ + + ]: 34620 : int64_t birthtime = m_birth_time.load();
1837 [ + + ]: 34620 : if (time < birthtime) {
1838 : 1413 : m_birth_time = time;
1839 : : }
1840 : 34620 : }
1841 : :
1842 : : /**
1843 : : * Scan active chain for relevant transactions after importing keys. This should
1844 : : * be called whenever new keys are added to the wallet, with the oldest key
1845 : : * creation time.
1846 : : *
1847 : : * @return Earliest timestamp that could be successfully scanned from. Timestamp
1848 : : * returned will be higher than startTime if relevant blocks could not be read.
1849 : : */
1850 : 618 : int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update)
1851 : : {
1852 : : // Find starting block. May be null if nCreateTime is greater than the
1853 : : // highest blockchain timestamp, in which case there is nothing that needs
1854 : : // to be scanned.
1855 : 618 : int start_height = 0;
1856 : 618 : uint256 start_block;
1857 : 618 : bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height));
1858 [ + - + - ]: 1236 : WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);
1859 : :
1860 [ + - ]: 618 : if (start) {
1861 : : // TODO: this should take into account failure by ScanResult::USER_ABORT
1862 : 618 : ScanResult result = ScanForWalletTransactions(start_block, start_height, /*max_height=*/{}, reserver, /*fUpdate=*/update, /*save_progress=*/false);
1863 [ + + ]: 618 : if (result.status == ScanResult::FAILURE) {
1864 : 1 : int64_t time_max;
1865 : 1 : CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max)));
1866 : 1 : return time_max + TIMESTAMP_WINDOW + 1;
1867 : : }
1868 : : }
1869 : : return startTime;
1870 : : }
1871 : :
1872 : : /**
1873 : : * Scan the block chain (starting in start_block) for transactions
1874 : : * from or to us. If fUpdate is true, found transactions that already
1875 : : * exist in the wallet will be updated. If max_height is not set, the
1876 : : * mempool will be scanned as well.
1877 : : *
1878 : : * @param[in] start_block Scan starting block. If block is not on the active
1879 : : * chain, the scan will return SUCCESS immediately.
1880 : : * @param[in] start_height Height of start_block
1881 : : * @param[in] max_height Optional max scanning height. If unset there is
1882 : : * no maximum and scanning can continue to the tip
1883 : : *
1884 : : * @return ScanResult returning scan information and indicating success or
1885 : : * failure. Return status will be set to SUCCESS if scan was
1886 : : * successful. FAILURE if a complete rescan was not possible (due to
1887 : : * pruning or corruption). USER_ABORT if the rescan was aborted before
1888 : : * it could complete.
1889 : : *
1890 : : * @pre Caller needs to make sure start_block (and the optional stop_block) are on
1891 : : * the main chain after to the addition of any new keys you want to detect
1892 : : * transactions for.
1893 : : */
1894 : 693 : CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate, const bool save_progress)
1895 : : {
1896 : 693 : constexpr auto INTERVAL_TIME{60s};
1897 : 693 : auto current_time{reserver.now()};
1898 : 693 : auto start_time{reserver.now()};
1899 : :
1900 [ - + ]: 693 : assert(reserver.isReserved());
1901 : :
1902 : 693 : uint256 block_hash = start_block;
1903 : 693 : ScanResult result;
1904 : :
1905 : 693 : std::unique_ptr<FastWalletRescanFilter> fast_rescan_filter;
1906 [ + - + + : 698 : if (chain().hasBlockFilterIndex(BlockFilterType::BASIC)) fast_rescan_filter = std::make_unique<FastWalletRescanFilter>(*this);
+ - ]
1907 : :
1908 [ + + + - ]: 1386 : WalletLogPrintf("Rescan started from block %s... (%s)\n", start_block.ToString(),
1909 [ + + + - ]: 1381 : fast_rescan_filter ? "fast variant using block filters" : "slow variant inspecting all blocks");
1910 : :
1911 [ + - ]: 693 : fAbortRescan = false;
1912 [ + - + - : 1386 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 0); // show rescan progress in GUI as dialog or on splashscreen, if rescan required on startup (e.g. due to corruption)
+ - ]
1913 [ + - + - ]: 1386 : uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1914 : 693 : uint256 end_hash = tip_hash;
1915 [ + + + - ]: 693 : if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash));
1916 [ + - ]: 693 : double progress_begin = chain().guessVerificationProgress(block_hash);
1917 [ + - ]: 693 : double progress_end = chain().guessVerificationProgress(end_hash);
1918 : 693 : double progress_current = progress_begin;
1919 : 693 : int block_height = start_height;
1920 [ + - + - : 74143 : while (!fAbortRescan && !chain().shutdownRequested()) {
+ - ]
1921 [ + + ]: 74143 : if (progress_end - progress_begin > 0.0) {
1922 : 73925 : m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin);
1923 : : } else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal)
1924 : 218 : m_scanning_progress = 0;
1925 : : }
1926 [ + + + + ]: 74143 : if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) {
1927 [ + + + + : 2866 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));
+ - + - +
- ]
1928 : : }
1929 : :
1930 [ + - + + ]: 74143 : bool next_interval = reserver.now() >= current_time + INTERVAL_TIME;
1931 [ + + ]: 74143 : if (next_interval) {
1932 [ + - ]: 2 : current_time = reserver.now();
1933 [ + - ]: 2 : WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current);
1934 : : }
1935 : :
1936 : 74143 : bool fetch_block{true};
1937 [ + + ]: 74143 : if (fast_rescan_filter) {
1938 [ + - ]: 616 : fast_rescan_filter->UpdateIfNeeded();
1939 [ + - ]: 616 : auto matches_block{fast_rescan_filter->MatchesBlock(block_hash)};
1940 [ + - ]: 616 : if (matches_block.has_value()) {
1941 [ + + ]: 616 : if (*matches_block) {
1942 [ + - + - : 124 : LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (filter matched)\n", block_height, block_hash.ToString());
+ - + - ]
1943 : : } else {
1944 : 554 : result.last_scanned_block = block_hash;
1945 : 554 : result.last_scanned_height = block_height;
1946 : 554 : fetch_block = false;
1947 : : }
1948 : : } else {
1949 [ # # # # : 0 : LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (WARNING: block filter not found!)\n", block_height, block_hash.ToString());
# # # # ]
1950 : : }
1951 : : }
1952 : :
1953 : : // Find next block separately from reading data above, because reading
1954 : : // is slow and there might be a reorg while it is read.
1955 : 74143 : bool block_still_active = false;
1956 : 74143 : bool next_block = false;
1957 : 74143 : uint256 next_block_hash;
1958 [ + - ]: 74143 : chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash)));
1959 : :
1960 [ + + ]: 74143 : if (fetch_block) {
1961 : : // Read block data and locator if needed (the locator is usually null unless we need to save progress)
1962 : 73589 : CBlock block;
1963 : 73589 : CBlockLocator loc;
1964 : : // Find block
1965 [ + + ]: 73589 : FoundBlock found_block{FoundBlock().data(block)};
1966 [ + + ]: 73589 : if (save_progress && next_interval) found_block.locator(loc);
1967 [ + - ]: 73589 : chain().findBlock(block_hash, found_block);
1968 : :
1969 [ + + ]: 73589 : if (!block.IsNull()) {
1970 [ + - ]: 73485 : LOCK(cs_wallet);
1971 [ - + ]: 73485 : if (!block_still_active) {
1972 : : // Abort scan if current block is no longer active, to prevent
1973 : : // marking transactions as coming from the wrong block.
1974 : 0 : result.last_failed_block = block_hash;
1975 : 0 : result.status = ScanResult::FAILURE;
1976 [ # # ]: 0 : break;
1977 : : }
1978 [ - + + + ]: 168082 : for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) {
1979 [ + - ]: 94597 : SyncTransaction(block.vtx[posInBlock], TxStateConfirmed{block_hash, block_height, static_cast<int>(posInBlock)}, fUpdate, /*rescanning_old_block=*/true);
1980 : : }
1981 : : // scan succeeded, record block as most recent successfully scanned
1982 : 73485 : result.last_scanned_block = block_hash;
1983 [ + + ]: 73485 : result.last_scanned_height = block_height;
1984 : :
1985 [ + + ]: 73485 : if (!loc.IsNull()) {
1986 [ + - ]: 2 : WalletLogPrintf("Saving scan progress %d.\n", block_height);
1987 [ + - ]: 2 : WalletBatch batch(GetDatabase());
1988 [ + - ]: 2 : batch.WriteBestBlock(loc);
1989 : 2 : }
1990 : 73485 : } else {
1991 : : // could not scan block, keep scanning but record this block as the most recent failure
1992 : 104 : result.last_failed_block = block_hash;
1993 : 104 : result.status = ScanResult::FAILURE;
1994 : : }
1995 : 73589 : }
1996 [ + + + + ]: 74143 : if (max_height && block_height >= *max_height) {
1997 : : break;
1998 : : }
1999 : : // If rescanning was triggered with cs_wallet permanently locked (AttachChain), additional blocks that were connected during the rescan
2000 : : // aren't processed here but will be processed with the pending blockConnected notifications after the lock is released.
2001 : : // If rescanning without a permanent cs_wallet lock, additional blocks that were added during the rescan will be re-processed if
2002 : : // the notification was processed and the last block height was updated.
2003 [ + - + + : 148282 : if (block_height >= WITH_LOCK(cs_wallet, return GetLastBlockHeight())) {
+ - ]
2004 : : break;
2005 : : }
2006 : :
2007 : 73451 : {
2008 [ + + ]: 73451 : if (!next_block) {
2009 : : // break successfully when rescan has reached the tip, or
2010 : : // previous block is no longer on the chain due to a reorg
2011 : : break;
2012 : : }
2013 : :
2014 : : // increment block and verification progress
2015 : 73450 : block_hash = next_block_hash;
2016 : 73450 : ++block_height;
2017 [ + - ]: 73450 : progress_current = chain().guessVerificationProgress(block_hash);
2018 : :
2019 : : // handle updated tip hash
2020 : 73450 : const uint256 prev_tip_hash = tip_hash;
2021 [ + - + - ]: 146900 : tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
2022 [ + + - + ]: 73450 : if (!max_height && prev_tip_hash != tip_hash) {
2023 : : // in case the tip has changed, update progress max
2024 [ # # ]: 0 : progress_end = chain().guessVerificationProgress(tip_hash);
2025 : : }
2026 : : }
2027 : : }
2028 [ + + ]: 693 : if (!max_height) {
2029 [ + - ]: 691 : WalletLogPrintf("Scanning current mempool transactions.\n");
2030 [ + - + - ]: 2073 : WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
2031 : : }
2032 [ + - + - : 1386 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 100); // hide progress dialog in GUI
+ - ]
2033 [ + + + - ]: 693 : if (block_height && fAbortRescan) {
2034 [ # # ]: 0 : WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current);
2035 : 0 : result.status = ScanResult::USER_ABORT;
2036 [ + + + - : 693 : } else if (block_height && chain().shutdownRequested()) {
+ - ]
2037 [ # # ]: 0 : WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current);
2038 : 0 : result.status = ScanResult::USER_ABORT;
2039 : : } else {
2040 [ + - + - ]: 693 : WalletLogPrintf("Rescan completed in %15dms\n", Ticks<std::chrono::milliseconds>(reserver.now() - start_time));
2041 : : }
2042 : 693 : return result;
2043 : 693 : }
2044 : :
2045 : 1667 : bool CWallet::SubmitTxMemoryPoolAndRelay(CWalletTx& wtx,
2046 : : std::string& err_string,
2047 : : node::TxBroadcast broadcast_method) const
2048 : : {
2049 : 1667 : AssertLockHeld(cs_wallet);
2050 : :
2051 : : // Can't relay if wallet is not broadcasting
2052 [ + - ]: 1667 : if (!GetBroadcastTransactions()) return false;
2053 : : // Don't relay abandoned transactions
2054 [ + + ]: 1667 : if (wtx.isAbandoned()) return false;
2055 : : // Don't try to submit coinbase transactions. These would fail anyway but would
2056 : : // cause log spam.
2057 [ + - ]: 1667 : if (wtx.IsCoinBase()) return false;
2058 : : // Don't try to submit conflicted or confirmed transactions.
2059 [ + - ]: 1667 : if (GetTxDepthInMainChain(wtx) != 0) return false;
2060 : :
2061 : 1667 : const char* what{""};
2062 [ + + - - ]: 1667 : switch (broadcast_method) {
2063 : 1538 : case node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL:
2064 : 1538 : what = "to mempool and for broadcast to peers";
2065 : 1538 : break;
2066 : 129 : case node::TxBroadcast::MEMPOOL_NO_BROADCAST:
2067 : 129 : what = "to mempool without broadcast";
2068 : 129 : break;
2069 : 0 : case node::TxBroadcast::NO_MEMPOOL_PRIVATE_BROADCAST:
2070 : 0 : what = "for private broadcast without adding to the mempool";
2071 : 0 : break;
2072 : : }
2073 [ + - ]: 1667 : WalletLogPrintf("Submitting wtx %s %s\n", wtx.GetHash().ToString(), what);
2074 : : // We must set TxStateInMempool here. Even though it will also be set later by the
2075 : : // entered-mempool callback, if we did not there would be a race where a
2076 : : // user could call sendmoney in a loop and hit spurious out of funds errors
2077 : : // because we think that this newly generated transaction's change is
2078 : : // unavailable as we're not yet aware that it is in the mempool.
2079 : : //
2080 : : // If broadcast fails for any reason, trying to set wtx.m_state here would be incorrect.
2081 : : // If transaction was previously in the mempool, it should be updated when
2082 : : // TransactionRemovedFromMempool fires.
2083 : 1667 : bool ret = chain().broadcastTransaction(wtx.tx, m_default_max_tx_fee, broadcast_method, err_string);
2084 [ + + + + ]: 3242 : if (ret) wtx.m_state = TxStateInMempool{};
2085 : : return ret;
2086 : : }
2087 : :
2088 : 3405 : std::set<Txid> CWallet::GetTxConflicts(const CWalletTx& wtx) const
2089 : : {
2090 : 3405 : AssertLockHeld(cs_wallet);
2091 : :
2092 : 3405 : const Txid myHash{wtx.GetHash()};
2093 : 3405 : std::set<Txid> result{GetConflicts(myHash)};
2094 : 3405 : result.erase(myHash);
2095 : 3405 : return result;
2096 : : }
2097 : :
2098 : 86 : bool CWallet::ShouldResend() const
2099 : : {
2100 : : // Don't attempt to resubmit if the wallet is configured to not broadcast
2101 [ + - ]: 86 : if (!fBroadcastTransactions) return false;
2102 : :
2103 : : // During reindex, importing and IBD, old wallet transactions become
2104 : : // unconfirmed. Don't resend them as that would spam other nodes.
2105 : : // We only allow forcing mempool submission when not relaying to avoid this spam.
2106 [ + + ]: 86 : if (!chain().isReadyToBroadcast()) return false;
2107 : :
2108 : : // Do this infrequently and randomly to avoid giving away
2109 : : // that these are our transactions.
2110 [ + + ]: 57 : if (NodeClock::now() < m_next_resend) return false;
2111 : :
2112 : : return true;
2113 : : }
2114 : :
2115 : 1046 : NodeClock::time_point CWallet::GetDefaultNextResend() { return FastRandomContext{}.rand_uniform_delay(NodeClock::now() + 12h, 24h); }
2116 : :
2117 : : // Resubmit transactions from the wallet to the mempool, optionally asking the
2118 : : // mempool to relay them. On startup, we will do this for all unconfirmed
2119 : : // transactions but will not ask the mempool to relay them. We do this on startup
2120 : : // to ensure that our own mempool is aware of our transactions. There
2121 : : // is a privacy side effect here as not broadcasting on startup also means that we won't
2122 : : // inform the world of our wallet's state, particularly if the wallet (or node) is not
2123 : : // yet synced.
2124 : : //
2125 : : // Otherwise this function is called periodically in order to relay our unconfirmed txs.
2126 : : // We do this on a random timer to slightly obfuscate which transactions
2127 : : // come from our wallet.
2128 : : //
2129 : : // TODO: Ideally, we'd only resend transactions that we think should have been
2130 : : // mined in the most recent block. Any transaction that wasn't in the top
2131 : : // blockweight of transactions in the mempool shouldn't have been mined,
2132 : : // and so is probably just sitting in the mempool waiting to be confirmed.
2133 : : // Rebroadcasting does nothing to speed up confirmation and only damages
2134 : : // privacy.
2135 : : //
2136 : : // The `force` option results in all unconfirmed transactions being submitted to
2137 : : // the mempool. This does not necessarily result in those transactions being relayed,
2138 : : // that depends on the `broadcast_method` option. Periodic rebroadcast uses the pattern
2139 : : // broadcast_method=TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL force=false, while loading into
2140 : : // the mempool (on start, or after import) uses
2141 : : // broadcast_method=TxBroadcast::MEMPOOL_NO_BROADCAST force=true.
2142 : 1506 : void CWallet::ResubmitWalletTransactions(node::TxBroadcast broadcast_method, bool force)
2143 : : {
2144 : : // Don't attempt to resubmit if the wallet is configured to not broadcast,
2145 : : // even if forcing.
2146 [ + + ]: 1506 : if (!fBroadcastTransactions) return;
2147 : :
2148 : 1503 : int submitted_tx_count = 0;
2149 : :
2150 : 1503 : { // cs_wallet scope
2151 : 1503 : LOCK(cs_wallet);
2152 : :
2153 : : // First filter for the transactions we want to rebroadcast.
2154 : : // We use a set with WalletTxOrderComparator so that rebroadcasting occurs in insertion order
2155 : 1503 : std::set<CWalletTx*, WalletTxOrderComparator> to_submit;
2156 [ + + + + ]: 15492 : for (auto& [txid, wtx] : mapWallet) {
2157 : : // Only rebroadcast unconfirmed txs
2158 [ + + ]: 13989 : if (!wtx.isUnconfirmed()) continue;
2159 : :
2160 : : // Attempt to rebroadcast all txes more than 5 minutes older than
2161 : : // the last block, or all txs if forcing.
2162 [ + + + + ]: 136 : if (!force && wtx.nTimeReceived > m_best_block_time - 5 * 60) continue;
2163 [ + - ]: 135 : to_submit.insert(&wtx);
2164 : : }
2165 : : // Now try submitting the transactions to the memory pool and (optionally) relay them.
