Branch data Line data Source code
1 : : // Copyright (c) 2009-2010 Satoshi Nakamoto
2 : : // Copyright (c) 2009-present The Bitcoin Core developers
3 : : // Distributed under the MIT software license, see the accompanying
4 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
5 : :
6 : : #include <wallet/wallet.h>
7 : :
8 : : #include <bitcoin-build-config.h> // IWYU pragma: keep
9 : : #include <addresstype.h>
10 : : #include <blockfilter.h>
11 : : #include <chain.h>
12 : : #include <coins.h>
13 : : #include <common/args.h>
14 : : #include <common/messages.h>
15 : : #include <common/settings.h>
16 : : #include <common/signmessage.h>
17 : : #include <common/system.h>
18 : : #include <consensus/amount.h>
19 : : #include <consensus/consensus.h>
20 : : #include <consensus/validation.h>
21 : : #include <external_signer.h>
22 : : #include <interfaces/chain.h>
23 : : #include <interfaces/handler.h>
24 : : #include <interfaces/wallet.h>
25 : : #include <kernel/chain.h>
26 : : #include <kernel/mempool_removal_reason.h>
27 : : #include <key.h>
28 : : #include <key_io.h>
29 : : #include <logging.h>
30 : : #include <node/types.h>
31 : : #include <outputtype.h>
32 : : #include <policy/feerate.h>
33 : : #include <policy/truc_policy.h>
34 : : #include <primitives/block.h>
35 : : #include <primitives/transaction.h>
36 : : #include <psbt.h>
37 : : #include <pubkey.h>
38 : : #include <random.h>
39 : : #include <script/descriptor.h>
40 : : #include <script/interpreter.h>
41 : : #include <script/script.h>
42 : : #include <script/sign.h>
43 : : #include <script/signingprovider.h>
44 : : #include <script/solver.h>
45 : : #include <serialize.h>
46 : : #include <span.h>
47 : : #include <streams.h>
48 : : #include <support/allocators/secure.h>
49 : : #include <support/allocators/zeroafterfree.h>
50 : : #include <support/cleanse.h>
51 : : #include <sync.h>
52 : : #include <tinyformat.h>
53 : : #include <uint256.h>
54 : : #include <univalue.h>
55 : : #include <util/check.h>
56 : : #include <util/fs.h>
57 : : #include <util/fs_helpers.h>
58 : : #include <util/moneystr.h>
59 : : #include <util/result.h>
60 : : #include <util/string.h>
61 : : #include <util/time.h>
62 : : #include <util/translation.h>
63 : : #include <wallet/coincontrol.h>
64 : : #include <wallet/context.h>
65 : : #include <wallet/crypter.h>
66 : : #include <wallet/db.h>
67 : : #include <wallet/external_signer_scriptpubkeyman.h>
68 : : #include <wallet/scriptpubkeyman.h>
69 : : #include <wallet/transaction.h>
70 : : #include <wallet/types.h>
71 : : #include <wallet/walletdb.h>
72 : : #include <wallet/walletutil.h>
73 : :
74 : : #include <algorithm>
75 : : #include <cassert>
76 : : #include <condition_variable>
77 : : #include <exception>
78 : : #include <optional>
79 : : #include <stdexcept>
80 : : #include <thread>
81 : : #include <tuple>
82 : : #include <variant>
83 : :
84 : : struct KeyOriginInfo;
85 : :
86 : : using common::AmountErrMsg;
87 : : using common::AmountHighWarn;
88 : : using common::PSBTError;
89 : : using interfaces::FoundBlock;
90 : : using util::ReplaceAll;
91 : : using util::ToString;
92 : :
93 : : namespace wallet {
94 : :
95 : 182 : bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
96 : : {
97 : 364 : const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
98 [ + + ]: 182 : if (!setting_value.isArray()) setting_value.setArray();
99 [ + + ]: 359 : for (const auto& value : setting_value.getValues()) {
100 [ + - + - ]: 177 : if (value.isStr() && value.get_str() == wallet_name) return interfaces::SettingsAction::SKIP_WRITE;
101 : : }