2166 [ + + ]: 1638 : for (auto wtx : to_submit) {
2167 [ + - ]: 135 : std::string unused_err_string;
2168 [ + - + + ]: 135 : if (SubmitTxMemoryPoolAndRelay(*wtx, unused_err_string, broadcast_method)) ++submitted_tx_count;
2169 : 135 : }
2170 [ + - ]: 1503 : } // cs_wallet
2171 : :
2172 [ + + ]: 1503 : if (submitted_tx_count > 0) {
2173 : 55 : WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count);
2174 : : }
2175 : : }
2176 : :
2177 : : /** @} */ // end of mapWallet
2178 : :
2179 : 69 : void MaybeResendWalletTxs(WalletContext& context)
2180 : : {
2181 [ + + ]: 155 : for (const std::shared_ptr<CWallet>& pwallet : GetWallets(context)) {
2182 [ + - + + ]: 86 : if (!pwallet->ShouldResend()) continue;
2183 [ + - ]: 4 : pwallet->ResubmitWalletTransactions(node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL, /*force=*/false);
2184 [ + - ]: 86 : pwallet->SetNextResend();
2185 : : }
2186 : 69 : }
2187 : :
2188 : :
2189 : 2584 : bool CWallet::SignTransaction(CMutableTransaction& tx) const
2190 : : {
2191 : 2584 : AssertLockHeld(cs_wallet);
2192 : :
2193 : : // Build coins map
2194 : 2584 : std::map<COutPoint, Coin> coins;
2195 [ + + ]: 11523 : for (auto& input : tx.vin) {
2196 : 8939 : const auto mi = mapWallet.find(input.prevout.hash);
2197 [ + - - + : 11523 : if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) {
+ - ]
2198 : : return false;
2199 : : }
2200 [ + + ]: 8939 : const CWalletTx& wtx = mi->second;
2201 [ + + ]: 8939 : int prev_height = wtx.state<TxStateConfirmed>() ? wtx.state<TxStateConfirmed>()->confirmed_block_height : 0;
2202 [ + - ]: 8939 : coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], prev_height, wtx.IsCoinBase());
2203 : : }
2204 [ + - ]: 2584 : std::map<int, bilingual_str> input_errors;
2205 [ + - ]: 2584 : return SignTransaction(tx, coins, SIGHASH_DEFAULT, input_errors);
2206 : 5168 : }
2207 : :
2208 : 2907 : bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const
2209 : : {
2210 : : // Try to sign with all ScriptPubKeyMans
2211 [ + + ]: 16562 : for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2212 : : // spk_man->SignTransaction will return true if the transaction is complete,
2213 : : // so we can exit early and return true if that happens
2214 [ + - + + ]: 16552 : if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) {
2215 : 2897 : return true;
2216 : : }
2217 : : }
2218 : :
2219 : : // At this point, one input was not fully signed otherwise we would have exited already
2220 : 10 : return false;
2221 : : }
2222 : :
2223 : 1181 : std::optional<PSBTError> CWallet::FillPSBT(PartiallySignedTransaction& psbtx, const common::PSBTFillOptions& options, bool& complete, size_t* n_signed) const
2224 : : {
2225 [ - + ]: 1181 : if (n_signed) {
2226 : 0 : *n_signed = 0;
2227 : : }
2228 : 1181 : LOCK(cs_wallet);
2229 : : // Get all of the previous transactions
2230 [ + + ]: 4916 : for (PSBTInput& input : psbtx.inputs) {
2231 [ + - + + ]: 3735 : if (PSBTInputSigned(input)) {
2232 : 18 : continue;
2233 : : }
2234 : :
2235 : : // If we have no utxo, grab it from the wallet.
2236 [ + + ]: 3717 : if (!input.non_witness_utxo) {
2237 : 2273 : const Txid& txhash = input.prev_txid;
2238 : 2273 : const auto it = mapWallet.find(txhash);
2239 [ + + ]: 5694 : if (it != mapWallet.end()) {
2240 : 1959 : const CWalletTx& wtx = it->second;
2241 : : // We only need the non_witness_utxo, which is a superset of the witness_utxo.
2242 : : // The signing code will switch to the smaller witness_utxo if this is ok.
2243 : 1959 : input.non_witness_utxo = wtx.tx;
2244 : : }
2245 : : }
2246 : : }
2247 : :
2248 [ + - ]: 1181 : std::optional<PrecomputedTransactionData> txdata_res = PrecomputePSBTData(psbtx);
2249 [ - + ]: 1181 : if (!txdata_res) {
2250 : 0 : return PSBTError::INVALID_TX;
2251 : : }
2252 [ + - ]: 1181 : const PrecomputedTransactionData& txdata = *txdata_res;
2253 : :
2254 : : // Fill in information from ScriptPubKeyMans
2255 [ + - + + ]: 9720 : for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2256 : 8548 : int n_signed_this_spkm = 0;
2257 [ + - ]: 8548 : const auto error{spk_man->FillPSBT(psbtx, txdata, options, &n_signed_this_spkm)};
2258 [ + + ]: 8548 : if (error) {
2259 : 9 : return error;
2260 : : }
2261 : :
2262 [ - + ]: 8539 : if (n_signed) {
2263 : 0 : (*n_signed) += n_signed_this_spkm;
2264 : : }
2265 : 9 : }
2266 : :
2267 [ + - ]: 1172 : RemoveUnnecessaryTransactions(psbtx);
2268 : :
2269 : : // Complete if every input is now signed
2270 : 1172 : complete = true;
2271 [ - + + + ]: 4897 : for (size_t i = 0; i < psbtx.inputs.size(); ++i) {
2272 [ + - ]: 3725 : complete &= PSBTInputSignedAndVerified(psbtx, i, &txdata);
2273 : : }
2274 : :
2275 : 1172 : return {};
2276 [ + - ]: 2362 : }
2277 : :
2278 : 9 : SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const
2279 : : {
2280 : 9 : SignatureData sigdata;
2281 [ + - ]: 9 : CScript script_pub_key = GetScriptForDestination(pkhash);
2282 [ + - ]: 52 : for (const auto& spk_man_pair : m_spk_managers) {
2283 [ + - + + ]: 52 : if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
2284 [ + - ]: 9 : LOCK(cs_wallet); // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
2285 [ + - + - ]: 9 : return spk_man_pair.second->SignMessage(message, pkhash, str_sig);
2286 : 9 : }
2287 : : }
2288 : : return SigningResult::PRIVATE_KEY_NOT_AVAILABLE;
2289 : 9 : }
2290 : :
2291 : 3675 : OutputType CWallet::TransactionChangeType(const std::optional<OutputType>& change_type, const std::vector<CRecipient>& vecSend) const
2292 : : {
2293 : : // If -changetype is specified, always use that change type.
2294 [ + + ]: 3675 : if (change_type) {
2295 : 355 : return *change_type;
2296 : : }
2297 : :
2298 : : // if m_default_address_type is legacy, use legacy address as change.
2299 [ + + ]: 3320 : if (m_default_address_type == OutputType::LEGACY) {
2300 : : return OutputType::LEGACY;
2301 : : }
2302 : :
2303 : 3294 : bool any_tr{false};
2304 : 3294 : bool any_wpkh{false};
2305 : 3294 : bool any_sh{false};
2306 : 3294 : bool any_pkh{false};
2307 : :
2308 [ + + ]: 42299 : for (const auto& recipient : vecSend) {
2309 [ + - ]: 39005 : if (std::get_if<WitnessV1Taproot>(&recipient.dest)) {
2310 : : any_tr = true;
2311 [ + - ]: 38678 : } else if (std::get_if<WitnessV0KeyHash>(&recipient.dest)) {
2312 : : any_wpkh = true;
2313 [ + - ]: 46122 : } else if (std::get_if<ScriptHash>(&recipient.dest)) {
2314 : : any_sh = true;
2315 [ + - ]: 45063 : } else if (std::get_if<PKHash>(&recipient.dest)) {
2316 : 5933 : any_pkh = true;
2317 : : }
2318 : : }
2319 : :
2320 : 3294 : const bool has_bech32m_spkman(GetScriptPubKeyMan(OutputType::BECH32M, /*internal=*/true));
2321 [ + + ]: 3294 : if (has_bech32m_spkman && any_tr) {
2322 : : // Currently tr is the only type supported by the BECH32M spkman
2323 : : return OutputType::BECH32M;
2324 : : }
2325 : 2971 : const bool has_bech32_spkman(GetScriptPubKeyMan(OutputType::BECH32, /*internal=*/true));
2326 [ + + ]: 2971 : if (has_bech32_spkman && any_wpkh) {
2327 : : // Currently wpkh is the only type supported by the BECH32 spkman
2328 : : return OutputType::BECH32;
2329 : : }
2330 : 351 : const bool has_p2sh_segwit_spkman(GetScriptPubKeyMan(OutputType::P2SH_SEGWIT, /*internal=*/true));
2331 [ + + ]: 351 : if (has_p2sh_segwit_spkman && any_sh) {
2332 : : // Currently sh_wpkh is the only type supported by the P2SH_SEGWIT spkman
2333 : : // As of 2021 about 80% of all SH are wrapping WPKH, so use that
2334 : : return OutputType::P2SH_SEGWIT;
2335 : : }
2336 : 306 : const bool has_legacy_spkman(GetScriptPubKeyMan(OutputType::LEGACY, /*internal=*/true));
2337 [ + + ]: 306 : if (has_legacy_spkman && any_pkh) {
2338 : : // Currently pkh is the only type supported by the LEGACY spkman
2339 : : return OutputType::LEGACY;
2340 : : }
2341 : :
2342 [ + + ]: 265 : if (has_bech32m_spkman) {
2343 : : return OutputType::BECH32M;
2344 : : }
2345 [ + + ]: 32 : if (has_bech32_spkman) {
2346 : : return OutputType::BECH32;
2347 : : }
2348 : : // else use m_default_address_type for change
2349 : 18 : return m_default_address_type;
2350 : : }
2351 : :
2352 : 1539 : void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm)
2353 : : {
2354 : 1539 : LOCK(cs_wallet);
2355 [ + - + - : 3078 : WalletLogPrintf("CommitTransaction:\n%s\n", util::RemoveSuffixView(tx->ToString(), "\n"));
+ - ]
2356 : :
2357 : : // Add tx to wallet, because if it has change it's also ours,
2358 : : // otherwise just for transaction history.
2359 [ + - + - : 4617 : CWalletTx* wtx = AddToWallet(tx, TxStateInactive{}, [&](CWalletTx& wtx, bool new_tx) {
+ - ]
2360 : 1539 : CHECK_NONFATAL(wtx.mapValue.empty());
2361 : 1539 : CHECK_NONFATAL(wtx.vOrderForm.empty());
2362 : 1539 : wtx.mapValue = std::move(mapValue);
2363 : 1539 : wtx.vOrderForm = std::move(orderForm);
2364 : 1539 : return true;
2365 : : });
2366 : :
2367 : : // wtx can only be null if the db write failed.
2368 [ - + ]: 1539 : if (!wtx) {
2369 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Wallet db error, transaction commit failed");
2370 : : }
2371 : :
2372 : : // Notify that old coins are spent
2373 [ + + ]: 5471 : for (const CTxIn& txin : tx->vin) {
2374 [ + - ]: 3932 : CWalletTx &coin = mapWallet.at(txin.prevout.hash);
2375 : 3932 : coin.MarkDirty();
2376 [ + - ]: 3932 : NotifyTransactionChanged(coin.GetHash(), CT_UPDATED);
2377 : : }
2378 : :
2379 [ + + ]: 1539 : if (!fBroadcastTransactions) {
2380 : : // Don't submit tx to the mempool
2381 [ + - ]: 7 : return;
2382 : : }
2383 : :
2384 [ + - ]: 1532 : std::string err_string;
2385 [ + - + + ]: 1532 : if (!SubmitTxMemoryPoolAndRelay(*wtx, err_string, node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL)) {
2386 [ + - ]: 4 : WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string);
2387 : : // TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure.
2388 : : }
2389 [ + - ]: 3071 : }
2390 : :
2391 : 361 : DBErrors CWallet::PopulateWalletFromDB(bilingual_str& error, std::vector<bilingual_str>& warnings)
2392 : : {
2393 : 361 : LOCK(cs_wallet);
2394 : :
2395 [ - + ]: 361 : Assert(m_spk_managers.empty());
2396 [ - + ]: 361 : Assert(m_wallet_flags == 0);
2397 [ + - + - ]: 361 : DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this);
2398 : :
2399 [ + + ]: 361 : if (m_spk_managers.empty()) {
2400 [ - + ]: 22 : assert(m_external_spk_managers.empty());
2401 [ - + ]: 22 : assert(m_internal_spk_managers.empty());
2402 : : }
2403 : :
2404 [ + - ]: 361 : const auto wallet_file = m_database->Filename();
2405 [ + - + - : 361 : switch (nLoadWalletRet) {
- + + - -
+ ]
2406 : : case DBErrors::LOAD_OK:
2407 : : break;
2408 : 1 : case DBErrors::NONCRITICAL_ERROR:
2409 [ + - ]: 2 : warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"
2410 : : " or address metadata may be missing or incorrect."),
2411 : : wallet_file));
2412 : 1 : break;
2413 : 0 : case DBErrors::NEED_RESCAN:
2414 [ # # ]: 0 : warnings.push_back(strprintf(_("Error reading %s! Transaction data may be missing or incorrect."
2415 : : " Rescanning wallet."), wallet_file));
2416 : 0 : break;
2417 : 1 : case DBErrors::CORRUPT:
2418 [ + - ]: 1 : error = strprintf(_("Error loading %s: Wallet corrupted"), wallet_file);
2419 : 1 : break;
2420 : 0 : case DBErrors::TOO_NEW:
2421 [ # # ]: 0 : error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), wallet_file, CLIENT_NAME);
2422 : 0 : break;
2423 : 0 : case DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED:
2424 [ # # ]: 0 : error = strprintf(_("Error loading %s: External signer wallet being loaded without external signer support compiled"), wallet_file);
2425 : 0 : break;
2426 : 1 : case DBErrors::UNKNOWN_DESCRIPTOR:
2427 [ + - ]: 1 : error = strprintf(_("Unrecognized descriptor found. Loading wallet %s\n\n"
2428 : : "The wallet might have been created on a newer version.\n"
2429 : 1 : "Please try running the latest software version.\n"), wallet_file);
2430 : 1 : break;
2431 : 1 : case DBErrors::UNEXPECTED_LEGACY_ENTRY:
2432 [ + - ]: 1 : error = strprintf(_("Unexpected legacy entry in descriptor wallet found. Loading wallet %s\n\n"
2433 : 1 : "The wallet might have been tampered with or created with malicious intent.\n"), wallet_file);
2434 : 1 : break;
2435 : 0 : case DBErrors::LEGACY_WALLET:
2436 [ # # ]: 0 : error = strprintf(_("Error loading %s: Wallet is a legacy wallet. Please migrate to a descriptor wallet using the migration tool (migratewallet RPC)."), wallet_file);
2437 : 0 : break;
2438 : 0 : case DBErrors::LOAD_FAIL:
2439 [ # # ]: 0 : error = strprintf(_("Error loading %s"), wallet_file);
2440 : 0 : break;
2441 : : } // no default case, so the compiler can warn about missing cases
2442 : 361 : return nLoadWalletRet;
2443 [ + - ]: 722 : }
2444 : :
2445 : 6 : util::Result<void> CWallet::RemoveTxs(std::vector<Txid>& txs_to_remove)
2446 : : {
2447 : 6 : AssertLockHeld(cs_wallet);
2448 [ + - ]: 6 : bilingual_str str_err; // future: make RunWithinTxn return a util::Result
2449 [ + - + - ]: 6 : bool was_txn_committed = RunWithinTxn(GetDatabase(), /*process_desc=*/"remove transactions", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
2450 : 6 : util::Result<void> result{RemoveTxs(batch, txs_to_remove)};
2451 [ + + + - ]: 7 : if (!result) str_err = util::ErrorString(result);
2452 : 6 : return result.has_value();
2453 : 6 : });
2454 [ + + + - ]: 8 : if (!str_err.empty()) return util::Error{str_err};
2455 [ - + - - ]: 5 : if (!was_txn_committed) return util::Error{_("Error starting/committing db txn for wallet transactions removal process")};
2456 : 5 : return {}; // all good
2457 : 6 : }
2458 : :
2459 : 12 : util::Result<void> CWallet::RemoveTxs(WalletBatch& batch, std::vector<Txid>& txs_to_remove)
2460 : : {
2461 : 12 : AssertLockHeld(cs_wallet);
2462 [ - + ]: 12 : if (!batch.HasActiveTxn()) return util::Error{strprintf(_("The transactions removal process can only be executed within a db txn"))};
2463 : :
2464 : : // Check for transaction existence and remove entries from disk
2465 : 12 : std::vector<decltype(mapWallet)::const_iterator> erased_txs;
2466 : 12 : bilingual_str str_err;
2467 [ + + ]: 28 : for (const Txid& hash : txs_to_remove) {
2468 : 17 : auto it_wtx = mapWallet.find(hash);
2469 [ + + ]: 17 : if (it_wtx == mapWallet.end()) {
2470 [ + - + - ]: 3 : return util::Error{strprintf(_("Transaction %s does not belong to this wallet"), hash.GetHex())};
2471 : : }
2472 [ + - - + ]: 16 : if (!batch.EraseTx(hash)) {
2473 [ # # # # ]: 0 : return util::Error{strprintf(_("Failure removing transaction: %s"), hash.GetHex())};
2474 : : }
2475 [ + - ]: 16 : erased_txs.emplace_back(it_wtx);
2476 : : }
2477 : :
2478 : : // Register callback to update the memory state only when the db txn is actually dumped to disk
2479 [ + - + - : 66 : batch.RegisterTxnListener({.on_commit=[&, erased_txs]() EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
+ - ]
2480 : : // Update the in-memory state and notify upper layers about the removals
2481 [ + + ]: 27 : for (const auto& it : erased_txs) {
2482 : 16 : const Txid hash{it->first};
2483 : 16 : wtxOrdered.erase(it->second.m_it_wtxOrdered);
2484 [ + + ]: 32 : for (const auto& txin : it->second.tx->vin) {
2485 : 16 : auto range = mapTxSpends.equal_range(txin.prevout);
2486 [ + - ]: 34 : for (auto iter = range.first; iter != range.second; ++iter) {
2487 [ + + ]: 18 : if (iter->second == hash) {
2488 : 16 : mapTxSpends.erase(iter);
2489 : 16 : break;
2490 : : }
2491 : : }
2492 : : }
2493 [ - + + + ]: 44 : for (unsigned int i = 0; i < it->second.tx->vout.size(); ++i) {
2494 : 28 : m_txos.erase(COutPoint(hash, i));
2495 : : }
2496 : 16 : mapWallet.erase(it);
2497 : 16 : NotifyTransactionChanged(hash, CT_DELETED);
2498 : : }
2499 : :
2500 : 11 : MarkDirty();
2501 : 11 : }, .on_abort={}});
2502 : :
2503 : 11 : return {};
2504 [ + - + - ]: 23 : }
2505 : :
2506 : 28026 : bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& new_purpose)
2507 : : {
2508 : 28026 : bool fUpdated = false;
2509 : 28026 : bool is_mine;
2510 : 28026 : std::optional<AddressPurpose> purpose;
2511 : 28026 : {
2512 : 28026 : LOCK(cs_wallet);
2513 : 28026 : std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address);
2514 [ + + - + ]: 28026 : fUpdated = mi != m_address_book.end() && !mi->second.IsChange();
2515 : :
2516 [ + + + - ]: 28026 : CAddressBookData& record = mi != m_address_book.end() ? mi->second : m_address_book[address];
2517 [ - + ]: 56052 : record.SetLabel(strName);
2518 [ + - ]: 28026 : is_mine = IsMine(address);
2519 [ + - ]: 28026 : if (new_purpose) { /* update purpose only if requested */
2520 : 28026 : record.purpose = new_purpose;
2521 : : }
2522 [ + - ]: 28026 : purpose = record.purpose;
2523 : 0 : }
2524 : :
2525 : 28026 : const std::string& encoded_dest = EncodeDestination(address);
2526 [ + - + - : 56052 : if (new_purpose && !batch.WritePurpose(encoded_dest, PurposeToString(*new_purpose))) {
+ - - + -
+ ]
2527 [ # # ]: 0 : WalletLogPrintf("Error: fail to write address book 'purpose' entry\n");
2528 : : return false;
2529 : : }
2530 [ + - - + ]: 28026 : if (!batch.WriteName(encoded_dest, strName)) {
2531 [ # # ]: 0 : WalletLogPrintf("Error: fail to write address book 'name' entry\n");
2532 : : return false;
2533 : : }
2534 : :
2535 : : // In very old wallets, address purpose may not be recorded so we derive it from IsMine
2536 : 56052 : NotifyAddressBookChanged(address, strName, is_mine,
2537 [ + - + - ]: 56052 : purpose.value_or(is_mine ? AddressPurpose::RECEIVE : AddressPurpose::SEND),
2538 [ + + + + ]: 56025 : (fUpdated ? CT_UPDATED : CT_NEW));
2539 : : return true;
2540 : 28026 : }
2541 : :
2542 : 28026 : bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& purpose)
2543 : : {
2544 : 28026 : WalletBatch batch(GetDatabase());
2545 [ + - ]: 28026 : return SetAddressBookWithDB(batch, address, strName, purpose);
2546 : 28026 : }
2547 : :
2548 : 0 : bool CWallet::DelAddressBook(const CTxDestination& address)
2549 : : {
2550 [ # # ]: 0 : return RunWithinTxn(GetDatabase(), /*process_desc=*/"address book entry removal", [&](WalletBatch& batch){
2551 : 0 : return DelAddressBookWithDB(batch, address);
2552 : 0 : });
2553 : : }
2554 : :
2555 : 27 : bool CWallet::DelAddressBookWithDB(WalletBatch& batch, const CTxDestination& address)
2556 : : {
2557 : 27 : const std::string& dest = EncodeDestination(address);
2558 : 27 : {
2559 [ + - ]: 27 : LOCK(cs_wallet);
2560 : : // If we want to delete receiving addresses, we should avoid calling EraseAddressData because it will delete the previously_spent value. Could instead just erase the label so it becomes a change address, and keep the data.
2561 : : // NOTE: This isn't a problem for sending addresses because they don't have any data that needs to be kept.
2562 : : // When adding new address data, it should be considered here whether to retain or delete it.
2563 [ + - - + ]: 27 : if (IsMine(address)) {
2564 [ # # ]: 0 : WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, CLIENT_BUGREPORT);
2565 : : return false;
2566 : : }
2567 : : // Delete data rows associated with this address
2568 [ + - - + ]: 27 : if (!batch.EraseAddressData(address)) {
2569 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry data\n");
2570 : : return false;
2571 : : }
2572 : :
2573 : : // Delete purpose entry
2574 [ + - - + ]: 27 : if (!batch.ErasePurpose(dest)) {
2575 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry purpose\n");
2576 : : return false;
2577 : : }
2578 : :
2579 : : // Delete name entry
2580 [ + - - + ]: 27 : if (!batch.EraseName(dest)) {
2581 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry name\n");
2582 : : return false;
2583 : : }
2584 : :
2585 : : // finally, remove it from the map
2586 [ + - ]: 27 : m_address_book.erase(address);
2587 : 0 : }
2588 : :
2589 : : // All good, signal changes
2590 [ + - ]: 27 : NotifyAddressBookChanged(address, "", /*is_mine=*/false, AddressPurpose::SEND, CT_DELETED);
2591 : : return true;
2592 : 27 : }
2593 : :
2594 : 422 : size_t CWallet::KeypoolCountExternalKeys() const
2595 : : {
2596 : 422 : AssertLockHeld(cs_wallet);
2597 : :
2598 : 422 : unsigned int count = 0;
2599 [ + + ]: 1749 : for (auto spk_man : m_external_spk_managers) {
2600 : 1327 : count += spk_man.second->GetKeyPoolSize();
2601 : : }
2602 : :
2603 : 422 : return count;
2604 : : }
2605 : :
2606 : 1361 : unsigned int CWallet::GetKeyPoolSize() const
2607 : : {
2608 : 1361 : AssertLockHeld(cs_wallet);
2609 : :
2610 : 1361 : unsigned int count = 0;
2611 [ + + ]: 9274 : for (auto spk_man : GetActiveScriptPubKeyMans()) {
2612 [ + - ]: 7913 : count += spk_man->GetKeyPoolSize();
2613 : : }
2614 : 1361 : return count;
2615 : : }
2616 : :
2617 : 1006 : bool CWallet::TopUpKeyPool(unsigned int kpSize)
2618 : : {
2619 : 1006 : LOCK(cs_wallet);
2620 : 1006 : bool res = true;
2621 [ + - + + ]: 6581 : for (auto spk_man : GetActiveScriptPubKeyMans()) {
2622 [ + - ]: 5575 : res &= spk_man->TopUp(kpSize);
2623 : : }
2624 [ + - ]: 1006 : return res;
2625 : 1006 : }
2626 : :
2627 : 17153 : util::Result<CTxDestination> CWallet::GetNewDestination(const OutputType type, const std::string& label)
2628 : : {
2629 : 17153 : LOCK(cs_wallet);
2630 [ + - ]: 17153 : auto spk_man = GetScriptPubKeyMan(type, /*internal=*/false);
2631 [ + + ]: 17153 : if (!spk_man) {
2632 [ + - + - ]: 6 : return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2633 : : }
2634 : :
2635 [ + - ]: 17151 : auto op_dest = spk_man->GetNewDestination(type);
2636 [ + + ]: 17151 : if (op_dest) {
2637 [ + - ]: 17147 : SetAddressBook(*op_dest, label, AddressPurpose::RECEIVE);
2638 : : }
2639 : :
2640 : 17151 : return op_dest;
2641 : 34304 : }
2642 : :
2643 : 286 : util::Result<CTxDestination> CWallet::GetNewChangeDestination(const OutputType type)
2644 : : {
2645 : 286 : LOCK(cs_wallet);
2646 : :
2647 [ + - ]: 286 : ReserveDestination reservedest(this, type);
2648 [ + - ]: 286 : auto op_dest = reservedest.GetReservedDestination(true);
2649 [ + + + - ]: 286 : if (op_dest) reservedest.KeepDestination();
2650 : :
2651 : 286 : return op_dest;
2652 [ + - ]: 572 : }
2653 : :
2654 : 862 : void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) {
2655 [ + + + + ]: 257054 : for (auto& entry : mapWallet) {
2656 : 256192 : CWalletTx& wtx = entry.second;
2657 [ + + ]: 256192 : if (wtx.m_is_cache_empty) continue;
2658 [ - + + + ]: 114 : for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
2659 : 75 : CTxDestination dst;
2660 [ + - + + : 75 : if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.contains(dst)) {
+ + ]
2661 : 2 : wtx.MarkDirty();
2662 : 2 : break;
2663 : : }
2664 : 75 : }
2665 : : }
2666 : 862 : }
2667 : :
2668 : 124 : void CWallet::ForEachAddrBookEntry(const ListAddrBookFunc& func) const
2669 : : {
2670 : 124 : AssertLockHeld(cs_wallet);
2671 [ + + ]: 1461 : for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book) {
2672 : 1337 : const auto& entry = item.second;
2673 [ + - ]: 2674 : func(item.first, entry.GetLabel(), entry.IsChange(), entry.purpose);
2674 : : }
2675 : 124 : }
2676 : :
2677 : 24 : std::vector<CTxDestination> CWallet::ListAddrBookAddresses(const std::optional<AddrBookFilter>& _filter) const
2678 : : {
2679 : 24 : AssertLockHeld(cs_wallet);
2680 : 24 : std::vector<CTxDestination> result;
2681 [ + - + - ]: 24 : AddrBookFilter filter = _filter ? *_filter : AddrBookFilter();
2682 [ + - ]: 24 : ForEachAddrBookEntry([&result, &filter](const CTxDestination& dest, const std::string& label, bool is_change, const std::optional<AddressPurpose>& purpose) {
2683 : : // Filter by change
2684 [ + - + - ]: 200 : if (filter.ignore_change && is_change) return;
2685 : : // Filter by label
2686 [ + - + + ]: 200 : if (filter.m_op_label && *filter.m_op_label != label) return;
2687 : : // All good
2688 : 43 : result.emplace_back(dest);
2689 : : });
2690 : 24 : return result;
2691 : 24 : }
2692 : :
2693 : 38 : std::set<std::string> CWallet::ListAddrBookLabels(const std::optional<AddressPurpose> purpose) const
2694 : : {
2695 : 38 : AssertLockHeld(cs_wallet);
2696 [ + - ]: 38 : std::set<std::string> label_set;
2697 [ + - ]: 38 : ForEachAddrBookEntry([&](const CTxDestination& _dest, const std::string& _label,
2698 : : bool _is_change, const std::optional<AddressPurpose>& _purpose) {
2699 [ + - ]: 489 : if (_is_change) return;
2700 [ + + + - ]: 489 : if (!purpose || purpose == _purpose) {
2701 : 478 : label_set.insert(_label);
2702 : : }
2703 : : });
2704 : 38 : return label_set;
2705 : 0 : }
2706 : :
2707 : 2135 : util::Result<CTxDestination> ReserveDestination::GetReservedDestination(bool internal)
2708 : : {
2709 : 2135 : m_spk_man = pwallet->GetScriptPubKeyMan(type, internal);
2710 [ + + ]: 2135 : if (!m_spk_man) {
2711 : 24 : return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2712 : : }
2713 : :
2714 [ + - ]: 2123 : if (nIndex == -1) {
2715 : 2123 : int64_t index;
2716 : 2123 : auto op_address = m_spk_man->GetReservedDestination(type, internal, index);
2717 [ + + ]: 2123 : if (!op_address) return op_address;
2718 : 2119 : nIndex = index;
2719 [ + - ]: 4238 : address = *op_address;
2720 : 2123 : }
2721 : 2119 : return address;
2722 : : }
2723 : :
2724 : 3845 : void ReserveDestination::KeepDestination()
2725 : : {
2726 [ + + ]: 3845 : if (nIndex != -1) {
2727 : 2014 : m_spk_man->KeepDestination(nIndex, type);
2728 : : }
2729 : 3845 : nIndex = -1;
2730 : 3845 : address = CNoDestination();
2731 : 3845 : }
2732 : :
2733 : 3961 : void ReserveDestination::ReturnDestination()
2734 : : {
2735 [ + + ]: 3961 : if (nIndex != -1) {
2736 : 105 : m_spk_man->ReturnDestination(nIndex, fInternal, address);
2737 : : }
2738 : 3961 : nIndex = -1;
2739 : 3961 : address = CNoDestination();
2740 : 3961 : }
2741 : :
2742 : 5 : util::Result<void> CWallet::DisplayAddress(const CTxDestination& dest)
2743 : : {
2744 : 5 : CScript scriptPubKey = GetScriptForDestination(dest);
2745 [ + - + - ]: 5 : for (const auto& spk_man : GetScriptPubKeyMans(scriptPubKey)) {
2746 [ + - ]: 5 : auto signer_spk_man = dynamic_cast<ExternalSignerScriptPubKeyMan *>(spk_man);
2747 [ - + ]: 5 : if (signer_spk_man == nullptr) {
2748 : 0 : continue;
2749 : : }
2750 [ + + ]: 5 : auto signer{ExternalSignerScriptPubKeyMan::GetExternalSigner()};
2751 [ - + - - : 4 : if (!signer) throw std::runtime_error(util::ErrorString(signer).original);
- - ]
2752 [ + - ]: 4 : return signer_spk_man->DisplayAddress(dest, *signer);
2753 : 5 : }
2754 [ # # ]: 0 : return util::Error{_("There is no ScriptPubKeyManager for this address")};
2755 : 4 : }
2756 : :
2757 : 82 : void CWallet::LoadLockedCoin(const COutPoint& coin, bool persistent)
2758 : : {
2759 : 82 : AssertLockHeld(cs_wallet);
2760 : 82 : m_locked_coins.emplace(coin, persistent);
2761 : 82 : }
2762 : :
2763 : 80 : bool CWallet::LockCoin(const COutPoint& output, bool persist)
2764 : : {
2765 : 80 : AssertLockHeld(cs_wallet);
2766 : 80 : LoadLockedCoin(output, persist);
2767 [ + + ]: 80 : if (persist) {
2768 : 1 : WalletBatch batch(GetDatabase());
2769 [ + - ]: 1 : return batch.WriteLockedUTXO(output);
2770 : 1 : }
2771 : : return true;
2772 : : }
2773 : :
2774 : 13381 : bool CWallet::UnlockCoin(const COutPoint& output)
2775 : : {
2776 : 13381 : AssertLockHeld(cs_wallet);
2777 : 13381 : auto locked_coin_it = m_locked_coins.find(output);
2778 [ + + ]: 13381 : if (locked_coin_it != m_locked_coins.end()) {
2779 : 10 : bool persisted = locked_coin_it->second;
2780 : 10 : m_locked_coins.erase(locked_coin_it);
2781 [ + + ]: 10 : if (persisted) {
2782 : 1 : WalletBatch batch(GetDatabase());
2783 [ + - ]: 1 : return batch.EraseLockedUTXO(output);
2784 : 1 : }
2785 : : }
2786 : : return true;
2787 : : }
2788 : :
2789 : 4 : bool CWallet::UnlockAllCoins()
2790 : : {
2791 : 4 : AssertLockHeld(cs_wallet);
2792 : 4 : bool success = true;
2793 : 4 : WalletBatch batch(GetDatabase());
2794 [ - + + + ]: 56 : for (const auto& [coin, persistent] : m_locked_coins) {
2795 [ - + - - : 52 : if (persistent) success = success && batch.EraseLockedUTXO(coin);
- - - - ]
2796 : : }
2797 : 4 : m_locked_coins.clear();
2798 : 4 : return success;
2799 : 4 : }
2800 : :
2801 : 468518 : bool CWallet::IsLockedCoin(const COutPoint& output) const
2802 : : {
2803 : 468518 : AssertLockHeld(cs_wallet);
2804 : 468518 : return m_locked_coins.contains(output);
2805 : : }
2806 : :
2807 : 9 : void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const
2808 : : {
2809 : 9 : AssertLockHeld(cs_wallet);
2810 [ + + ]: 13 : for (const auto& [coin, _] : m_locked_coins) {
2811 : 4 : vOutpts.push_back(coin);
2812 : : }
2813 : 9 : }
2814 : :
2815 : : /**
2816 : : * Compute smart timestamp for a transaction being added to the wallet.
2817 : : *
2818 : : * Logic:
2819 : : * - If sending a transaction, assign its timestamp to the current time.
2820 : : * - If receiving a transaction outside a block, assign its timestamp to the
2821 : : * current time.
2822 : : * - If receiving a transaction during a rescanning process, assign all its
2823 : : * (not already known) transactions' timestamps to the block time.
2824 : : * - If receiving a block with a future timestamp, assign all its (not already
2825 : : * known) transactions' timestamps to the current time.
2826 : : * - If receiving a block with a past timestamp, before the most recent known
2827 : : * transaction (that we care about), assign all its (not already known)
2828 : : * transactions' timestamps to the same timestamp as that most-recent-known
2829 : : * transaction.
2830 : : * - If receiving a block with a past timestamp, but after the most recent known
2831 : : * transaction, assign all its (not already known) transactions' timestamps to
2832 : : * the block time.
2833 : : *
2834 : : * For more information see CWalletTx::nTimeSmart,
2835 : : * https://bitcointalk.org/?topic=54527, or
2836 : : * https://github.com/bitcoin/bitcoin/pull/1393.
2837 : : */
2838 : 18984 : unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const
2839 : : {
2840 : 18984 : std::optional<uint256> block_hash;
2841 [ + + ]: 18984 : if (auto* conf = wtx.state<TxStateConfirmed>()) {
2842 : 15375 : block_hash = conf->confirmed_block_hash;
2843 [ - + ]: 3609 : } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
2844 : 0 : block_hash = conf->conflicting_block_hash;
2845 : : }
2846 : :
2847 : 18984 : unsigned int nTimeSmart = wtx.nTimeReceived;
2848 [ + + ]: 18984 : if (block_hash) {
2849 : 15375 : int64_t blocktime;
2850 : 15375 : int64_t block_max_time;
2851 [ + - ]: 15375 : if (chain().findBlock(*block_hash, FoundBlock().time(blocktime).maxTime(block_max_time))) {
2852 [ + + ]: 15375 : if (rescanning_old_block) {
2853 : 4406 : nTimeSmart = block_max_time;
2854 : : } else {
2855 : 10969 : int64_t latestNow = wtx.nTimeReceived;
2856 : 10969 : int64_t latestEntry = 0;
2857 : :
2858 : : // Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future
2859 : 10969 : int64_t latestTolerated = latestNow + 300;
2860 : 10969 : const TxItems& txOrdered = wtxOrdered;
2861 [ + + ]: 21940 : for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) {
2862 : 21815 : CWalletTx* const pwtx = it->second;
2863 [ + + ]: 21815 : if (pwtx == &wtx) {
2864 : 10969 : continue;
2865 : : }
2866 : 10846 : int64_t nSmartTime;
2867 : 10846 : nSmartTime = pwtx->nTimeSmart;
2868 [ - + ]: 10846 : if (!nSmartTime) {
2869 : 0 : nSmartTime = pwtx->nTimeReceived;
2870 : : }
2871 [ + + ]: 10846 : if (nSmartTime <= latestTolerated) {
2872 : 10844 : latestEntry = nSmartTime;
2873 [ + + ]: 10844 : if (nSmartTime > latestNow) {
2874 : 4 : latestNow = nSmartTime;
2875 : : }
2876 : : break;
2877 : : }
2878 : : }
2879 : :
2880 [ + + + + ]: 12052 : nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow));
2881 : : }
2882 : : } else {
2883 [ # # # # ]: 0 : WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), block_hash->ToString());
2884 : : }
2885 : : }
2886 : 18984 : return nTimeSmart;
2887 : : }
2888 : :
2889 : 19 : bool CWallet::SetAddressPreviouslySpent(WalletBatch& batch, const CTxDestination& dest, bool used)
2890 : : {
2891 [ + - ]: 19 : if (std::get_if<CNoDestination>(&dest))
2892 : : return false;
2893 : :
2894 [ - + ]: 19 : if (!used) {
2895 [ # # ]: 0 : if (auto* data{common::FindKey(m_address_book, dest)}) data->previously_spent = false;
2896 : 0 : return batch.WriteAddressPreviouslySpent(dest, false);
2897 : : }
2898 : :
2899 : 19 : LoadAddressPreviouslySpent(dest);
2900 : 19 : return batch.WriteAddressPreviouslySpent(dest, true);
2901 : : }
2902 : :
2903 : 26 : void CWallet::LoadAddressPreviouslySpent(const CTxDestination& dest)
2904 : : {
2905 : 26 : m_address_book[dest].previously_spent = true;
2906 : 26 : }
2907 : :
2908 : 3 : void CWallet::LoadAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& request)
2909 : : {
2910 : 3 : m_address_book[dest].receive_requests[id] = request;
2911 : 3 : }
2912 : :
2913 : 1652 : bool CWallet::IsAddressPreviouslySpent(const CTxDestination& dest) const
2914 : : {
2915 [ + + ]: 1652 : if (auto* data{common::FindKey(m_address_book, dest)}) return data->previously_spent;
2916 : : return false;
2917 : : }
2918 : :
2919 : 2 : std::vector<std::string> CWallet::GetAddressReceiveRequests() const
2920 : : {
2921 : 2 : std::vector<std::string> values;
2922 [ + + ]: 5 : for (const auto& [dest, entry] : m_address_book) {
2923 [ + - + + ]: 6 : for (const auto& [id, request] : entry.receive_requests) {
2924 [ + - ]: 3 : values.emplace_back(request);
2925 : : }
2926 : : }
2927 : 2 : return values;
2928 : 0 : }
2929 : :
2930 : 4 : bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value)
2931 : : {
2932 [ + - ]: 4 : if (!batch.WriteAddressReceiveRequest(dest, id, value)) return false;
2933 : 4 : m_address_book[dest].receive_requests[id] = value;
2934 : 4 : return true;
2935 : : }
2936 : :
2937 : 1 : bool CWallet::EraseAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id)
2938 : : {
2939 [ + - ]: 1 : if (!batch.EraseAddressReceiveRequest(dest, id)) return false;
2940 : 1 : m_address_book[dest].receive_requests.erase(id);
2941 : 1 : return true;
2942 : : }
2943 : :
2944 : 1472 : util::Result<fs::path> GetWalletPath(const std::string& name)
2945 : : {
2946 : 1472 : const fs::path name_path = fs::PathFromString(name);
2947 : :
2948 : : // 'name' must be a normalized path, i.e. no . or .. except at the root
2949 [ + - + + ]: 4416 : if (name_path != name_path.lexically_normal()) {
2950 [ + - + - ]: 48 : return util::Error{Untranslated("Wallet name given as a path must be normalized")};
2951 : : }
2952 : :
2953 : : // 'name' cannot begin with ./ or ../
2954 [ + + + - : 6156 : if (!name_path.empty() && (*name_path.begin() == fs::PathFromString(".") || *name_path.begin() == fs::PathFromString(".."))) {
+ - + + +
+ + - + -
+ + + + +
+ + + + +
+ + - - -
- - - ]
2955 [ + - + - ]: 18 : return util::Error{Untranslated("Wallet name given as a relative path cannot begin with ./ or ../, for wallets not in the walletdir, please use an absolute path.")};
2956 : : }
2957 : :
2958 : : // Disallow path at root
2959 [ + + + - : 1482 : if (name_path.has_root_path() && name_path.root_path() == name_path) {
+ + + + ]
2960 [ + - + - ]: 6 : return util::Error{Untranslated("Wallet name cannot be the root path")};
2961 : : }
2962 : :
2963 : : // Do some checking on wallet path. It should be either a:
2964 : : //
2965 : : // 1. Path where a directory can be created.