102 [ + - ]: 182 : setting_value.push_back(wallet_name);
103 : 182 : return interfaces::SettingsAction::WRITE;
104 : 182 : };
105 [ + - + - ]: 182 : return chain.updateRwSetting("wallet", update_function);
106 : : }
107 : :
108 : 15 : bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
109 : : {
110 : 30 : const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
111 [ + + ]: 15 : if (!setting_value.isArray()) return interfaces::SettingsAction::SKIP_WRITE;
112 : 13 : common::SettingsValue new_value(common::SettingsValue::VARR);
113 [ + - + + ]: 47 : for (const auto& value : setting_value.getValues()) {
114 [ + - + - : 34 : if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value);
+ + + - +
- ]
115 : : }
116 [ - + - + : 13 : if (new_value.size() == setting_value.size()) return interfaces::SettingsAction::SKIP_WRITE;
+ + ]
117 : 9 : setting_value = std::move(new_value);
118 : 9 : return interfaces::SettingsAction::WRITE;
119 : 13 : };
120 [ + - + - ]: 15 : return chain.updateRwSetting("wallet", update_function);
121 : : }
122 : :
123 : 1530 : static void UpdateWalletSetting(interfaces::Chain& chain,
124 : : const std::string& wallet_name,
125 : : std::optional<bool> load_on_startup,
126 : : std::vector<bilingual_str>& warnings)
127 : : {
128 [ + + ]: 1530 : if (!load_on_startup) return;
129 [ + + - + ]: 187 : if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) {
130 [ # # # # ]: 0 : warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup."));
131 [ + + - + ]: 187 : } else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) {
132 [ # # # # ]: 0 : warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup."));
133 : : }
134 : : }
135 : :
136 : : /**
137 : : * Refresh mempool status so the wallet is in an internally consistent state and
138 : : * immediately knows the transaction's status: Whether it can be considered
139 : : * trusted and is eligible to be abandoned ...
140 : : */
141 : 18412 : static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain)
142 : : {
143 [ + + ]: 18412 : if (chain.isInMempool(tx.GetHash())) {
144 [ - + ]: 3506 : tx.m_state = TxStateInMempool();
145 [ + + ]: 14906 : } else if (tx.state<TxStateInMempool>()) {
146 [ - + ]: 194 : tx.m_state = TxStateInactive();
147 : : }
148 : 18412 : }
149 : :
150 : 806 : bool AddWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
151 : : {
152 : 806 : LOCK(context.wallets_mutex);
153 [ - + ]: 806 : assert(wallet);
154 [ + - ]: 806 : std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
155 [ + - ]: 806 : if (i != context.wallets.end()) return false;
156 [ + - ]: 806 : context.wallets.push_back(wallet);
157 [ + - ]: 806 : wallet->ConnectScriptPubKeyManNotifiers();
158 [ + - ]: 806 : wallet->NotifyCanGetAddressesChanged();
159 : : return true;
160 : 806 : }
161 : :
162 : 806 : bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings)
163 : : {
164 [ - + ]: 806 : assert(wallet);
165 : :
166 : 806 : interfaces::Chain& chain = wallet->chain();
167 [ - + ]: 806 : std::string name = wallet->GetName();
168 [ + - + - ]: 2418 : WITH_LOCK(wallet->cs_wallet, wallet->WriteBestBlock());
169 : :
170 : : // Unregister with the validation interface which also drops shared pointers.
171 [ + - ]: 806 : wallet->m_chain_notifications_handler.reset();
172 : 806 : {
173 [ + - ]: 806 : LOCK(context.wallets_mutex);
174 : 806 : std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
175 [ - + - - ]: 806 : if (i == context.wallets.end()) return false;
176 [ + - ]: 806 : context.wallets.erase(i);
177 : 0 : }
178 : : // Notify unload so that upper layers release the shared pointer.