2966 : : // 2. Path to an existing directory.
2967 : : // 3. Path to a symlink to a directory.
2968 : : // 4. For backwards compatibility, the name of a data file in -walletdir.
2969 [ + - + - ]: 1448 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), name_path);
2970 [ + - ]: 1448 : fs::file_type path_type = fs::symlink_status(wallet_path).type();
2971 [ + + + + : 1466 : if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory ||
+ + + + ]
2972 [ + - + + ]: 16 : (path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) ||
2973 [ + - - + ]: 4 : (path_type == fs::file_type::regular && name_path.filename() == name_path))) {
2974 [ + - + - ]: 8 : return util::Error{Untranslated(strprintf(
2975 : : "Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and "
2976 : : "database/log.?????????? files can be stored, a location where such a directory could be created, "
2977 : : "or (for backwards compatibility) the name of an existing data file in -walletdir (%s)",
2978 [ + - + - ]: 20 : name, fs::quoted(fs::PathToString(GetWalletDir()))))};
2979 : : }
2980 [ + - ]: 2888 : return wallet_path;
2981 : 2920 : }
2982 : :
2983 : 1400 : std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string)
2984 : : {
2985 : 1400 : const auto& wallet_path = GetWalletPath(name);
2986 [ + + ]: 1400 : if (!wallet_path) {
2987 [ + - ]: 28 : error_string = util::ErrorString(wallet_path);
2988 : 28 : status = DatabaseStatus::FAILED_BAD_PATH;
2989 : 28 : return nullptr;
2990 : : }
2991 [ + - ]: 1372 : return MakeDatabase(*wallet_path, options, status, error_string);
2992 : 1400 : }
2993 : :
2994 : 958 : bool CWallet::LoadWalletArgs(std::shared_ptr<CWallet> wallet, const WalletContext& context, bilingual_str& error, std::vector<bilingual_str>& warnings)
2995 : : {
2996 : 958 : interfaces::Chain* chain = context.chain;
2997 [ - + ]: 958 : const ArgsManager& args = *Assert(context.args);
2998 : :
2999 [ + - + - : 958 : if (!args.GetArg("-addresstype", "").empty()) {
+ + ]
3000 [ + - + - : 207 : std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-addresstype", ""));
+ - ]
3001 [ - + ]: 69 : if (!parsed) {
3002 [ # # # # : 0 : error = strprintf(_("Unknown address type '%s'"), args.GetArg("-addresstype", ""));
# # ]
3003 : 0 : return false;
3004 : : }
3005 : 69 : wallet->m_default_address_type = parsed.value();
3006 : : }
3007 : :
3008 [ + - + - : 958 : if (!args.GetArg("-changetype", "").empty()) {
+ + ]
3009 [ + - + - : 30 : std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-changetype", ""));
+ - ]
3010 [ - + ]: 10 : if (!parsed) {
3011 [ # # # # : 0 : error = strprintf(_("Unknown change type '%s'"), args.GetArg("-changetype", ""));
# # ]
3012 : 0 : return false;
3013 : : }
3014 : 10 : wallet->m_default_change_type = parsed.value();
3015 : : }
3016 : :
3017 [ + - + + ]: 1916 : if (const auto arg{args.GetArg("-mintxfee")}) {
3018 [ + - ]: 13 : std::optional<CAmount> min_tx_fee = ParseMoney(*arg);
3019 [ - + ]: 13 : if (!min_tx_fee) {
3020 [ # # # # ]: 0 : error = AmountErrMsg("mintxfee", *arg);
3021 : 0 : return false;
3022 [ - + ]: 13 : } else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
3023 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") +
# # ]
3024 [ # # # # ]: 0 : _("This is the minimum transaction fee you pay on every transaction."));
3025 : : }
3026 : :
3027 : 13 : wallet->m_min_fee = CFeeRate{min_tx_fee.value()};
3028 : 0 : }
3029 : :
3030 [ + - + + ]: 1916 : if (const auto arg{args.GetArg("-maxapsfee")}) {
3031 [ - + ]: 2 : const std::string& max_aps_fee{*arg};
3032 [ - + ]: 2 : if (max_aps_fee == "-1") {
3033 : 0 : wallet->m_max_aps_fee = -1;
3034 [ + - + - ]: 2 : } else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) {
3035 [ - + ]: 2 : if (max_fee.value() > HIGH_APS_FEE) {
3036 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") +
# # ]
3037 [ # # # # ]: 0 : _("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection."));
3038 : : }
3039 : 2 : wallet->m_max_aps_fee = max_fee.value();
3040 : : } else {
3041 [ # # # # ]: 0 : error = AmountErrMsg("maxapsfee", max_aps_fee);
3042 : 0 : return false;
3043 : : }
3044 : 0 : }
3045 : :
3046 [ + - + + ]: 1916 : if (const auto arg{args.GetArg("-fallbackfee")}) {
3047 [ + - ]: 952 : std::optional<CAmount> fallback_fee = ParseMoney(*arg);
3048 [ - + ]: 952 : if (!fallback_fee) {
3049 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-fallbackfee", *arg);
3050 : 0 : return false;
3051 [ + + ]: 952 : } else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) {
3052 [ + - + - : 6 : warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") +
+ - ]
3053 [ + - + - ]: 2 : _("This is the transaction fee you may pay when fee estimates are not available."));
3054 : : }
3055 : 952 : wallet->m_fallback_fee = CFeeRate{fallback_fee.value()};
3056 : 0 : }
3057 : :
3058 : : // Disable fallback fee in case value was set to 0, enable if non-null value
3059 : 958 : wallet->m_allow_fallback_fee = wallet->m_fallback_fee.GetFeePerK() != 0;
3060 : :
3061 [ + - + + ]: 1916 : if (const auto arg{args.GetArg("-discardfee")}) {
3062 [ + - ]: 6 : std::optional<CAmount> discard_fee = ParseMoney(*arg);
3063 [ - + ]: 6 : if (!discard_fee) {
3064 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-discardfee", *arg);
3065 : 0 : return false;
3066 [ + + ]: 6 : } else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) {
3067 [ + - + - : 24 : warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") +
+ - ]
3068 [ + - + - ]: 8 : _("This is the transaction fee you may discard if change is smaller than dust at this level"));
3069 : : }
3070 : 6 : wallet->m_discard_rate = CFeeRate{discard_fee.value()};
3071 : 0 : }
3072 : :
3073 [ + - + + ]: 1916 : if (const auto arg{args.GetArg("-maxtxfee")}) {
3074 [ + - ]: 1 : std::optional<CAmount> max_fee = ParseMoney(*arg);
3075 [ - + ]: 1 : if (!max_fee) {
3076 [ # # # # ]: 0 : error = AmountErrMsg("maxtxfee", *arg);
3077 : 0 : return false;
3078 [ - + ]: 1 : } else if (max_fee.value() > HIGH_MAX_TX_FEE) {
3079 [ # # ]: 0 : warnings.push_back(strprintf(_("%s is set very high! Fees this large could be paid on a single transaction."), "-maxtxfee"));
3080 : : }
3081 : :
3082 [ + - + - : 2 : if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) {
+ - - + ]
3083 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),
3084 [ # # # # ]: 0 : "-maxtxfee", *arg, chain->relayMinFee().ToString());
3085 : 0 : return false;
3086 : : }
3087 : :
3088 [ + - ]: 1 : wallet->m_default_max_tx_fee = max_fee.value();
3089 : 0 : }
3090 : :
3091 [ + - - + ]: 1916 : if (const auto arg{args.GetArg("-consolidatefeerate")}) {
3092 [ # # # # ]: 0 : if (std::optional<CAmount> consolidate_feerate = ParseMoney(*arg)) {
3093 : 0 : wallet->m_consolidate_feerate = CFeeRate(*consolidate_feerate);
3094 : : } else {
3095 [ # # # # ]: 0 : error = AmountErrMsg("consolidatefeerate", *arg);
3096 : 0 : return false;
3097 : : }
3098 : 0 : }
3099 : :
3100 [ + + + + ]: 958 : if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB) {
3101 [ + - + - : 12 : warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") +
+ - ]
3102 [ + - ]: 4 : _("The wallet will avoid paying less than the minimum relay fee."));
3103 : : }
3104 : :
3105 : 1916 : wallet->m_confirm_target = args.GetIntArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET);
3106 [ + - ]: 958 : wallet->m_spend_zero_conf_change = args.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE);
3107 [ + - ]: 958 : wallet->m_signal_rbf = args.GetBoolArg("-walletrbf", DEFAULT_WALLET_RBF);
3108 : :
3109 [ + + ]: 2871 : wallet->m_keypool_size = std::max(args.GetIntArg("-keypool", DEFAULT_KEYPOOL_SIZE), int64_t{1});
3110 [ + - + - ]: 958 : wallet->m_notify_tx_changed_script = args.GetArg("-walletnotify", "");
3111 [ + - ]: 958 : wallet->SetBroadcastTransactions(args.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST));
3112 : :
3113 : 958 : return true;
3114 : : }
3115 : :
3116 : 606 : std::shared_ptr<CWallet> CWallet::CreateNew(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings)
3117 : : {
3118 : 606 : interfaces::Chain* chain = context.chain;
3119 : 606 : const std::string& walletFile = database->Filename();
3120 : :
3121 : 606 : const auto start{SteadyClock::now()};
3122 : : // TODO: Can't use std::make_shared because we need a custom deleter but
3123 : : // should be possible to use std::allocate_shared.
3124 [ + - + - : 1212 : std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
+ - - - ]
3125 : :
3126 [ + - + - : 1818 : if (!LoadWalletArgs(walletInstance, context, error, warnings)) {
+ - - + ]
3127 : 0 : return nullptr;
3128 : : }
3129 : :
3130 : : // Initialize version key.
3131 [ + - + - : 1212 : if(!WalletBatch(walletInstance->GetDatabase()).WriteVersion(CLIENT_VERSION)) {
- + ]
3132 [ # # ]: 0 : error = strprintf(_("Error creating %s: Could not write version metadata."), walletFile);
3133 : 0 : return nullptr;
3134 : : }
3135 : 606 : {
3136 [ + - ]: 606 : LOCK(walletInstance->cs_wallet);
3137 : :
3138 : : // Init with passed flags.
3139 : : // Always set the cache upgrade flag as this feature is supported from the beginning.
3140 [ + - ]: 606 : walletInstance->InitWalletFlags(wallet_creation_flags | WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
3141 : :
3142 : : // Only descriptor wallets can be created
3143 [ + - - + ]: 606 : assert(walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3144 : :
3145 [ + + + + ]: 606 : if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) || !(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) {
3146 [ + + ]: 389 : walletInstance->SetupDescriptorScriptPubKeyMans();
3147 : : }
3148 : :
3149 [ + + ]: 603 : if (chain) {
3150 [ + - ]: 585 : std::optional<int> tip_height = chain->getHeight();
3151 [ + - ]: 585 : if (tip_height) {
3152 [ + - + - ]: 585 : walletInstance->SetLastBlockProcessed(*tip_height, chain->getBlockHash(*tip_height));
3153 : : }
3154 : : }
3155 : 3 : }
3156 : :
3157 [ + - ]: 603 : walletInstance->WalletLogPrintf("Wallet completed creation in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3158 : :
3159 : : // Try to top up keypool. No-op if the wallet is locked.
3160 [ + - ]: 603 : walletInstance->TopUpKeyPool();
3161 : :
3162 [ + + + - : 603 : if (chain && !AttachChain(walletInstance, *chain, /*rescan_required=*/false, error, warnings)) {
- + ]
3163 [ # # ]: 0 : walletInstance->DisconnectChainNotifications();
3164 : 0 : return nullptr;
3165 : : }
3166 : :
3167 : 603 : return walletInstance;
3168 : 606 : }
3169 : :
3170 : 352 : std::shared_ptr<CWallet> CWallet::LoadExisting(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, bilingual_str& error, std::vector<bilingual_str>& warnings)
3171 : : {
3172 : 352 : interfaces::Chain* chain = context.chain;
3173 : 352 : const std::string& walletFile = database->Filename();
3174 : :
3175 : 352 : const auto start{SteadyClock::now()};
3176 [ + - + - : 704 : std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
+ - - - ]
3177 : :
3178 [ + - + - : 1056 : if (!LoadWalletArgs(walletInstance, context, error, warnings)) {
+ - - + ]
3179 : 0 : return nullptr;
3180 : : }
3181 : :
3182 : : // Load wallet
3183 [ + - ]: 352 : auto nLoadWalletRet = walletInstance->PopulateWalletFromDB(error, warnings);
3184 : 352 : bool rescan_required = nLoadWalletRet == DBErrors::NEED_RESCAN;
3185 [ + + + - ]: 352 : if (nLoadWalletRet != DBErrors::LOAD_OK && nLoadWalletRet != DBErrors::NONCRITICAL_ERROR && !rescan_required) {
3186 : 1 : return nullptr;
3187 : : }
3188 : :
3189 [ + - + + ]: 351 : if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
3190 [ + - + + ]: 104 : for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
3191 [ + - - + ]: 16 : if (spk_man->HavePrivateKeys()) {
3192 [ # # ]: 0 : warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));
3193 : 0 : break;
3194 : : }
3195 : : }
3196 : : }
3197 : :
3198 [ + - ]: 351 : walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3199 : :
3200 : : // Try to top up keypool. No-op if the wallet is locked.
3201 [ + - ]: 351 : walletInstance->TopUpKeyPool();
3202 : :
3203 [ + + + - : 351 : if (chain && !AttachChain(walletInstance, *chain, rescan_required, error, warnings)) {
+ + ]
3204 [ + - ]: 9 : walletInstance->DisconnectChainNotifications();
3205 : 9 : return nullptr;
3206 : : }
3207 : :
3208 [ + - + - ]: 1026 : WITH_LOCK(walletInstance->cs_wallet, walletInstance->LogStats());
3209 : :
3210 : 342 : return walletInstance;
3211 : 352 : }
3212 : :
3213 : :
3214 : 893 : bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, const bool rescan_required, bilingual_str& error, std::vector<bilingual_str>& warnings)
3215 : : {
3216 : 893 : LOCK(walletInstance->cs_wallet);
3217 : : // allow setting the chain if it hasn't been set already but prevent changing it
3218 [ + - - + ]: 893 : assert(!walletInstance->m_chain || walletInstance->m_chain == &chain);
3219 [ + - ]: 893 : walletInstance->m_chain = &chain;
3220 : :
3221 : : // Unless allowed, ensure wallet files are not reused across chains:
3222 [ + - + - : 893 : if (!gArgs.GetBoolArg("-walletcrosschain", DEFAULT_WALLETCROSSCHAIN)) {
+ - ]
3223 [ + - ]: 893 : WalletBatch batch(walletInstance->GetDatabase());
3224 : 893 : CBlockLocator locator;
3225 [ + - + + : 1785 : if (batch.ReadBestBlock(locator) && locator.vHave.size() > 0 && chain.getHeight()) {
+ - + - +
+ ]
3226 : : // Wallet is assumed to be from another chain, if genesis block in the active
3227 : : // chain differs from the genesis block known to the wallet.
3228 [ + - + + ]: 887 : if (chain.getBlockHash(0) != locator.vHave.back()) {
3229 [ + - + - ]: 2 : error = Untranslated("Wallet files should not be reused across chains. Restart bitcoind with -walletcrosschain to override.");
3230 : 1 : return false;
3231 : : }
3232 : : }
3233 : 1786 : }
3234 : :
3235 : : // Register wallet with validationinterface. It's done before rescan to avoid
3236 : : // missing block connections during the rescan.
3237 : : // Because of the wallet lock being held, block connection notifications are going to
3238 : : // be pending on the validation-side until lock release. Blocks that are connected while the
3239 : : // rescan is ongoing will not be processed in the rescan but with the block connected notifications,
3240 : : // so the wallet will only be completeley synced after the notifications delivery.