179 [ + - ]: 806 : wallet->NotifyUnload();
180 : :
181 : : // Write the wallet setting
182 [ + - ]: 806 : UpdateWalletSetting(chain, name, load_on_start, warnings);
183 : :
184 : : return true;
185 : 806 : }
186 : :
187 : 0 : bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start)
188 : : {
189 : 0 : std::vector<bilingual_str> warnings;
190 [ # # ]: 0 : return RemoveWallet(context, wallet, load_on_start, warnings);
191 : 0 : }
192 : :
193 : 1371 : std::vector<std::shared_ptr<CWallet>> GetWallets(WalletContext& context)
194 : : {
195 : 1371 : LOCK(context.wallets_mutex);
196 [ + - ]: 1371 : return context.wallets;
197 : 1371 : }
198 : :
199 : 4742 : std::shared_ptr<CWallet> GetDefaultWallet(WalletContext& context, size_t& count)
200 : : {
201 : 4742 : LOCK(context.wallets_mutex);
202 [ - + ]: 4742 : count = context.wallets.size();
203 [ + + + - ]: 4742 : return count == 1 ? context.wallets[0] : nullptr;
204 : 4742 : }
205 : :
206 : 14208 : std::shared_ptr<CWallet> GetWallet(WalletContext& context, const std::string& name)
207 : : {
208 : 14208 : LOCK(context.wallets_mutex);
209 [ + + ]: 48390 : for (const std::shared_ptr<CWallet>& wallet : context.wallets) {
210 [ + + + - : 62541 : if (wallet->GetName() == name) return wallet;
+ - ]
211 : : }
212 : 57 : return nullptr;
213 : 14208 : }
214 : :
215 : 1 : std::unique_ptr<interfaces::Handler> HandleLoadWallet(WalletContext& context, LoadWalletFn load_wallet)
216 : : {
217 : 1 : LOCK(context.wallets_mutex);
218 [ + - ]: 1 : auto it = context.wallet_load_fns.emplace(context.wallet_load_fns.end(), std::move(load_wallet));
219 [ + - + - : 3 : return interfaces::MakeCleanupHandler([&context, it] { LOCK(context.wallets_mutex); context.wallet_load_fns.erase(it); });
+ - ]
220 : 1 : }
221 : :
222 : 811 : void NotifyWalletLoaded(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
223 : : {
224 : 811 : LOCK(context.wallets_mutex);
225 [ + + ]: 812 : for (auto& load_wallet : context.wallet_load_fns) {
226 [ + - + - ]: 1 : load_wallet(interfaces::MakeWallet(context, wallet));
227 : : }
228 : 811 : }
229 : :
230 : : static GlobalMutex g_loading_wallet_mutex;
231 : : static GlobalMutex g_wallet_release_mutex;
232 : : static std::condition_variable g_wallet_release_cv;
233 : : static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex);
234 : : static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex);
235 : :
236 : : // Custom deleter for shared_ptr<CWallet>.
237 : 874 : static void FlushAndDeleteWallet(CWallet* wallet)
238 : : {
239 [ - + ]: 874 : const std::string name = wallet->GetName();
240 [ + - ]: 874 : wallet->WalletLogPrintf("Releasing wallet %s..\n", name);
241 : 874 : delete wallet;
242 : : // Wallet is now released, notify WaitForDeleteWallet, if any.
243 : 874 : {
244 [ + - ]: 874 : LOCK(g_wallet_release_mutex);
245 [ + + ]: 874 : if (g_unloading_wallet_set.erase(name) == 0) {
246 : : // WaitForDeleteWallet was not called for this wallet, all done.
247 [ + - ]: 63 : return;
248 : : }
249 : 63 : }
250 : 811 : g_wallet_release_cv.notify_all();
251 : 874 : }
252 : :
253 : 811 : void WaitForDeleteWallet(std::shared_ptr<CWallet>&& wallet)
254 : : {
255 : : // Mark wallet for unloading.
256 [ - + ]: 811 : const std::string name = wallet->GetName();
257 : 811 : {
258 [ + - ]: 811 : LOCK(g_wallet_release_mutex);
259 [ + - ]: 811 : g_unloading_wallet_set.insert(name);
260 : : // Do not expect to be the only one removing this wallet.
261 : : // Multiple threads could simultaneously be waiting for deletion.
262 : 0 : }
263 : :
264 : : // Time to ditch our shared_ptr and wait for FlushAndDeleteWallet call.