3241 [ + - - + ]: 892 : walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance);
3242 : :
3243 : : // If rescan_required = true, rescan_height remains equal to 0
3244 : 892 : int rescan_height = 0;
3245 [ + - ]: 892 : if (!rescan_required)
3246 : : {
3247 [ + - ]: 892 : WalletBatch batch(walletInstance->GetDatabase());
3248 : 892 : CBlockLocator locator;
3249 [ + - + + ]: 892 : if (batch.ReadBestBlock(locator)) {
3250 [ + - + + ]: 891 : if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) {
3251 : 886 : rescan_height = *fork_height;
3252 : : }
3253 : : }
3254 : 1784 : }
3255 : :
3256 [ + - ]: 892 : const std::optional<int> tip_height = chain.getHeight();
3257 [ + + ]: 892 : if (tip_height) {
3258 [ + - + - ]: 887 : walletInstance->SetLastBlockProcessedInMem(*tip_height, chain.getBlockHash(*tip_height));
3259 : : } else {
3260 [ + - ]: 5 : walletInstance->SetLastBlockProcessedInMem(-1, uint256());
3261 : : }
3262 : :
3263 [ + + + + ]: 892 : if (tip_height && *tip_height != rescan_height)
3264 : : {
3265 : : // No need to read and scan block if block was created before
3266 : : // our wallet birthday (as adjusted for block time variability)
3267 [ + - ]: 65 : std::optional<int64_t> time_first_key = walletInstance->m_birth_time.load();
3268 [ + - ]: 65 : if (time_first_key) {
3269 [ + - ]: 65 : FoundBlock found = FoundBlock().height(rescan_height);
3270 [ + - ]: 65 : chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, found);
3271 [ - + ]: 65 : if (!found.found) {
3272 : : // We were unable to find a block that had a time more recent than our earliest timestamp
3273 : : // or a height higher than the wallet was synced to, indicating that the wallet is newer than the
3274 : : // current chain tip. Skip rescanning in this case.
3275 : 0 : rescan_height = *tip_height;
3276 : : }
3277 : : }
3278 : :
3279 : : // Technically we could execute the code below in any case, but performing the
3280 : : // `while` loop below can make startup very slow, so only check blocks on disk
3281 : : // if necessary.
3282 [ + - + + : 65 : if (chain.havePruned() || chain.hasAssumedValidChain()) {
+ - + + ]
3283 : 14 : int block_height = *tip_height;
3284 [ + - + - : 2251 : while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) {
+ + + + ]
3285 : 2237 : --block_height;
3286 : : }
3287 : :
3288 [ + + ]: 14 : if (rescan_height != block_height) {
3289 : : // We can't rescan beyond blocks we don't have data for, stop and throw an error.
3290 : : // This might happen if a user uses an old wallet within a pruned node
3291 : : // or if they ran -disablewallet for a longer time, then decided to re-enable
3292 : : // Exit early and print an error.
3293 : : // It also may happen if an assumed-valid chain is in use and therefore not
3294 : : // all block data is available.
3295 : : // If a block is pruned after this check, we will load the wallet,
3296 : : // but fail the rescan with a generic error.
3297 : :
3298 [ + - + + : 8 : error = chain.havePruned() ?
+ - ]
3299 [ + - ]: 3 : _("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of a pruned node)") :
3300 : : strprintf(_(
3301 : : "Error loading wallet. Wallet requires blocks to be downloaded, "
3302 : : "and software does not currently support loading wallets while "
3303 : : "blocks are being downloaded out of order when using assumeutxo "
3304 : : "snapshots. Wallet should be able to load successfully after "
3305 : 8 : "node sync reaches height %s"), block_height);
3306 : 8 : return false;
3307 : : }
3308 : : }
3309 : :
3310 [ + - + - ]: 57 : chain.initMessage(_("Rescanning…"));
3311 [ + - ]: 57 : walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height);
3312 : :
3313 : 57 : {
3314 : 57 : WalletRescanReserver reserver(*walletInstance);
3315 [ - + ]: 57 : if (!reserver.reserve()) {
3316 [ # # ]: 0 : error = _("Failed to acquire rescan reserver during wallet initialization");
3317 : 0 : return false;
3318 : : }
3319 [ + - + - ]: 57 : ScanResult scan_res = walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, /*max_height=*/{}, reserver, /*fUpdate=*/true, /*save_progress=*/true);
3320 [ - + ]: 57 : if (ScanResult::SUCCESS != scan_res.status) {
3321 [ # # ]: 0 : error = _("Failed to rescan the wallet during initialization");
3322 : 0 : return false;
3323 : : }
3324 : : // Set and update the best block record
3325 : : // Set last block scanned as the last block processed as it may be different in case of a reorg.
3326 : : // Also save the best block locator because rescanning only updates it intermittently.
3327 [ + - ]: 57 : walletInstance->SetLastBlockProcessed(*scan_res.last_scanned_height, scan_res.last_scanned_block);
3328 : 57 : }
3329 : : }
3330 : :
3331 : : return true;
3332 : 893 : }
3333 : :
3334 : 50558 : const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const
3335 : : {
3336 : 50558 : const auto& address_book_it = m_address_book.find(dest);
3337 [ + + ]: 50558 : if (address_book_it == m_address_book.end()) return nullptr;
3338 [ + - + + ]: 37764 : if ((!allow_change) && address_book_it->second.IsChange()) {
3339 : : return nullptr;
3340 : : }
3341 : 37761 : return &address_book_it->second;
3342 : : }
3343 : :
3344 : 884 : void CWallet::postInitProcess()
3345 : : {
3346 : : // Add wallet transactions that aren't already in a block to mempool
3347 : : // Do this here as mempool requires genesis block to be loaded
3348 : 884 : ResubmitWalletTransactions(node::TxBroadcast::MEMPOOL_NO_BROADCAST, /*force=*/true);
3349 : :
3350 : : // Update wallet transactions with current mempool transactions.
3351 [ + - ]: 2652 : WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
3352 : 884 : }
3353 : :
3354 : 109 : bool CWallet::BackupWallet(const std::string& strDest) const
3355 : : {
3356 [ + - ]: 327 : WITH_LOCK(cs_wallet, WriteBestBlock());
3357 : 109 : return GetDatabase().Backup(strDest);
3358 : : }
3359 : :
3360 : 1244669 : int CWallet::GetTxDepthInMainChain(const CWalletTx& wtx) const
3361 : : {
3362 : 1244669 : AssertLockHeld(cs_wallet);
3363 [ + + ]: 1244669 : if (auto* conf = wtx.state<TxStateConfirmed>()) {
3364 [ - + ]: 1161404 : assert(conf->confirmed_block_height >= 0);
3365 : 1161404 : return GetLastBlockHeight() - conf->confirmed_block_height + 1;
3366 [ + + ]: 83265 : } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
3367 [ - + ]: 4401 : assert(conf->conflicting_block_height >= 0);
3368 : 4401 : return -1 * (GetLastBlockHeight() - conf->conflicting_block_height + 1);
3369 : : } else {
3370 : : return 0;
3371 : : }
3372 : : }
3373 : :
3374 : 712425 : int CWallet::GetTxBlocksToMaturity(const CWalletTx& wtx) const
3375 : : {
3376 : 712425 : AssertLockHeld(cs_wallet);
3377 : :
3378 [ + + ]: 712425 : if (!wtx.IsCoinBase()) {
3379 : : return 0;
3380 : : }
3381 : 426825 : int chain_depth = GetTxDepthInMainChain(wtx);
3382 [ - + ]: 426825 : assert(chain_depth >= 0); // coinbase tx should not be conflicted
3383 [ + + ]: 426825 : return std::max(0, (COINBASE_MATURITY+1) - chain_depth);
3384 : : }
3385 : :
3386 : 712425 : bool CWallet::IsTxImmatureCoinBase(const CWalletTx& wtx) const
3387 : : {
3388 : 712425 : AssertLockHeld(cs_wallet);
3389 : :
3390 : : // note GetBlocksToMaturity is 0 for non-coinbase tx
3391 : 712425 : return GetTxBlocksToMaturity(wtx) > 0;
3392 : : }
3393 : :
3394 : 7939 : bool CWallet::IsLocked() const
3395 : : {
3396 [ + + ]: 7939 : if (!HasEncryptionKeys()) {
3397 : : return false;
3398 : : }
3399 : 3545 : LOCK(cs_wallet);
3400 [ + - ]: 3545 : return vMasterKey.empty();
3401 : 3545 : }
3402 : :
3403 : 80 : bool CWallet::Lock()
3404 : : {
3405 [ + - ]: 80 : if (!HasEncryptionKeys())
3406 : : return false;
3407 : :
3408 : 80 : {
3409 [ + - ]: 80 : LOCK2(m_relock_mutex, cs_wallet);
3410 [ + + ]: 80 : if (!vMasterKey.empty()) {
3411 [ - + + - ]: 54 : memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type));
3412 [ + - + - ]: 134 : vMasterKey.clear();
3413 : : }
3414 [ + - ]: 80 : }
3415 : :
3416 : 80 : NotifyStatusChanged(this);
3417 : 80 : return true;
3418 : : }
3419 : :
3420 : 70 : bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn)
3421 : : {
3422 : 70 : {
3423 : 70 : LOCK(cs_wallet);
3424 [ + + ]: 740 : for (const auto& spk_man_pair : m_spk_managers) {
3425 [ + - - + ]: 670 : if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn)) {
3426 [ # # ]: 0 : return false;
3427 : : }
3428 : : }
3429 [ + - ]: 70 : vMasterKey = vMasterKeyIn;
3430 : 0 : }
3431 : 70 : NotifyStatusChanged(this);
3432 : 70 : return true;
3433 : : }
3434 : :
3435 : 29977 : std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const
3436 : : {
3437 : 29977 : std::set<ScriptPubKeyMan*> spk_mans;
3438 [ + + ]: 89931 : for (bool internal : {false, true}) {
3439 [ + + ]: 299770 : for (OutputType t : OUTPUT_TYPES) {
3440 [ + - ]: 239816 : auto spk_man = GetScriptPubKeyMan(t, internal);
3441 [ + + ]: 239816 : if (spk_man) {
3442 [ + - ]: 136919 : spk_mans.insert(spk_man);
3443 : : }
3444 : : }
3445 : : }
3446 : 29977 : return spk_mans;
3447 : 0 : }
3448 : :
3449 : 227 : bool CWallet::IsActiveScriptPubKeyMan(const ScriptPubKeyMan& spkm) const
3450 : : {
3451 [ + + + + ]: 851 : for (const auto& [_, ext_spkm] : m_external_spk_managers) {
3452 [ + + ]: 729 : if (ext_spkm == &spkm) return true;
3453 : : }
3454 [ + + + + ]: 352 : for (const auto& [_, int_spkm] : m_internal_spk_managers) {
3455 [ + + ]: 329 : if (int_spkm == &spkm) return true;
3456 : : }
3457 : : return false;
3458 : : }
3459 : :
3460 : 4361 : std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const
3461 : : {
3462 : 4361 : std::set<ScriptPubKeyMan*> spk_mans;
3463 [ + + ]: 41381 : for (const auto& spk_man_pair : m_spk_managers) {
3464 [ + - ]: 37020 : spk_mans.insert(spk_man_pair.second.get());
3465 : : }
3466 : 4361 : return spk_mans;
3467 : 0 : }
3468 : :
3469 : 296091 : ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const OutputType& type, bool internal) const
3470 : : {
3471 [ + + ]: 296091 : const std::map<OutputType, ScriptPubKeyMan*>& spk_managers = internal ? m_internal_spk_managers : m_external_spk_managers;
3472 : 296091 : std::map<OutputType, ScriptPubKeyMan*>::const_iterator it = spk_managers.find(type);
3473 [ + + ]: 296091 : if (it == spk_managers.end()) {
3474 : : return nullptr;
3475 : : }
3476 : 187533 : return it->second;
3477 : : }
3478 : :
3479 : 173918 : std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script) const
3480 : : {
3481 [ + - ]: 173918 : std::set<ScriptPubKeyMan*> spk_mans;
3482 : :
3483 : : // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3484 [ + - ]: 173918 : const auto& it = m_cached_spks.find(script);
3485 [ + + ]: 173918 : if (it != m_cached_spks.end()) {
3486 [ + - ]: 111961 : spk_mans.insert(it->second.begin(), it->second.end());
3487 : : }
3488 : 173918 : SignatureData sigdata;
3489 [ + - ]: 285888 : Assume(std::all_of(spk_mans.begin(), spk_mans.end(), [&script, &sigdata](ScriptPubKeyMan* spkm) { return spkm->CanProvide(script, sigdata); }));
3490 : :
3491 : 173918 : return spk_mans;
3492 : 173918 : }
3493 : :
3494 : 7455 : ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const
3495 : : {
3496 [ + + ]: 7455 : if (m_spk_managers.contains(id)) {
3497 : 7445 : return m_spk_managers.at(id).get();
3498 : : }
3499 : : return nullptr;
3500 : : }
3501 : :
3502 : 371820 : std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const
3503 : : {
3504 : 371820 : SignatureData sigdata;
3505 [ + - ]: 743640 : return GetSolvingProvider(script, sigdata);
3506 : 371820 : }
3507 : :
3508 : 371820 : std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const
3509 : : {
3510 : : // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3511 : 371820 : const auto& it = m_cached_spks.find(script);
3512 [ + + ]: 371820 : if (it != m_cached_spks.end()) {
3513 : : // All spkms for a given script must already be able to make a SigningProvider for the script, so just return the first one.
3514 : 261606 : Assume(it->second.at(0)->CanProvide(script, sigdata));
3515 : 261606 : return it->second.at(0)->GetSolvingProvider(script);
3516 : : }
3517 : :
3518 : 110214 : return nullptr;
3519 : : }
3520 : :
3521 : 36201 : std::vector<WalletDescriptor> CWallet::GetWalletDescriptors(const CScript& script) const
3522 : : {
3523 : 36201 : std::vector<WalletDescriptor> descs;
3524 [ + - + + ]: 72403 : for (const auto spk_man: GetScriptPubKeyMans(script)) {
3525 [ + - + - ]: 36202 : if (const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man)) {
3526 [ + - ]: 36202 : LOCK(desc_spk_man->cs_desc_man);
3527 [ + - + - ]: 72404 : descs.push_back(desc_spk_man->GetWalletDescriptor());
3528 : 36202 : }
3529 : : }
3530 : 36201 : return descs;
3531 : 0 : }
3532 : :
3533 : 733 : LegacyDataSPKM* CWallet::GetLegacyDataSPKM() const
3534 : : {
3535 [ + - ]: 733 : if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3536 : : return nullptr;
3537 : : }
3538 : 733 : auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3539 [ + - ]: 733 : if (it == m_internal_spk_managers.end()) return nullptr;
3540 [ + - ]: 733 : return dynamic_cast<LegacyDataSPKM*>(it->second);
3541 : : }
3542 : :
3543 : 7168 : void CWallet::AddScriptPubKeyMan(const uint256& id, std::unique_ptr<ScriptPubKeyMan> spkm_man)
3544 : : {
3545 : : // Add spkm_man to m_spk_managers before calling any method
3546 : : // that might access it.
3547 : 7168 : const auto& spkm = m_spk_managers[id] = std::move(spkm_man);
3548 : :
3549 : : // Update birth time if needed
3550 : 7168 : MaybeUpdateBirthTime(spkm->GetTimeFirstKey());
3551 : 7168 : }
3552 : :
3553 : 632 : LegacyDataSPKM* CWallet::GetOrCreateLegacyDataSPKM()
3554 : : {
3555 : 632 : SetupLegacyScriptPubKeyMan();
3556 : 632 : return GetLegacyDataSPKM();
3557 : : }
3558 : :
3559 : 632 : void CWallet::SetupLegacyScriptPubKeyMan()
3560 : : {
3561 [ + + + - : 632 : if (!m_internal_spk_managers.empty() || !m_external_spk_managers.empty() || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
+ - - + ]
3562 : 592 : return;
3563 : : }
3564 : :
3565 [ + - - + : 40 : Assert(m_database->Format() == "bdb_ro" || m_database->Format() == "sqlite-mock");
- - - - -
+ - + - -
- - ]
3566 : 40 : std::unique_ptr<ScriptPubKeyMan> spk_manager = std::make_unique<LegacyDataSPKM>(*this);
3567 : :
3568 [ + + + - ]: 160 : for (const auto& type : LEGACY_OUTPUT_TYPES) {
3569 [ + - ]: 120 : m_internal_spk_managers[type] = spk_manager.get();
3570 [ + - ]: 120 : m_external_spk_managers[type] = spk_manager.get();
3571 : : }
3572 [ + - ]: 40 : uint256 id = spk_manager->GetID();
3573 [ + - ]: 40 : AddScriptPubKeyMan(id, std::move(spk_manager));
3574 : 40 : }
3575 : :
3576 : 2367 : bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const
3577 : : {
3578 : 2367 : LOCK(cs_wallet);
3579 [ + - + - ]: 2367 : return cb(vMasterKey);
3580 : 2367 : }
3581 : :
3582 : 111930 : bool CWallet::HasEncryptionKeys() const
3583 : : {
3584 : 111930 : return !mapMasterKeys.empty();
3585 : : }
3586 : :
3587 : 1 : bool CWallet::HaveCryptedKeys() const
3588 : : {
3589 [ - + ]: 1 : for (const auto& spkm : GetAllScriptPubKeyMans()) {
3590 [ # # # # ]: 0 : if (spkm->HaveCryptedKeys()) return true;
3591 : : }
3592 : 1 : return false;
3593 : : }
3594 : :
3595 : 1530 : void CWallet::ConnectScriptPubKeyManNotifiers()
3596 : : {
3597 [ + + ]: 9238 : for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
3598 [ + - ]: 7708 : spk_man->NotifyCanGetAddressesChanged.connect([this] {
3599 : 66999 : NotifyCanGetAddressesChanged();
3600 : : });
3601 [ + - ]: 15416 : spk_man->NotifyFirstKeyTimeChanged.connect([this](const ScriptPubKeyMan*, int64_t time) {
3602 : 48 : MaybeUpdateBirthTime(time);
3603 : : });
3604 : : }
3605 : 1530 : }
3606 : :
3607 : 2516 : DescriptorScriptPubKeyMan& CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc)
3608 : : {
3609 : 2516 : DescriptorScriptPubKeyMan* spk_manager;
3610 [ + + ]: 2516 : if (IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3611 [ + - ]: 8 : spk_manager = new ExternalSignerScriptPubKeyMan(*this, desc, m_keypool_size);
3612 : : } else {
3613 [ + - ]: 2508 : spk_manager = new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size);
3614 : : }
3615 [ + - ]: 2516 : AddScriptPubKeyMan(id, std::unique_ptr<ScriptPubKeyMan>(spk_manager));
3616 : 2516 : return *spk_manager;
3617 : : }
3618 : :
3619 : 3650 : DescriptorScriptPubKeyMan& CWallet::SetupDescriptorScriptPubKeyMan(WalletBatch& batch, const CExtKey& master_key, const OutputType& output_type, bool internal)
3620 : : {
3621 : 3650 : AssertLockHeld(cs_wallet);
3622 [ + - ]: 3650 : auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, m_keypool_size));
3623 [ + - + + ]: 3650 : if (HasEncryptionKeys()) {
3624 [ + - - + ]: 122 : if (IsLocked()) {
3625 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors");
3626 : : }
3627 [ + - - + : 122 : if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, &batch)) {
- - - - ]
3628 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors");
3629 : : }
3630 : : }
3631 [ + - ]: 3650 : spk_manager->SetupDescriptorGeneration(batch, master_key, output_type, internal);
3632 [ + - ]: 3650 : DescriptorScriptPubKeyMan* out = spk_manager.get();
3633 [ + - ]: 3650 : uint256 id = spk_manager->GetID();
3634 [ + - ]: 3650 : AddScriptPubKeyMan(id, std::move(spk_manager));
3635 [ + - ]: 3650 : AddActiveScriptPubKeyManWithDb(batch, id, output_type, internal);
3636 : 3650 : return *out;
3637 : 3650 : }
3638 : :
3639 : 455 : void CWallet::SetupDescriptorScriptPubKeyMans(WalletBatch& batch, const CExtKey& master_key)
3640 : : {
3641 : 455 : AssertLockHeld(cs_wallet);
3642 [ + + ]: 1365 : for (bool internal : {false, true}) {
3643 [ + + ]: 4550 : for (OutputType t : OUTPUT_TYPES) {
3644 : 3640 : SetupDescriptorScriptPubKeyMan(batch, master_key, t, internal);
3645 : : }
3646 : : }
3647 : 455 : }
3648 : :
3649 : 428 : void CWallet::SetupOwnDescriptorScriptPubKeyMans(WalletBatch& batch)
3650 : : {
3651 : 428 : AssertLockHeld(cs_wallet);
3652 [ - + ]: 428 : assert(!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER));
3653 : : // Make a seed
3654 : 428 : CKey seed_key = GenerateRandomKey();
3655 [ + - ]: 428 : CPubKey seed = seed_key.GetPubKey();
3656 [ + - - + ]: 428 : assert(seed_key.VerifyPubKey(seed));
3657 : :
3658 : : // Get the extended key
3659 [ + - ]: 428 : CExtKey master_key;
3660 [ + - + - ]: 856 : master_key.SetSeed(seed_key);
3661 : :
3662 [ + - ]: 428 : SetupDescriptorScriptPubKeyMans(batch, master_key);
3663 : 428 : }
3664 : :
3665 : 432 : void CWallet::SetupDescriptorScriptPubKeyMans()
3666 : : {
3667 : 432 : AssertLockHeld(cs_wallet);
3668 : :
3669 [ + + ]: 432 : if (!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3670 [ + - - + ]: 427 : if (!RunWithinTxn(GetDatabase(), /*process_desc=*/"setup descriptors", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet){
3671 : 427 : SetupOwnDescriptorScriptPubKeyMans(batch);
3672 : 427 : return true;
3673 [ # # ]: 0 : })) throw std::runtime_error("Error: cannot process db transaction for descriptors setup");
3674 : : } else {
3675 : 5 : auto signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
3676 [ + + + - : 5 : if (!signer) throw std::runtime_error(util::ErrorString(signer).original);
+ - ]
3677 : :
3678 : : // TODO: add account parameter
3679 : 3 : int account = 0;
3680 [ + - ]: 3 : UniValue signer_res = signer->GetDescriptors(account);
3681 : :
3682 [ - + - - : 3 : if (!signer_res.isObject()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
- - ]
3683 : :
3684 [ + - ]: 3 : WalletBatch batch(GetDatabase());
3685 [ + - - + : 3 : if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors import");
- - ]
3686 : :
3687 [ + + ]: 7 : for (bool internal : {false, true}) {
3688 [ + + + - ]: 8 : const UniValue& descriptor_vals = signer_res.find_value(internal ? "internal" : "receive");
3689 [ - + - - : 5 : if (!descriptor_vals.isArray()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
- - ]
3690 [ + - + - : 21 : for (const UniValue& desc_val : descriptor_vals.get_array().getValues()) {
+ + ]
3691 : 17 : const std::string& desc_str = desc_val.getValStr();
3692 : 17 : FlatSigningProvider keys;
3693 [ - + ]: 17 : std::string desc_error;
3694 [ - + + - ]: 17 : auto descs = Parse(desc_str, keys, desc_error, false);
3695 [ + + ]: 17 : if (descs.empty()) {
3696 [ + - + - : 5 : throw std::runtime_error(std::string(__func__) + ": Invalid descriptor \"" + desc_str + "\" (" + desc_error + ")");
+ - + - ]
3697 : : }
3698 [ + - ]: 16 : auto& desc = descs.at(0);
3699 [ + - - + ]: 16 : if (!desc->GetOutputType()) {
3700 : 0 : continue;
3701 : : }
3702 [ + - ]: 16 : OutputType t = *desc->GetOutputType();
3703 [ + - + - ]: 16 : auto spk_manager = std::unique_ptr<ExternalSignerScriptPubKeyMan>(new ExternalSignerScriptPubKeyMan(*this, m_keypool_size));
3704 [ + - ]: 16 : spk_manager->SetupDescriptor(batch, std::move(desc));
3705 [ + - ]: 16 : uint256 id = spk_manager->GetID();
3706 [ + - ]: 16 : AddScriptPubKeyMan(id, std::move(spk_manager));
3707 [ + - ]: 16 : AddActiveScriptPubKeyManWithDb(batch, id, t, internal);
3708 : 18 : }
3709 : : }
3710 : :
3711 : : // Ensure imported descriptors are committed to disk
3712 [ + - - + : 2 : if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors import");
- - ]
3713 : 3 : }
3714 : 429 : }
3715 : :
3716 : 372 : void CWallet::AddActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3717 : : {
3718 : 372 : WalletBatch batch(GetDatabase());
3719 [ + - ]: 372 : return AddActiveScriptPubKeyManWithDb(batch, id, type, internal);
3720 : 372 : }
3721 : :
3722 : 4038 : void CWallet::AddActiveScriptPubKeyManWithDb(WalletBatch& batch, uint256 id, OutputType type, bool internal)
3723 : : {
3724 [ - + ]: 4038 : if (!batch.WriteActiveScriptPubKeyMan(static_cast<uint8_t>(type), id, internal)) {
3725 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed");
3726 : : }
3727 : 4038 : LoadActiveScriptPubKeyMan(id, type, internal);
3728 : 4038 : }
3729 : :
3730 : 6176 : void CWallet::LoadActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3731 : : {
3732 : : // Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets.
3733 : : // Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types.
3734 [ - + ]: 6176 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3735 : :
3736 [ + + + - ]: 9305 : WalletLogPrintf("Setting spkMan to active: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3737 [ + + ]: 6176 : auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3738 : 6176 : auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers;
3739 : 6176 : auto spk_man = m_spk_managers.at(id).get();
3740 : 6176 : spk_mans[type] = spk_man;
3741 : :
3742 : 6176 : const auto it = spk_mans_other.find(type);
3743 [ + + + + ]: 6176 : if (it != spk_mans_other.end() && it->second == spk_man) {
3744 : 2 : spk_mans_other.erase(type);
3745 : : }
3746 : :
3747 : 6176 : NotifyCanGetAddressesChanged();
3748 : 6176 : }
3749 : :
3750 : 224 : void CWallet::DeactivateScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3751 : : {
3752 : 224 : auto spk_man = GetScriptPubKeyMan(type, internal);
3753 [ + + + + ]: 224 : if (spk_man != nullptr && spk_man->GetID() == id) {
3754 [ - + + - ]: 1 : WalletLogPrintf("Deactivate spkMan: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3755 : 1 : WalletBatch batch(GetDatabase());
3756 [ + - - + ]: 1 : if (!batch.EraseActiveScriptPubKeyMan(static_cast<uint8_t>(type), internal)) {
3757 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed");
3758 : : }
3759 : :
3760 [ + - ]: 1 : auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3761 : 1 : spk_mans.erase(type);
3762 : 1 : }
3763 : :
3764 : 224 : NotifyCanGetAddressesChanged();
3765 : 224 : }
3766 : :
3767 : 851 : DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const
3768 : : {
3769 : 851 : auto spk_man_pair = m_spk_managers.find(desc.id);
3770 : :
3771 [ + + ]: 851 : if (spk_man_pair != m_spk_managers.end()) {
3772 : : // Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match
3773 [ + - ]: 21 : DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair->second.get());
3774 [ + - + - ]: 21 : if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) {
3775 : 21 : return spk_manager;
3776 : : }
3777 : : }
3778 : :
3779 : : return nullptr;
3780 : : }
3781 : :
3782 : 25832 : std::optional<bool> CWallet::IsInternalScriptPubKeyMan(ScriptPubKeyMan* spk_man) const
3783 : : {
3784 : : // only active ScriptPubKeyMan can be internal
3785 [ + + ]: 25832 : if (!GetActiveScriptPubKeyMans().contains(spk_man)) {
3786 : 8257 : return std::nullopt;
3787 : : }
3788 : :
3789 [ + - ]: 17575 : const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man);
3790 [ - + ]: 17575 : if (!desc_spk_man) {
3791 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": unexpected ScriptPubKeyMan type.");
3792 : : }
3793 : :
3794 : 17575 : LOCK(desc_spk_man->cs_desc_man);
3795 [ + - + - ]: 17575 : const auto& type = desc_spk_man->GetWalletDescriptor().descriptor->GetOutputType();
3796 [ - + ]: 17575 : assert(type.has_value());
3797 : :
3798 [ + - + - ]: 17575 : return GetScriptPubKeyMan(*type, /* internal= */ true) == desc_spk_man;
3799 : 17575 : }
3800 : :
3801 : 851 : util::Result<std::reference_wrapper<DescriptorScriptPubKeyMan>> CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal)
3802 : : {
3803 : 851 : AssertLockHeld(cs_wallet);
3804 : :
3805 [ - + ]: 851 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3806 : :
3807 : 851 : auto spk_man = GetDescriptorScriptPubKeyMan(desc);
3808 [ + + ]: 851 : if (spk_man) {
3809 [ + - ]: 21 : WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString());
3810 [ + + ]: 21 : if (auto spkm_res = spk_man->UpdateWalletDescriptor(desc); !spkm_res) {
3811 [ + - ]: 9 : return util::Error{util::ErrorString(spkm_res)};
3812 : 21 : }
3813 : : } else {
3814 [ + - + - ]: 830 : auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size));
3815 [ + - ]: 830 : spk_man = new_spk_man.get();
3816 : :
3817 : : // Save the descriptor to memory
3818 [ + - ]: 830 : uint256 id = new_spk_man->GetID();
3819 [ + - ]: 830 : AddScriptPubKeyMan(id, std::move(new_spk_man));
3820 : 830 : }
3821 : :
3822 : : // Add the private keys to the descriptor
3823 [ + + ]: 1501 : for (const auto& entry : signing_provider.keys) {
3824 : 653 : const CKey& key = entry.second;
3825 : 653 : spk_man->AddDescriptorKey(key, key.GetPubKey());
3826 : : }
3827 : :
3828 : : // Top up key pool, the manager will generate new scriptPubKeys internally
3829 [ - + ]: 848 : if (!spk_man->TopUp()) {
3830 : 0 : return util::Error{_("Could not top up scriptPubKeys")};
3831 : : }
3832 : :
3833 : : // Apply the label if necessary
3834 : : // Note: we disable labels for ranged descriptors
3835 [ + + ]: 848 : if (!desc.descriptor->IsRange()) {
3836 : 333 : auto script_pub_keys = spk_man->GetScriptPubKeys();
3837 [ - + ]: 333 : if (script_pub_keys.empty()) {
3838 [ # # ]: 0 : return util::Error{_("Could not generate scriptPubKeys (cache is empty)")};
3839 : : }
3840 : :
3841 [ + + ]: 333 : if (!internal) {
3842 [ + + + - ]: 1214 : for (const auto& script : script_pub_keys) {
3843 : 881 : CTxDestination dest;
3844 [ + + + - ]: 881 : if (ExtractDestination(script, dest)) {
3845 [ + - ]: 688 : SetAddressBook(dest, label, AddressPurpose::RECEIVE);
3846 : : }
3847 : 881 : }
3848 : : }
3849 : 333 : }
3850 : :
3851 : : // Save the descriptor to DB
3852 : 848 : spk_man->WriteDescriptor();
3853 : :
3854 : : // Break balance caches so that outputs that are now IsMine in already known txs will be included in the balance
3855 : 848 : MarkDirty();
3856 : :
3857 : 848 : return std::reference_wrapper(*spk_man);
3858 : : }
3859 : :
3860 : 40 : bool CWallet::MigrateToSQLite(bilingual_str& error)
3861 : : {
3862 : 40 : AssertLockHeld(cs_wallet);
3863 : :
3864 : 40 : WalletLogPrintf("Migrating wallet storage database from BerkeleyDB to SQLite.\n");
3865 : :
3866 [ - + ]: 40 : if (m_database->Format() == "sqlite") {
3867 : 0 : error = _("Error: This wallet already uses SQLite");
3868 : 0 : return false;
3869 : : }
3870 : :
3871 : : // Get all of the records for DB type migration
3872 : 40 : std::unique_ptr<DatabaseBatch> batch = m_database->MakeBatch();
3873 [ + - ]: 40 : std::unique_ptr<DatabaseCursor> cursor = batch->GetNewCursor();
3874 : 40 : std::vector<std::pair<SerializeData, SerializeData>> records;
3875 [ - + ]: 40 : if (!cursor) {
3876 [ # # ]: 0 : error = _("Error: Unable to begin reading all records in the database");
3877 : 0 : return false;
3878 : : }
3879 : 1165 : DatabaseCursor::Status status = DatabaseCursor::Status::FAIL;
3880 : 2290 : while (true) {
3881 : 1165 : DataStream ss_key{};
3882 : 1165 : DataStream ss_value{};
3883 [ + - ]: 1165 : status = cursor->Next(ss_key, ss_value);
3884 [ + + ]: 1165 : if (status != DatabaseCursor::Status::MORE) {
3885 : : break;
3886 : : }
3887 [ + - ]: 1125 : SerializeData key(ss_key.begin(), ss_key.end());
3888 [ + - ]: 1125 : SerializeData value(ss_value.begin(), ss_value.end());
3889 [ + - ]: 1125 : records.emplace_back(key, value);
3890 : 1165 : }
3891 [ + - ]: 40 : cursor.reset();
3892 [ + - ]: 40 : batch.reset();
3893 [ - + ]: 40 : if (status != DatabaseCursor::Status::DONE) {
3894 [ # # ]: 0 : error = _("Error: Unable to read all records in the database");
3895 : 0 : return false;
3896 : : }
3897 : :
3898 : : // Close this database and delete the file
3899 [ + - + - ]: 40 : fs::path db_path = fs::PathFromString(m_database->Filename());
3900 [ + - ]: 40 : m_database->Close();
3901 [ + - ]: 40 : fs::remove(db_path);
3902 : :
3903 : : // Generate the path for the location of the migrated wallet
3904 : : // Wallets that are plain files rather than wallet directories will be migrated to be wallet directories.
3905 [ + - + - : 80 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(m_name));
+ - ]
3906 : :
3907 : : // Make new DB
3908 [ + - ]: 40 : DatabaseOptions opts;
3909 : 40 : opts.require_create = true;
3910 : 40 : opts.require_format = DatabaseFormat::SQLITE;
3911 : 40 : DatabaseStatus db_status;
3912 [ + - ]: 40 : std::unique_ptr<WalletDatabase> new_db = MakeDatabase(wallet_path, opts, db_status, error);
3913 [ - + ]: 40 : assert(new_db); // This is to prevent doing anything further with this wallet. The original file was deleted, but a backup exists.
3914 [ + - ]: 40 : m_database.reset();
3915 : 40 : m_database = std::move(new_db);
3916 : :
3917 : : // Write existing records into the new DB
3918 [ + - ]: 80 : batch = m_database->MakeBatch();
3919 [ + - ]: 40 : bool began = batch->TxnBegin();
3920 [ - + ]: 40 : assert(began); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3921 [ - + + + ]: 1165 : for (const auto& [key, value] : records) {
3922 [ - + - + : 1125 : if (!batch->Write(std::span{key}, std::span{value})) {
+ - - + ]
3923 [ # # ]: 0 : batch->TxnAbort();
3924 [ # # ]: 0 : m_database->Close();
3925 [ # # # # : 0 : fs::remove(m_database->Filename());
# # ]
3926 : 0 : assert(false); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3927 : : }
3928 : : }
3929 [ + - ]: 40 : bool committed = batch->TxnCommit();
3930 [ - + ]: 40 : assert(committed); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3931 : 40 : return true;
3932 : 120 : }
3933 : :
3934 : 37 : std::optional<MigrationData> CWallet::GetDescriptorsForLegacy(bilingual_str& error) const
3935 : : {
3936 : 37 : AssertLockHeld(cs_wallet);
3937 : :
3938 : 37 : LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3939 [ - + ]: 37 : if (!Assume(legacy_spkm)) {
3940 : : // This shouldn't happen
3941 [ # # ]: 0 : error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));
3942 : 0 : return std::nullopt;
3943 : : }
3944 : :
3945 : 37 : std::optional<MigrationData> res = legacy_spkm->MigrateToDescriptor();
3946 [ - + ]: 37 : if (res == std::nullopt) {
3947 [ # # ]: 0 : error = _("Error: Unable to produce descriptors for this legacy wallet. Make sure to provide the wallet's passphrase if it is encrypted.");
3948 : 0 : return std::nullopt;
3949 : : }
3950 : 37 : return res;
3951 : 37 : }
3952 : :
3953 : 33 : util::Result<void> CWallet::ApplyMigrationData(WalletBatch& local_wallet_batch, MigrationData& data)
3954 : : {
3955 : 33 : AssertLockHeld(cs_wallet);
3956 : :
3957 : 33 : LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3958 [ - + ]: 33 : if (!Assume(legacy_spkm)) {
3959 : : // This shouldn't happen
3960 [ # # ]: 0 : return util::Error{Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"))};
3961 : : }
3962 : :
3963 : : // Note: when the legacy wallet has no spendable scripts, it must be empty at the end of the process.
3964 [ + + - + ]: 33 : bool has_spendable_material = !data.desc_spkms.empty() || data.master_key.key.IsValid();
3965 : :
3966 : : // Get all invalid or non-watched scripts that will not be migrated
3967 [ + - ]: 33 : std::set<CTxDestination> not_migrated_dests;
3968 [ + - + + : 37 : for (const auto& script : legacy_spkm->GetNotMineScriptPubKeys()) {
+ - ]
3969 : 4 : CTxDestination dest;
3970 [ + - + - : 4 : if (ExtractDestination(script, dest)) not_migrated_dests.emplace(dest);
+ - ]
3971 : 4 : }
3972 : :
3973 : : // When the legacy wallet has no spendable scripts, the main wallet will be empty, leaving its script cache empty as well.
3974 : : // The watch-only and/or solvable wallet(s) will contain the scripts in their respective caches.