265 : 811 : wallet.reset();
266 : 811 : {
267 [ + - ]: 811 : WAIT_LOCK(g_wallet_release_mutex, lock);
268 [ + + ]: 812 : while (g_unloading_wallet_set.count(name) == 1) {
269 [ + - ]: 1 : g_wallet_release_cv.wait(lock);
270 : : }
271 : 811 : }
272 : 811 : }
273 : :
274 : : namespace {
275 : 220 : std::shared_ptr<CWallet> LoadWalletInternal(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
276 : : {
277 : 220 : try {
278 [ + - ]: 220 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
279 [ + + ]: 220 : if (!database) {
280 [ + - + - : 133 : error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
+ - + - +
- ]
281 : 19 : return nullptr;
282 : : }
283 : :
284 [ + - + - ]: 201 : context.chain->initMessage(_("Loading wallet…"));
285 [ + - ]: 201 : std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), options.create_flags, error, warnings);
286 [ + + ]: 201 : if (!wallet) {
287 [ + - + - : 21 : error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error;
+ - + - +
- ]
288 : 3 : status = DatabaseStatus::FAILED_LOAD;
289 : 3 : return nullptr;
290 : : }
291 : :
292 [ + - ]: 198 : NotifyWalletLoaded(context, wallet);
293 [ + - ]: 198 : AddWallet(context, wallet);
294 [ + - ]: 198 : wallet->postInitProcess();
295 : :
296 : : // Write the wallet setting
297 [ + - ]: 198 : UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
298 : :
299 : 198 : return wallet;
300 [ - - ]: 220 : } catch (const std::runtime_error& e) {
301 [ - - - - ]: 0 : error = Untranslated(e.what());
302 : 0 : status = DatabaseStatus::FAILED_LOAD;
303 : 0 : return nullptr;
304 : 0 : }
305 : : }
306 : :
307 : : class FastWalletRescanFilter
308 : : {
309 : : public:
310 [ + - ]: 5 : FastWalletRescanFilter(const CWallet& wallet) : m_wallet(wallet)
311 : : {
312 : : // create initial filter with scripts from all ScriptPubKeyMans
313 [ + - + + ]: 50 : for (auto spkm : m_wallet.GetAllScriptPubKeyMans()) {
314 [ + - ]: 45 : auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(spkm)};
315 [ - + ]: 45 : assert(desc_spkm != nullptr);
316 [ + - ]: 45 : AddScriptPubKeys(desc_spkm);
317 : : // save each range descriptor's end for possible future filter updates
318 [ + - + + ]: 45 : if (desc_spkm->IsHDEnabled()) {
319 [ + - + - : 40 : m_last_range_ends.emplace(desc_spkm->GetID(), desc_spkm->GetEndRange());
+ - ]
320 : : }
321 : 0 : }
322 : 5 : }
323 : :
324 : 616 : void UpdateIfNeeded()
325 : : {
326 : : // repopulate filter with new scripts if top-up has happened since last iteration
327 [ + + ]: 5544 : for (const auto& [desc_spkm_id, last_range_end] : m_last_range_ends) {
328 [ + - ]: 4928 : auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(m_wallet.GetScriptPubKeyMan(desc_spkm_id))};
329 [ - + ]: 4928 : assert(desc_spkm != nullptr);
330 : 4928 : int32_t current_range_end{desc_spkm->GetEndRange()};
331 [ + + ]: 4928 : if (current_range_end > last_range_end) {
332 : 80 : AddScriptPubKeys(desc_spkm, last_range_end);
333 : 80 : m_last_range_ends.at(desc_spkm->GetID()) = current_range_end;
334 : : }
335 : : }
336 : 616 : }
337 : :
338 : 616 : std::optional<bool> MatchesBlock(const uint256& block_hash) const
339 : : {
340 : 616 : return m_wallet.chain().blockFilterMatchesAny(BlockFilterType::BASIC, block_hash, m_filter_set);
341 : : }
342 : :
343 : : private:
344 : : const CWallet& m_wallet;
345 : : /** Map for keeping track of each range descriptor's last seen end range.
346 : : * This information is used to detect whether new addresses were derived
347 : : * (that is, if the current end range is larger than the saved end range)
348 : : * after processing a block and hence a filter set update is needed to
349 : : * take possible keypool top-ups into account.