3975 [ + + ]: 33 : if (!data.desc_spkms.empty()) Assume(!m_cached_spks.empty());
3976 [ + + ]: 33 : if (!data.watch_descs.empty()) Assume(!data.watchonly_wallet->m_cached_spks.empty());
3977 [ + + ]: 33 : if (!data.solvable_descs.empty()) Assume(!data.solvable_wallet->m_cached_spks.empty());
3978 : :
3979 [ + + ]: 149 : for (auto& desc_spkm : data.desc_spkms) {
3980 [ + - - + ]: 116 : if (m_spk_managers.contains(desc_spkm->GetID())) {
3981 [ # # ]: 0 : return util::Error{_("Error: Duplicate descriptors created during migration. Your wallet may be corrupted.")};
3982 : : }
3983 [ + - ]: 116 : uint256 id = desc_spkm->GetID();
3984 [ + - ]: 116 : AddScriptPubKeyMan(id, std::move(desc_spkm));
3985 : : }
3986 : :
3987 : : // Remove the LegacyScriptPubKeyMan from disk
3988 [ + - - + ]: 33 : if (!legacy_spkm->DeleteRecordsWithDB(local_wallet_batch)) {
3989 [ # # ]: 0 : return util::Error{_("Error: cannot remove legacy wallet records")};
3990 : : }
3991 : :
3992 : : // Remove the LegacyScriptPubKeyMan from memory
3993 [ + - ]: 33 : m_spk_managers.erase(legacy_spkm->GetID());
3994 : 33 : m_external_spk_managers.clear();
3995 : 33 : m_internal_spk_managers.clear();
3996 : :
3997 : : // Setup new descriptors (only if we are migrating any key material)
3998 [ + - ]: 33 : SetWalletFlagWithDB(local_wallet_batch, WALLET_FLAG_DESCRIPTORS | WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
3999 [ + + + - : 33 : if (has_spendable_material && !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
+ + ]
4000 : : // Use the existing master key if we have it
4001 [ + + ]: 28 : if (data.master_key.key.IsValid()) {
4002 [ + - ]: 27 : SetupDescriptorScriptPubKeyMans(local_wallet_batch, data.master_key);
4003 : : } else {
4004 : : // Setup with a new seed if we don't.
4005 [ + - ]: 1 : SetupOwnDescriptorScriptPubKeyMans(local_wallet_batch);
4006 : : }
4007 : : }
4008 : :
4009 : : // Get best block locator so that we can copy it to the watchonly and solvables
4010 : 33 : CBlockLocator best_block_locator;
4011 [ + - - + ]: 33 : if (!local_wallet_batch.ReadBestBlock(best_block_locator)) {
4012 [ # # ]: 0 : return util::Error{_("Error: Unable to read wallet's best block locator record")};
4013 : : }
4014 : :
4015 : : // Update m_txos to match the descriptors remaining in this wallet
4016 : 33 : m_txos.clear();
4017 [ + - ]: 33 : RefreshAllTXOs();
4018 : :
4019 : : // Check if the transactions in the wallet are still ours. Either they belong here, or they belong in the watchonly wallet.
4020 : : // We need to go through these in the tx insertion order so that lookups to spends works.
4021 : 33 : std::vector<Txid> txids_to_delete;
4022 : 33 : std::unique_ptr<WalletBatch> watchonly_batch;
4023 [ + + ]: 33 : if (data.watchonly_wallet) {
4024 [ + - ]: 22 : watchonly_batch = std::make_unique<WalletBatch>(data.watchonly_wallet->GetDatabase());
4025 [ + - - + : 11 : if (!watchonly_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.watchonly_wallet->GetName())};
- - ]
4026 : : // Copy the next tx order pos to the watchonly wallet
4027 [ + - ]: 11 : LOCK(data.watchonly_wallet->cs_wallet);
4028 [ + - ]: 11 : data.watchonly_wallet->nOrderPosNext = nOrderPosNext;
4029 [ + - ]: 11 : watchonly_batch->WriteOrderPosNext(data.watchonly_wallet->nOrderPosNext);
4030 : : // Write the best block locator to avoid rescanning on reload
4031 [ + - - + ]: 11 : if (!watchonly_batch->WriteBestBlock(best_block_locator)) {
4032 [ # # # # ]: 0 : return util::Error{_("Error: Unable to write watchonly wallet best block locator record")};
4033 : : }
4034 : 11 : }
4035 : 33 : std::unique_ptr<WalletBatch> solvables_batch;
4036 [ + + ]: 33 : if (data.solvable_wallet) {
4037 [ + - ]: 10 : solvables_batch = std::make_unique<WalletBatch>(data.solvable_wallet->GetDatabase());
4038 [ + - - + : 5 : if (!solvables_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.solvable_wallet->GetName())};
- - ]
4039 : : // Write the best block locator to avoid rescanning on reload
4040 [ + - - + ]: 5 : if (!solvables_batch->WriteBestBlock(best_block_locator)) {
4041 [ # # ]: 0 : return util::Error{_("Error: Unable to write solvable wallet best block locator record")};
4042 : : }
4043 : : }
4044 [ + - + + ]: 89 : for (const auto& [_pos, wtx] : wtxOrdered) {
4045 : : // Check it is the watchonly wallet's
4046 : : // solvable_wallet doesn't need to be checked because transactions for those scripts weren't being watched for
4047 [ + - + + : 56 : bool is_mine = IsMine(*wtx->tx) || IsFromMe(*wtx->tx);
+ - + + ]
4048 [ + + ]: 56 : if (data.watchonly_wallet) {
4049 [ + - ]: 22 : LOCK(data.watchonly_wallet->cs_wallet);
4050 [ + - + + : 22 : if (data.watchonly_wallet->IsMine(*wtx->tx) || data.watchonly_wallet->IsFromMe(*wtx->tx)) {
+ - + + ]
4051 : : // Add to watchonly wallet
4052 [ + - ]: 14 : const Txid& hash = wtx->GetHash();
4053 : 14 : const CWalletTx& to_copy_wtx = *wtx;
4054 [ + - - + ]: 14 : if (!data.watchonly_wallet->LoadToWallet(hash, [&](CWalletTx& ins_wtx, bool new_tx) EXCLUSIVE_LOCKS_REQUIRED(data.watchonly_wallet->cs_wallet) {
4055 [ + - ]: 14 : if (!new_tx) return false;
4056 [ + - - + ]: 28 : ins_wtx.SetTx(to_copy_wtx.tx);
4057 : 14 : ins_wtx.CopyFrom(to_copy_wtx);
4058 : 14 : return true;
4059 : : })) {
4060 [ # # # # : 0 : return util::Error{strprintf(_("Error: Could not add watchonly tx %s to watchonly wallet"), wtx->GetHash().GetHex())};
# # ]
4061 : : }
4062 [ + - + - ]: 14 : watchonly_batch->WriteTx(data.watchonly_wallet->mapWallet.at(hash));
4063 : : // Mark as to remove from the migrated wallet only if it does not also belong to it
4064 [ + + ]: 14 : if (!is_mine) {
4065 [ + - ]: 11 : txids_to_delete.push_back(hash);
4066 [ + - ]: 11 : continue;
4067 : : }
4068 : : }
4069 : 22 : }
4070 [ - + ]: 45 : if (!is_mine) {
4071 : : // Both not ours and not in the watchonly wallet
4072 [ # # # # ]: 0 : return util::Error{strprintf(_("Error: Transaction %s in wallet cannot be identified to belong to migrated wallets"), wtx->GetHash().GetHex())};
4073 : : }
4074 : : // Rewrite the transaction so that anything that may have changed about it in memory also persists to disk
4075 [ + - ]: 45 : local_wallet_batch.WriteTx(*wtx);
4076 : : }
4077 : :
4078 : : // Do the removes
4079 [ - + + + ]: 33 : if (txids_to_delete.size() > 0) {
4080 [ + - - + ]: 6 : if (auto res = RemoveTxs(local_wallet_batch, txids_to_delete); !res) {
4081 [ # # # # ]: 0 : return util::Error{_("Error: Could not delete watchonly transactions. ") + util::ErrorString(res)};
4082 : 6 : }
4083 : : }
4084 : :
4085 : : // Pair external wallets with their corresponding db handler
4086 : 33 : std::vector<std::pair<std::shared_ptr<CWallet>, std::unique_ptr<WalletBatch>>> wallets_vec;
4087 [ + + + - ]: 33 : if (data.watchonly_wallet) wallets_vec.emplace_back(data.watchonly_wallet, std::move(watchonly_batch));
4088 [ + + + - ]: 33 : if (data.solvable_wallet) wallets_vec.emplace_back(data.solvable_wallet, std::move(solvables_batch));
4089 : :
4090 : : // Write address book entry to disk
4091 : 91 : auto func_store_addr = [](WalletBatch& batch, const CTxDestination& dest, const CAddressBookData& entry) {
4092 : 58 : auto address{EncodeDestination(dest)};
4093 [ + - + - : 116 : if (entry.purpose) batch.WritePurpose(address, PurposeToString(*entry.purpose));
+ - ]
4094 [ + - + - ]: 58 : if (entry.label) batch.WriteName(address, *entry.label);
4095 [ - - - + ]: 58 : for (const auto& [id, request] : entry.receive_requests) {
4096 [ # # ]: 0 : batch.WriteAddressReceiveRequest(dest, id, request);
4097 : : }
4098 [ + + + - ]: 58 : if (entry.previously_spent) batch.WriteAddressPreviouslySpent(dest, true);
4099 : 58 : };
4100 : :
4101 : : // Check the address book data in the same way we did for transactions
4102 : 33 : std::vector<CTxDestination> dests_to_delete;
4103 [ + - + + ]: 119 : for (const auto& [dest, record] : m_address_book) {
4104 : : // Ensure "receive" entries that are no longer part of the original wallet are transferred to another wallet
4105 : : // Entries for everything else ("send") will be cloned to all wallets.
4106 [ + - + - : 165 : bool require_transfer = record.purpose == AddressPurpose::RECEIVE && !IsMine(dest);
+ + ]
4107 : 86 : bool copied = false;
4108 [ + - + + ]: 122 : for (auto& [wallet, batch] : wallets_vec) {
4109 [ + - ]: 59 : LOCK(wallet->cs_wallet);
4110 [ + + + - : 59 : if (require_transfer && !wallet->IsMine(dest)) continue;
+ + + - ]
4111 : :
4112 : : // Copy the entire address book entry
4113 [ + - + - ]: 58 : wallet->m_address_book[dest] = record;
4114 [ + - ]: 58 : func_store_addr(*batch, dest, record);
4115 : :
4116 : 58 : copied = true;
4117 : : // Only delete 'receive' records that are no longer part of the original wallet
4118 [ + + ]: 58 : if (require_transfer) {
4119 [ + - ]: 23 : dests_to_delete.push_back(dest);
4120 [ + - ]: 23 : break;
4121 : : }
4122 : 59 : }
4123 : :
4124 : : // Fail immediately if we ever found an entry that was ours and cannot be transferred
4125 : : // to any of the created wallets (watch-only, solvable).
4126 : : // Means that no inferred descriptor maps to the stored entry. Which mustn't happen.
4127 [ + + ]: 86 : if (require_transfer && !copied) {
4128 : :
4129 : : // Skip invalid/non-watched scripts that will not be migrated
4130 [ + - ]: 4 : if (not_migrated_dests.contains(dest)) {
4131 [ + - ]: 4 : dests_to_delete.push_back(dest);
4132 : 4 : continue;
4133 : : }
4134 : :
4135 [ # # ]: 0 : return util::Error{_("Error: Address book data in wallet cannot be identified to belong to migrated wallets")};
4136 : : }
4137 : : }
4138 : :
4139 : : // Persist external wallets address book entries
4140 [ + - + + ]: 49 : for (auto& [wallet, batch] : wallets_vec) {
4141 [ + - - + ]: 16 : if (!batch->TxnCommit()) {
4142 [ # # ]: 0 : return util::Error{strprintf(_("Error: Unable to write data to disk for wallet %s"), wallet->GetName())};
4143 : : }
4144 : : }
4145 : :
4146 : : // Remove the things to delete in this wallet
4147 [ - + + + ]: 33 : if (dests_to_delete.size() > 0) {
4148 [ + + ]: 38 : for (const auto& dest : dests_to_delete) {
4149 [ + - - + ]: 27 : if (!DelAddressBookWithDB(local_wallet_batch, dest)) {
4150 [ # # ]: 0 : return util::Error{_("Error: Unable to remove watchonly address book data")};
4151 : : }
4152 : : }
4153 : : }
4154 : :
4155 : : // If there was no key material in the main wallet, there should be no records on it anymore.
4156 : : // This wallet will be discarded at the end of the process. Only wallets that contain the
4157 : : // migrated records will be presented to the user.
4158 [ + + ]: 33 : if (!has_spendable_material) {
4159 [ - + - - ]: 3 : if (!m_address_book.empty()) return util::Error{_("Error: Not all address book records were migrated")};
4160 [ - + - - ]: 3 : if (!mapWallet.empty()) return util::Error{_("Error: Not all transaction records were migrated")};
4161 : : }
4162 : :
4163 : 33 : return {}; // all good
4164 : 99 : }
4165 : :
4166 : 144651 : bool CWallet::CanGrindR() const
4167 : : {
4168 : 144651 : return !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS);
4169 : : }
4170 : :
4171 : : // Returns wallet prefix for migration.
4172 : : // Used to name the backup file and newly created wallets.
4173 : : // E.g. a watch-only wallet is named "<prefix>_watchonly".
4174 : 25 : static std::string MigrationPrefixName(CWallet& wallet)
4175 : : {
4176 [ + + ]: 25 : const std::string& name{wallet.GetName()};
4177 [ + + ]: 25 : return name.empty() ? "default_wallet" : name;
4178 : : }
4179 : :
4180 : 37 : bool DoMigration(CWallet& wallet, WalletContext& context, bilingual_str& error, MigrationResult& res) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet)
4181 : : {
4182 : 37 : AssertLockHeld(wallet.cs_wallet);
4183 : :
4184 : : // Get all of the descriptors from the legacy wallet
4185 : 37 : std::optional<MigrationData> data = wallet.GetDescriptorsForLegacy(error);
4186 [ + - ]: 37 : if (data == std::nullopt) return false;
4187 : :
4188 : : // Create the watchonly and solvable wallets if necessary
4189 [ - + + + : 37 : if (data->watch_descs.size() > 0 || data->solvable_descs.size() > 0) {
- + + + ]
4190 [ + - ]: 16 : DatabaseOptions options;
4191 : 16 : options.require_existing = false;
4192 : 16 : options.require_create = true;
4193 : 16 : options.require_format = DatabaseFormat::SQLITE;
4194 : :
4195 [ + - ]: 16 : WalletContext empty_context;
4196 : 16 : empty_context.args = context.args;
4197 : :
4198 : : // Make the wallets
4199 : 16 : options.create_flags = WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET | WALLET_FLAG_DESCRIPTORS;
4200 [ + - + + ]: 16 : if (wallet.IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
4201 : 1 : options.create_flags |= WALLET_FLAG_AVOID_REUSE;
4202 : : }
4203 [ + - + + ]: 16 : if (wallet.IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
4204 : 13 : options.create_flags |= WALLET_FLAG_KEY_ORIGIN_METADATA;
4205 : : }
4206 [ - + + + ]: 16 : if (data->watch_descs.size() > 0) {
4207 [ + - ]: 15 : wallet.WalletLogPrintf("Making a new watchonly wallet containing the watched scripts\n");
4208 : :
4209 : 15 : DatabaseStatus status;
4210 : 15 : std::vector<bilingual_str> warnings;
4211 [ + - ]: 30 : std::string wallet_name = MigrationPrefixName(wallet) + "_watchonly";
4212 [ + - ]: 15 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4213 [ + + ]: 15 : if (!database) {
4214 [ + - ]: 3 : error = strprintf(_("Wallet file creation failed: %s"), error);
4215 : 3 : return false;
4216 : : }
4217 : :
4218 [ + - - + ]: 12 : data->watchonly_wallet = CWallet::CreateNew(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4219 [ - + ]: 12 : if (!data->watchonly_wallet) {
4220 [ # # ]: 0 : error = _("Error: Failed to create new watchonly wallet");
4221 : 0 : return false;
4222 : : }
4223 : 12 : res.watchonly_wallet = data->watchonly_wallet;
4224 [ + - ]: 12 : LOCK(data->watchonly_wallet->cs_wallet);
4225 : :
4226 : : // Parse the descriptors and add them to the new wallet
4227 [ + + ]: 48 : for (const auto& [desc_str, creation_time] : data->watch_descs) {
4228 : : // Parse the descriptor
4229 : 36 : FlatSigningProvider keys;
4230 [ - + ]: 36 : std::string parse_err;
4231 [ - + + - ]: 36 : std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /*require_checksum=*/ true);
4232 [ - + - + ]: 36 : assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4233 [ + - + - : 36 : assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
- + ]
4234 : :
4235 : : // Add to the wallet
4236 [ + - + - : 36 : WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
+ - ]
4237 [ + - + - : 72 : if (auto spkm_res = data->watchonly_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
- + ]
4238 [ # # # # ]: 0 : throw std::runtime_error(util::ErrorString(spkm_res).original);
4239 : 0 : }
4240 : 36 : }
4241 : :
4242 : : // Add the wallet to settings
4243 [ + - ]: 12 : UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4244 : 15 : }
4245 [ - + + + ]: 13 : if (data->solvable_descs.size() > 0) {
4246 [ + - ]: 6 : wallet.WalletLogPrintf("Making a new watchonly wallet containing the unwatched solvable scripts\n");
4247 : :
4248 : 6 : DatabaseStatus status;
4249 : 6 : std::vector<bilingual_str> warnings;
4250 [ + - ]: 12 : std::string wallet_name = MigrationPrefixName(wallet) + "_solvables";
4251 [ + - ]: 6 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4252 [ + + ]: 6 : if (!database) {
4253 [ + - ]: 1 : error = strprintf(_("Wallet file creation failed: %s"), error);
4254 : 1 : return false;
4255 : : }
4256 : :
4257 [ + - - + ]: 5 : data->solvable_wallet = CWallet::CreateNew(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4258 [ - + ]: 5 : if (!data->solvable_wallet) {
4259 [ # # ]: 0 : error = _("Error: Failed to create new watchonly wallet");
4260 : 0 : return false;
4261 : : }
4262 : 5 : res.solvables_wallet = data->solvable_wallet;
4263 [ + - ]: 5 : LOCK(data->solvable_wallet->cs_wallet);
4264 : :
4265 : : // Parse the descriptors and add them to the new wallet
4266 [ + + ]: 17 : for (const auto& [desc_str, creation_time] : data->solvable_descs) {
4267 : : // Parse the descriptor
4268 : 12 : FlatSigningProvider keys;
4269 [ - + ]: 12 : std::string parse_err;
4270 [ - + + - ]: 12 : std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /*require_checksum=*/ true);
4271 [ - + - + ]: 12 : assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4272 [ + - + - : 12 : assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
- + ]
4273 : :
4274 : : // Add to the wallet
4275 [ + - + - : 12 : WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
+ - ]
4276 [ + - + - : 24 : if (auto spkm_res = data->solvable_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
- + ]
4277 [ # # # # ]: 0 : throw std::runtime_error(util::ErrorString(spkm_res).original);
4278 : 0 : }
4279 : 12 : }
4280 : :
4281 : : // Add the wallet to settings
4282 [ + - ]: 5 : UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4283 : 6 : }
4284 : 16 : }
4285 : :
4286 : : // Add the descriptors to wallet, remove LegacyScriptPubKeyMan, and cleanup txs and address book data
4287 [ + - + - ]: 33 : return RunWithinTxn(wallet.GetDatabase(), /*process_desc=*/"apply migration process", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet){
4288 [ - + ]: 33 : if (auto res_migration = wallet.ApplyMigrationData(batch, *data); !res_migration) {
4289 [ # # ]: 0 : error = util::ErrorString(res_migration);
4290 : 0 : return false;
4291 : 0 : }
4292 : 33 : wallet.WalletLogPrintf("Wallet migration complete.\n");
4293 : 33 : return true;
4294 : : });
4295 : 37 : }
4296 : :
4297 : 46 : util::Result<MigrationResult> MigrateLegacyToDescriptor(const std::string& wallet_name, const SecureString& passphrase, WalletContext& context)
4298 : : {
4299 : 46 : std::vector<bilingual_str> warnings;
4300 [ + - ]: 46 : bilingual_str error;
4301 : :
4302 : : // The only kind of wallets that could be loaded are descriptor ones, which don't need to be migrated.