350 : : */
351 : : std::map<uint256, int32_t> m_last_range_ends;
352 : : GCSFilter::ElementSet m_filter_set;
353 : :
354 : 125 : void AddScriptPubKeys(const DescriptorScriptPubKeyMan* desc_spkm, int32_t last_range_end = 0)
355 : : {
356 [ + + + - ]: 11344 : for (const auto& script_pub_key : desc_spkm->GetScriptPubKeys(last_range_end)) {
357 [ + - + - ]: 22438 : m_filter_set.emplace(script_pub_key.begin(), script_pub_key.end());
358 : 125 : }
359 : 125 : }
360 : : };
361 : : } // namespace
362 : :
363 : 224 : std::shared_ptr<CWallet> LoadWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
364 : : {
365 [ + - ]: 672 : auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name));
366 [ + + ]: 224 : if (!result.second) {
367 [ + - ]: 8 : error = Untranslated("Wallet already loading.");
368 : 4 : status = DatabaseStatus::FAILED_LOAD;
369 : 4 : return nullptr;
370 : : }
371 : 220 : auto wallet = LoadWalletInternal(context, name, load_on_start, options, status, error, warnings);
372 [ + - + - ]: 440 : WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first));
373 [ - + ]: 220 : return wallet;
374 : 220 : }
375 : :
376 : 521 : std::shared_ptr<CWallet> CreateWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
377 : : {
378 : 521 : uint64_t wallet_creation_flags = options.create_flags;
379 : 521 : const SecureString& passphrase = options.create_passphrase;
380 : :
381 : : // Only descriptor wallets can be created
382 : 521 : Assert(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS);
383 : 521 : options.require_format = DatabaseFormat::SQLITE;
384 : :
385 : : // Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted
386 : 521 : bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET);
387 : :
388 : : // Born encrypted wallets need to be created blank first.
389 [ + + ]: 521 : if (!passphrase.empty()) {
390 : 12 : wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET;
391 : : }
392 : :
393 : : // Private keys must be disabled for an external signer wallet
394 [ + + + + ]: 521 : if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
395 [ + - ]: 2 : error = Untranslated("Private keys must be disabled when using an external signer");
396 : 1 : status = DatabaseStatus::FAILED_CREATE;
397 : 1 : return nullptr;
398 : : }
399 : :
400 : : // Do not allow a passphrase when private keys are disabled
401 [ + + + + ]: 520 : if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
402 [ + - ]: 8 : error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled.");
403 : 4 : status = DatabaseStatus::FAILED_CREATE;
404 : 4 : return nullptr;
405 : : }
406 : :
407 : : // Wallet::Verify will check if we're trying to create a wallet with a duplicate name.
408 : 516 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
409 [ + + ]: 516 : if (!database) {
410 [ + - + - : 28 : error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
+ - + - +
- ]
411 : 4 : status = DatabaseStatus::FAILED_VERIFY;
412 : 4 : return nullptr;
413 : : }
414 : :
415 : : // Make the wallet
416 [ + - + - ]: 512 : context.chain->initMessage(_("Loading wallet…"));
417 [ + + ]: 512 : std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), wallet_creation_flags, error, warnings);
418 [ - + ]: 509 : if (!wallet) {
419 [ # # # # : 0 : error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error;
# # # # #
# ]
420 : 0 : status = DatabaseStatus::FAILED_CREATE;
421 : 0 : return nullptr;
422 : : }
423 : :
424 : : // Encrypt the wallet
425 [ + + + - ]: 509 : if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
426 [ + - - + ]: 8 : if (!wallet->EncryptWallet(passphrase)) {
427 [ # # # # ]: 0 : error = Untranslated("Error: Wallet created but failed to encrypt.");
428 : 0 : status = DatabaseStatus::FAILED_ENCRYPT;
429 : 0 : return nullptr;
430 : : }
431 [ + + ]: 8 : if (!create_blank) {
432 : : // Unlock the wallet
433 [ + - - + ]: 4 : if (!wallet->Unlock(passphrase)) {
434 [ # # # # ]: 0 : error = Untranslated("Error: Wallet was encrypted but could not be unlocked");
435 : 0 : status = DatabaseStatus::FAILED_ENCRYPT;
436 : 0 : return nullptr;
437 : : }
438 : :
439 : : // Set a seed for the wallet
440 : 4 : {
441 [ + - ]: 4 : LOCK(wallet->cs_wallet);
442 [ + - ]: 4 : wallet->SetupDescriptorScriptPubKeyMans();
443 : 0 : }
444 : :
445 : : // Relock the wallet
446 [ + - ]: 4 : wallet->Lock();
447 : : }
448 : : }
449 : :
450 [ + - ]: 509 : NotifyWalletLoaded(context, wallet);
451 [ + - ]: 509 : AddWallet(context, wallet);
452 [ + - ]: 509 : wallet->postInitProcess();
453 : :
454 : : // Write the wallet settings
455 [ + - ]: 509 : UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
456 : :
457 : 509 : status = DatabaseStatus::SUCCESS;
458 : 509 : return wallet;
459 : 516 : }
460 : :
461 : : // Re-creates wallet from the backup file by renaming and moving it into the wallet's directory.
462 : : // If 'load_after_restore=true', the wallet object will be fully initialized and appended to the context.
463 : 29 : std::shared_ptr<CWallet> RestoreWallet(WalletContext& context, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings, bool load_after_restore)
464 : : {
465 [ + - ]: 29 : DatabaseOptions options;
466 [ + - ]: 29 : ReadDatabaseArgs(*context.args, options);
467 : 29 : options.require_existing = true;
468 : :
469 [ + - + - : 58 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name));
+ - ]
470 [ + - + - ]: 58 : auto wallet_file = wallet_path / "wallet.dat";
471 : 29 : std::shared_ptr<CWallet> wallet;
472 : :
473 : 29 : try {
474 [ + - + + ]: 29 : if (!fs::exists(backup_file)) {
475 [ + - + - ]: 2 : error = Untranslated("Backup file does not exist");
476 : 1 : status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE;
477 : 1 : return nullptr;
478 : : }
479 : :
480 [ + - + + : 28 : if (fs::exists(wallet_path) || !TryCreateDirectories(wallet_path)) {
+ - - + ]
481 [ - + + - : 3 : error = Untranslated(strprintf("Failed to create database path '%s'. Database already exists.", fs::PathToString(wallet_path)));
+ - ]
482 : 1 : status = DatabaseStatus::FAILED_ALREADY_EXISTS;
483 : 1 : return nullptr;
484 : : }
485 : :
486 [ + - ]: 27 : fs::copy_file(backup_file, wallet_file, fs::copy_options::none);
487 : :
488 [ + + ]: 27 : if (load_after_restore) {
489 [ + - - + ]: 48 : wallet = LoadWallet(context, wallet_name, load_on_start, options, status, error, warnings);
490 : : }
491 [ - - ]: 0 : } catch (const std::exception& e) {
492 [ - - ]: 0 : assert(!wallet);
493 [ - - - - : 0 : if (!error.empty()) error += Untranslated("\n");
- - - - ]
494 [ - - - - : 0 : error += Untranslated(strprintf("Unexpected exception: %s", e.what()));
- - ]
495 : 0 : }
496 : :
497 : : // Remove created wallet path only when loading fails
498 [ + - + + ]: 24 : if (load_after_restore && !wallet) {
499 [ + - ]: 10 : fs::remove_all(wallet_path);
500 : : }
501 : :
502 : 27 : return wallet;
503 : 87 : }
504 : :
505 : : /** @defgroup mapWallet
506 : : *
507 : : * @{
508 : : */
509 : :
510 : 84031 : const CWalletTx* CWallet::GetWalletTx(const Txid& hash) const
511 : : {
512 : 84031 : AssertLockHeld(cs_wallet);
513 : 84031 : const auto it = mapWallet.find(hash);
514 [ + + ]: 84031 : if (it == mapWallet.end())
515 : : return nullptr;
516 : 83645 : return &(it->second);
517 : : }
518 : :
519 : 958 : void CWallet::UpgradeDescriptorCache()
520 : : {
521 [ + + + + : 958 : if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) {
+ + ]
522 : 920 : return;
523 : : }
524 : :
525 [ + + ]: 408 : for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) {
526 [ + - ]: 370 : DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
527 [ + - ]: 370 : desc_spkm->UpgradeDescriptorCache();
528 : : }
529 : 38 : SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
530 : : }
531 : :
532 : : /* Given a wallet passphrase string and an unencrypted master key, determine the proper key
533 : : * derivation parameters (should take at least 100ms) and encrypt the master key. */
534 : 26 : static bool EncryptMasterKey(const SecureString& wallet_passphrase, const CKeyingMaterial& plain_master_key, CMasterKey& master_key)
535 : : {
536 : 26 : constexpr MillisecondsDouble target{100};
537 : 26 : auto start{SteadyClock::now()};
538 : 26 : CCrypter crypter;
539 : :
540 [ - + + - ]: 26 : crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod);
541 : 26 : master_key.nDeriveIterations = static_cast<unsigned int>(master_key.nDeriveIterations * target / (SteadyClock::now() - start));
542 : :
543 : 26 : start = SteadyClock::now();