4303 [ + - + + ]: 46 : if (auto wallet = GetWallet(context, wallet_name)) {
4304 [ + - - + ]: 1 : assert(wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4305 [ + - ]: 3 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4306 : : } else {
4307 : : // Check if the wallet is BDB
4308 [ + - - + ]: 88 : const auto& wallet_path = GetWalletPath(wallet_name);
4309 [ - + ]: 45 : if (!wallet_path) {
4310 [ # # ]: 0 : return util::Error{util::ErrorString(wallet_path)};
4311 : : }
4312 [ + - + + ]: 45 : if (!fs::exists(*wallet_path)) {
4313 [ + - ]: 3 : return util::Error{_("Error: Wallet does not exist")};
4314 : : }
4315 [ + - + - : 88 : if (!IsBDBFile(BDBDataFile(*wallet_path))) {
+ + ]
4316 [ + - ]: 3 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4317 : : }
4318 : 3 : }
4319 : :
4320 : : // Load the wallet but only in the context of this function.
4321 : : // No signals should be connected nor should anything else be aware of this wallet
4322 [ + - ]: 43 : WalletContext empty_context;
4323 : 43 : empty_context.args = context.args;
4324 [ + - ]: 43 : DatabaseOptions options;
4325 : 43 : options.require_existing = true;
4326 : 43 : options.require_format = DatabaseFormat::BERKELEY_RO;
4327 : 43 : DatabaseStatus status;
4328 [ + - ]: 43 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4329 [ - + ]: 43 : if (!database) {
4330 [ # # # # : 0 : return util::Error{Untranslated("Wallet file verification failed.") + Untranslated(" ") + error};
# # # # #
# ]
4331 : : }
4332 : :
4333 : : // Make the local wallet
4334 [ + - ]: 43 : std::shared_ptr<CWallet> local_wallet = CWallet::LoadExisting(empty_context, wallet_name, std::move(database), error, warnings);
4335 [ - + ]: 43 : if (!local_wallet) {
4336 [ # # # # : 0 : return util::Error{Untranslated("Wallet loading failed.") + Untranslated(" ") + error};
# # # # #
# ]
4337 : : }
4338 : :
4339 [ + - ]: 86 : return MigrateLegacyToDescriptor(std::move(local_wallet), passphrase, context);
4340 : 89 : }
4341 : :
4342 : 43 : util::Result<MigrationResult> MigrateLegacyToDescriptor(std::shared_ptr<CWallet> local_wallet, const SecureString& passphrase, WalletContext& context)
4343 : : {
4344 : 43 : MigrationResult res;
4345 [ - + ]: 43 : bilingual_str error;
4346 : 43 : std::vector<bilingual_str> warnings;
4347 : :
4348 [ - + ]: 43 : DatabaseOptions options;
4349 : 43 : options.require_existing = true;
4350 : 43 : DatabaseStatus status;
4351 : :
4352 [ - + ]: 43 : const std::string wallet_name = local_wallet->GetName();
4353 : :
4354 : : // Before anything else, check if there is something to migrate.
4355 [ + - - + ]: 43 : if (local_wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4356 [ # # ]: 0 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4357 : : }
4358 : :
4359 : : // Make a backup of the DB in the wallet's directory with a unique filename
4360 : : // using the wallet name and current timestamp. The backup filename is based
4361 : : // on the name of the parent directory containing the wallet data in most
4362 : : // cases, but in the case where the wallet name is a path to a data file,
4363 : : // the name of the data file is used, and in the case where the wallet name
4364 : : // is blank, "default_wallet" is used.
4365 [ + + ]: 43 : const std::string backup_prefix = wallet_name.empty() ? MigrationPrefixName(*local_wallet) : [&] {
4366 : : // fs::weakly_canonical resolves relative specifiers and remove trailing slashes.
4367 [ + - + - ]: 156 : const auto legacy_wallet_path = fs::weakly_canonical(GetWalletDir() / fs::PathFromString(wallet_name));
4368 [ + - - + ]: 195 : return fs::PathToString(legacy_wallet_path.filename());
4369 [ + - + - ]: 82 : }();
4370 : :
4371 [ + - + - : 43 : fs::path backup_filename = fs::PathFromString(strprintf("%s_%d.legacy.bak", backup_prefix, GetTime()));
+ - ]
4372 [ + - + - ]: 43 : fs::path backup_path = fsbridge::AbsPathJoin(GetWalletDir(), backup_filename);
4373 [ - + + - : 86 : if (!local_wallet->BackupWallet(fs::PathToString(backup_path))) {
- + ]
4374 [ # # ]: 0 : return util::Error{_("Error: Unable to make a backup of your wallet")};
4375 : : }
4376 [ + - ]: 43 : res.backup_path = backup_path;
4377 : :
4378 : 43 : bool success = false;
4379 : :
4380 : : // Unlock the wallet if needed
4381 [ + - + + : 43 : if (local_wallet->IsLocked() && !local_wallet->Unlock(passphrase)) {
+ - + + ]
4382 [ + + ]: 3 : if (passphrase.find('\0') == std::string::npos) {
4383 [ + - + - ]: 6 : return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase was not provided or was incorrect.")};
4384 : : } else {
4385 [ + - + - ]: 2 : return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase entered was incorrect. "
4386 : : "The passphrase contains a null character (ie - a zero byte). "
4387 : : "If this passphrase was set with a version of this software prior to 25.0, "
4388 : : "please try again with only the characters up to — but not including — "
4389 : 1 : "the first null character.")};
4390 : : }
4391 : : }
4392 : :
4393 : : // Indicates whether the current wallet is empty after migration.
4394 : : // Notes:
4395 : : // When non-empty: the local wallet becomes the main spendable wallet.
4396 : : // When empty: The local wallet is excluded from the result, as the
4397 : : // user does not expect an empty spendable wallet after
4398 : : // migrating only watch-only scripts.
4399 : 40 : bool empty_local_wallet = false;
4400 : :
4401 : 40 : {
4402 [ + - ]: 40 : LOCK(local_wallet->cs_wallet);
4403 : : // First change to using SQLite
4404 [ + - - + : 40 : if (!local_wallet->MigrateToSQLite(error)) return util::Error{error};
- - - - ]
4405 : :
4406 : : // Do the migration of keys and scripts for non-empty wallets, and cleanup if it fails
4407 [ + - + + ]: 40 : if (HasLegacyRecords(*local_wallet)) {
4408 [ + - ]: 37 : success = DoMigration(*local_wallet, context, error, res);
4409 : : // No scripts mean empty wallet after migration
4410 [ + - ]: 37 : empty_local_wallet = local_wallet->GetAllScriptPubKeyMans().empty();
4411 : : } else {
4412 : : // Make sure that descriptors flag is actually set
4413 [ + - ]: 3 : local_wallet->SetWalletFlag(WALLET_FLAG_DESCRIPTORS);
4414 : : success = true;
4415 : : }
4416 : 0 : }
4417 : :
4418 : : // In case of loading failure, we need to remember the wallet files we have created to remove.
4419 : : // A `set` is used as it may be populated with the same wallet directory paths multiple times,
4420 : : // both before and after loading. This ensures the set is complete even if one of the wallets
4421 : : // fails to load.
4422 [ + + ]: 40 : std::set<fs::path> wallet_files_to_remove;
4423 : 40 : std::set<fs::path> wallet_empty_dirs_to_remove;
4424 : :
4425 : : // Helper to track wallet files and directories for cleanup on failure.
4426 : : // Only directories of wallets created during migration (not the main wallet) are tracked.
4427 : 94 : auto track_for_cleanup = [&](const CWallet& wallet) {
4428 : 54 : const auto files = wallet.GetDatabase().Files();
4429 [ + - ]: 54 : wallet_files_to_remove.insert(files.begin(), files.end());
4430 [ + + ]: 54 : if (wallet.GetName() != wallet_name) {
4431 : : // If this isn’t the main wallet, mark its directory for removal.
4432 : : // This applies to the watch-only and solvable wallets.
4433 : : // Wallets stored directly as files in the top-level directory
4434 : : // (e.g. default unnamed wallets) don’t have a removable parent directory.
4435 [ + - + - : 85 : wallet_empty_dirs_to_remove.insert(fs::PathFromString(wallet.GetDatabase().Filename()).parent_path());
+ - + - ]
4436 : : }
4437 : 54 : };
4438 : :
4439 : :
4440 [ + + ]: 40 : if (success) {
4441 [ + + ]: 36 : Assume(!res.wallet); // We will set it here.
4442 : : // Check if the local wallet is empty after migration
4443 [ + + ]: 36 : if (empty_local_wallet) {
4444 : : // This wallet has no records. We can safely remove it.
4445 [ + - ]: 3 : std::vector<fs::path> paths_to_remove = local_wallet->GetDatabase().Files();
4446 : 3 : local_wallet.reset();
4447 [ + - + + ]: 9 : for (const auto& path_to_remove : paths_to_remove) fs::remove(path_to_remove);
4448 : 3 : }
4449 : :
4450 [ + - ]: 36 : LogInfo("Loading new wallets after migration...\n");
4451 : : // Migration successful, load all the migrated wallets.
4452 [ + + ]: 138 : for (std::shared_ptr<CWallet>* wallet_ptr : {&local_wallet, &res.watchonly_wallet, &res.solvables_wallet}) {
4453 [ + + ]: 104 : if (success && *wallet_ptr) {
4454 : 49 : std::shared_ptr<CWallet>& wallet = *wallet_ptr;
4455 : : // Track db path and load wallet
4456 [ + - ]: 49 : track_for_cleanup(*wallet);
4457 [ - + ]: 49 : assert(wallet.use_count() == 1);
4458 [ - + ]: 49 : std::string wallet_name = wallet->GetName();
4459 : 49 : wallet.reset();
4460 [ + - - + ]: 98 : wallet = LoadWallet(context, wallet_name, /*load_on_start=*/std::nullopt, options, status, error, warnings);
4461 [ + + ]: 49 : if (!wallet) {
4462 [ + - ]: 2 : LogError("Failed to load wallet '%s' after migration. Rolling back migration to preserve consistency. "
4463 : : "Error cause: %s\n", wallet_name, error.original);
4464 : 2 : success = false;
4465 : 2 : break;
4466 : : }
4467 : :
4468 : : // Set the first successfully loaded wallet as the main one.
4469 : : // The loop order is intentional and must always start with the local wallet.
4470 [ + + ]: 47 : if (!res.wallet) {
4471 [ + - ]: 34 : res.wallet_name = wallet->GetName();
4472 : 34 : res.wallet = std::move(wallet);
4473 : : }
4474 : 47 : }
4475 : : }
4476 : : }
4477 : 2 : if (!success) {
4478 : : // Make list of wallets to cleanup
4479 : 6 : std::vector<std::shared_ptr<CWallet>> created_wallets;
4480 [ + + + - ]: 6 : if (local_wallet) created_wallets.push_back(std::move(local_wallet));
4481 [ + + + - ]: 6 : if (res.watchonly_wallet) created_wallets.push_back(std::move(res.watchonly_wallet));
4482 [ - + - - ]: 6 : if (res.solvables_wallet) created_wallets.push_back(std::move(res.solvables_wallet));
4483 : :
4484 : : // Get the directories to remove after unloading
4485 [ + + ]: 11 : for (std::shared_ptr<CWallet>& wallet : created_wallets) {
4486 [ + - ]: 5 : track_for_cleanup(*wallet);
4487 : : }
4488 : :
4489 : : // Unload the wallets
4490 [ + + ]: 11 : for (std::shared_ptr<CWallet>& w : created_wallets) {
4491 [ - + ]: 5 : if (w->HaveChain()) {
4492 : : // Unloading for wallets that were loaded for normal use
4493 [ # # # # ]: 0 : if (!RemoveWallet(context, w, /*load_on_start=*/false)) {
4494 [ # # # # ]: 0 : error += _("\nUnable to cleanup failed migration");
4495 [ # # ]: 0 : return util::Error{error};
4496 : : }
4497 [ # # ]: 0 : WaitForDeleteWallet(std::move(w));
4498 : : } else {
4499 : : // Unloading for wallets in local context
4500 [ - + ]: 5 : assert(w.use_count() == 1);
4501 : 5 : w.reset();
4502 : : }
4503 : : }
4504 : :
4505 : : // First, delete the db files we have created throughout this process and nothing else
4506 [ + + ]: 20 : for (const fs::path& file : wallet_files_to_remove) {
4507 [ + - ]: 14 : fs::remove(file);
4508 : : }
4509 : :
4510 : : // Second, delete the created wallet directories and nothing else. They must be empty at this point.
4511 [ + + ]: 7 : for (const fs::path& dir : wallet_empty_dirs_to_remove) {
4512 [ + - + - ]: 1 : Assume(fs::is_empty(dir));
4513 [ + - ]: 1 : fs::remove(dir);
4514 : : }
4515 : :
4516 : : // Restore the backup
4517 : : // Convert the backup file to the wallet db file by renaming it and moving it into the wallet's directory.
4518 [ + - ]: 6 : bilingual_str restore_error;
4519 [ + - ]: 12 : const auto& ptr_wallet = RestoreWallet(context, backup_path, wallet_name, /*load_on_start=*/std::nullopt, status, restore_error, warnings, /*load_after_restore=*/false, /*allow_unnamed=*/true);
4520 [ - + ]: 6 : if (!restore_error.empty()) {
4521 [ # # # # ]: 0 : error += restore_error + _("\nUnable to restore backup of wallet.");
4522 [ # # ]: 0 : return util::Error{error};
4523 : : }
4524 : : // Verify that the legacy wallet is not loaded after restoring from the backup.
4525 [ - + ]: 6 : assert(!ptr_wallet);
4526 : :
4527 [ + - ]: 18 : return util::Error{error};
4528 : 6 : }
4529 : 34 : return res;
4530 : 212 : }
4531 : :
4532 : 78728 : void CWallet::CacheNewScriptPubKeys(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4533 : : {
4534 [ + + ]: 553004 : for (const auto& script : spks) {
4535 : 474276 : m_cached_spks[script].push_back(spkm);
4536 : : }
4537 : 78728 : }
4538 : :
4539 : 78728 : void CWallet::TopUpCallback(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4540 : : {
4541 : : // Update scriptPubKey cache
4542 : 78728 : CacheNewScriptPubKeys(spks, spkm);
4543 : 78728 : }
4544 : :
4545 : 7 : std::set<CExtPubKey> CWallet::GetActiveHDPubKeys() const
4546 : : {
4547 : 7 : AssertLockHeld(cs_wallet);
4548 : :
4549 [ - + ]: 7 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4550 : :
4551 [ + - ]: 7 : std::set<CExtPubKey> active_xpubs;
4552 [ + - + + ]: 30 : for (const auto& spkm : GetActiveScriptPubKeyMans()) {
4553 [ + - ]: 23 : const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4554 [ - + ]: 23 : assert(desc_spkm);
4555 [ + - ]: 23 : LOCK(desc_spkm->cs_desc_man);
4556 [ + - ]: 23 : WalletDescriptor w_desc = desc_spkm->GetWalletDescriptor();
4557 : :
4558 [ + - ]: 23 : std::set<CPubKey> desc_pubkeys;
4559 : 23 : std::set<CExtPubKey> desc_xpubs;
4560 [ + - ]: 23 : w_desc.descriptor->GetPubKeys(desc_pubkeys, desc_xpubs);
4561 : 23 : active_xpubs.merge(std::move(desc_xpubs));
4562 [ + - ]: 46 : }
4563 : 7 : return active_xpubs;
4564 : 0 : }
4565 : :
4566 : 8 : std::optional<CKey> CWallet::GetKey(const CKeyID& keyid) const
4567 : : {
4568 [ - + ]: 8 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4569 : :
4570 [ + + ]: 9 : for (const auto& spkm : GetAllScriptPubKeyMans()) {
4571 [ + - ]: 8 : const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4572 [ - + ]: 8 : assert(desc_spkm);
4573 [ + - ]: 8 : LOCK(desc_spkm->cs_desc_man);
4574 [ + - + + ]: 8 : if (std::optional<CKey> key = desc_spkm->GetKey(keyid)) {
4575 [ + - ]: 7 : return key;
4576 [ + - ]: 1 : }
4577 : 8 : }
4578 : 1 : return std::nullopt;
4579 : : }
4580 : :
4581 : 17612 : void CWallet::WriteBestBlock() const
4582 : : {
4583 : 17612 : AssertLockHeld(cs_wallet);
4584 : :
4585 [ + + ]: 35224 : if (!m_last_block_processed.IsNull()) {
4586 : 17568 : CBlockLocator loc;
4587 [ + - ]: 17568 : chain().findBlock(m_last_block_processed, FoundBlock().locator(loc));
4588 : :
4589 [ + - ]: 17568 : if (!loc.IsNull()) {
4590 [ + - ]: 17568 : WalletBatch batch(GetDatabase());
4591 [ + - ]: 17568 : batch.WriteBestBlock(loc);
4592 : 17568 : }
4593 : 17568 : }
4594 : 17612 : }
4595 : :
4596 : 37153 : void CWallet::RefreshTXOsFromTx(const CWalletTx& wtx)
4597 : : {
4598 : 37153 : AssertLockHeld(cs_wallet);
4599 [ - + + + ]: 185601 : for (uint32_t i = 0; i < wtx.tx->vout.size(); ++i) {
4600 : 148448 : const CTxOut& txout = wtx.tx->vout.at(i);
4601 [ + + ]: 148448 : if (!IsMine(txout)) continue;
4602 : 59059 : COutPoint outpoint(wtx.GetHash(), i);
4603 [ + + ]: 59059 : if (m_txos.contains(outpoint)) {
4604 : : } else {
4605 : 45970 : m_txos.emplace(outpoint, WalletTXO{wtx, txout});
4606 : : }
4607 : : }
4608 : 37153 : }
4609 : :
4610 : 693 : void CWallet::RefreshAllTXOs()
4611 : : {
4612 : 693 : AssertLockHeld(cs_wallet);
4613 [ + + ]: 2961 : for (const auto& [_, wtx] : mapWallet) {
4614 : 2268 : RefreshTXOsFromTx(wtx);
4615 : : }
4616 : 693 : }
4617 : :
4618 : 188554 : std::optional<WalletTXO> CWallet::GetTXO(const COutPoint& outpoint) const
4619 : : {
4620 : 188554 : AssertLockHeld(cs_wallet);
4621 : 188554 : const auto& it = m_txos.find(outpoint);
4622 [ + + ]: 188554 : if (it == m_txos.end()) {
4623 : 178198 : return std::nullopt;
4624 : : }
4625 : 10356 : return it->second;
4626 : : }
4627 : :
4628 : 889 : void CWallet::DisconnectChainNotifications()
4629 : : {
4630 [ + + ]: 889 : if (m_chain_notifications_handler) {
4631 : 888 : m_chain_notifications_handler->disconnect();
4632 : 888 : chain().waitForNotifications();
4633 [ + - ]: 888 : m_chain_notifications_handler.reset();
4634 : : }
4635 : 889 : }
4636 : :
4637 : : } // namespace wallet
|