544 [ - + + - ]: 26 : crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod);
545 : 26 : master_key.nDeriveIterations = (master_key.nDeriveIterations + static_cast<unsigned int>(master_key.nDeriveIterations * target / (SteadyClock::now() - start))) / 2;
546 : :
547 [ + + ]: 26 : if (master_key.nDeriveIterations < CMasterKey::DEFAULT_DERIVE_ITERATIONS) {
548 : 9 : master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS;
549 : : }
550 : :
551 [ - + + - : 26 : if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
+ - ]
552 : : return false;
553 : : }
554 [ + - - + ]: 26 : if (!crypter.Encrypt(plain_master_key, master_key.vchCryptedKey)) {
555 : 0 : return false;
556 : : }
557 : :
558 : : return true;
559 : 26 : }
560 : :
561 : 84 : static bool DecryptMasterKey(const SecureString& wallet_passphrase, const CMasterKey& master_key, CKeyingMaterial& plain_master_key)
562 : : {
563 : 84 : CCrypter crypter;
564 [ - + + - : 84 : if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
+ - ]
565 : : return false;
566 : : }
567 [ - + + - : 84 : if (!crypter.Decrypt(master_key.vchCryptedKey, plain_master_key)) {
+ + ]
568 : 9 : return false;
569 : : }
570 : :
571 : : return true;
572 : 84 : }
573 : :
574 : 80 : bool CWallet::Unlock(const SecureString& strWalletPassphrase)
575 : : {
576 : 80 : CKeyingMaterial plain_master_key;
577 : :
578 : 80 : {
579 [ + - ]: 80 : LOCK(cs_wallet);
580 [ + - + + ]: 87 : for (const auto& [_, master_key] : mapMasterKeys)
581 : : {
582 [ + - + + ]: 80 : if (!DecryptMasterKey(strWalletPassphrase, master_key, plain_master_key)) {
583 : 7 : continue; // try another master key
584 : : }
585 [ + - + - ]: 73 : if (Unlock(plain_master_key)) {
586 : : // Now that we've unlocked, upgrade the descriptor cache
587 [ + - ]: 73 : UpgradeDescriptorCache();
588 [ + - ]: 73 : return true;
589 : : }
590 : : }
591 : 73 : }
592 : 7 : return false;
593 : 80 : }
594 : :
595 : 4 : bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase)
596 : : {
597 : 4 : bool fWasLocked = IsLocked();
598 : :
599 : 4 : {
600 [ + - ]: 4 : LOCK2(m_relock_mutex, cs_wallet);
601 [ + - ]: 4 : Lock();
602 : :
603 : 4 : CKeyingMaterial plain_master_key;
604 [ + - + - ]: 4 : for (auto& [master_key_id, master_key] : mapMasterKeys)
605 : : {
606 [ + - + + ]: 4 : if (!DecryptMasterKey(strOldWalletPassphrase, master_key, plain_master_key)) {
607 : : return false;
608 : : }
609 [ + - + - ]: 2 : if (Unlock(plain_master_key))
610 : : {
611 [ + - + - ]: 2 : if (!EncryptMasterKey(strNewWalletPassphrase, plain_master_key, master_key)) {
612 : : return false;
613 : : }
614 [ + - ]: 2 : WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", master_key.nDeriveIterations);
615 : :
616 [ + - + - ]: 2 : WalletBatch(GetDatabase()).WriteMasterKey(master_key_id, master_key);
617 [ + - ]: 2 : if (fWasLocked)
618 [ + - ]: 2 : Lock();
619 : 2 : return true;
620 : : }
621 : : }
622 [ - - - - : 12 : }
+ - + - ]
623 : :
624 : 0 : return false;
625 : : }
626 : :
627 : 45594 : void CWallet::SetLastBlockProcessedInMem(int block_height, uint256 block_hash)
628 : : {
629 : 45594 : AssertLockHeld(cs_wallet);
630 : :
631 : 45594 : m_last_block_processed = block_hash;
632 : 45594 : m_last_block_processed_height = block_height;
633 : 45594 : }
634 : :
635 : 4015 : void CWallet::SetLastBlockProcessed(int block_height, uint256 block_hash)
636 : : {
637 : 4015 : AssertLockHeld(cs_wallet);
638 : :
639 : 4015 : SetLastBlockProcessedInMem(block_height, block_hash);
640 : 4015 : WriteBestBlock();
641 : 4015 : }
642 : :
643 : 1997 : std::set<Txid> CWallet::GetConflicts(const Txid& txid) const
644 : : {
645 [ + - ]: 1997 : std::set<Txid> result;
646 : 1997 : AssertLockHeld(cs_wallet);
647 : :
648 [ + - ]: 1997 : const auto it = mapWallet.find(txid);
649 [ + - ]: 3994 : if (it == mapWallet.end())
650 : : return result;
651 : 1997 : const CWalletTx& wtx = it->second;
652 : :
653 : 1997 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
654 : :
655 [ + + ]: 5107 : for (const CTxIn& txin : wtx.tx->vin)
656 : : {
657 [ + + ]: 3110 : if (mapTxSpends.count(txin.prevout) <= 1)
658 : 3003 : continue; // No conflict if zero or one spends
659 : 107 : range = mapTxSpends.equal_range(txin.prevout);
660 [ + + ]: 3398 : for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it)
661 [ + - ]: 288 : result.insert(_it->second);
662 : : }
663 : : return result;
664 : 0 : }
665 : :
666 : 227 : bool CWallet::HasWalletSpend(const CTransactionRef& tx) const
667 : : {
668 : 227 : AssertLockHeld(cs_wallet);
669 : 227 : const Txid& txid = tx->GetHash();
670 [ - + + + ]: 809 : for (unsigned int i = 0; i < tx->vout.size(); ++i) {
671 [ + + ]: 585 : if (IsSpent(COutPoint(txid, i))) {
672 : : return true;
673 : : }
674 : : }
675 : : return false;
676 : : }
677 : :
678 : 14 : void CWallet::Close()
679 : : {
680 : 14 : GetDatabase().Close();
681 : 14 : }
682 : :
683 : 12971 : void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range)
684 : : {
685 : : // We want all the wallet transactions in range to have the same metadata as
686 : : // the oldest (smallest nOrderPos).
687 : : // So: find smallest nOrderPos:
688 : :
689 : 12971 : int nMinOrderPos = std::numeric_limits<int>::max();
690 : 12971 : const CWalletTx* copyFrom = nullptr;
691 [ + + ]: 28663 : for (TxSpends::iterator it = range.first; it != range.second; ++it) {
692 : 15692 : const CWalletTx* wtx = &mapWallet.at(it->second);
693 [ + + ]: 15692 : if (wtx->nOrderPos < nMinOrderPos) {
694 : 15646 : nMinOrderPos = wtx->nOrderPos;
695 : 15646 : copyFrom = wtx;
696 : : }
697 : : }
698 : :
699 [ + - ]: 12971 : if (!copyFrom) {
700 : : return;
701 : : }
702 : :
703 : : // Now copy data from copyFrom to rest:
704 [ + + ]: 28663 : for (TxSpends::iterator it = range.first; it != range.second; ++it)
705 : : {
706 : 15692 : const Txid& hash = it->second;
707 : 15692 : CWalletTx* copyTo = &mapWallet.at(hash);
708 [ + + ]: 15692 : if (copyFrom == copyTo) continue;
709 : 2721 : assert(copyFrom && "Oldest wallet transaction in range assumed to have been found.");
710 [ + + ]: 2721 : if (!copyFrom->IsEquivalentTo(*copyTo)) continue;
711 : 3 : copyTo->mapValue = copyFrom->mapValue;
712 : 3 : copyTo->vOrderForm = copyFrom->vOrderForm;
713 : : // nTimeReceived not copied on purpose
714 : 3 : copyTo->nTimeSmart = copyFrom->nTimeSmart;
715 : : // nOrderPos not copied on purpose
716 : : // cached members not copied on purpose
717 : : }
718 : : }
719 : :
720 : : /**
721 : : * Outpoint is spent if any non-conflicted transaction
722 : : * spends it:
723 : : */
724 : 546552 : bool CWallet::IsSpent(const COutPoint& outpoint) const
725 : : {
726 : 546552 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
727 : 546552 : range = mapTxSpends.equal_range(outpoint);
728 : :
729 [ + + ]: 548084 : for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
730 : 338829 : const Txid& txid = it->second;
731 : 338829 : const auto mit = mapWallet.find(txid);
732 [ + - ]: 340361 : if (mit != mapWallet.end()) {
733 [ + + ]: 338829 : const auto& wtx = mit->second;
734 [ + + + + : 338946 : if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted())
+ + ]
735 : : return true; // Spent
736 : : }
737 : : }
738 : : return false;
739 : : }
740 : :
741 : 12971 : void CWallet::AddToSpends(const COutPoint& outpoint, const Txid& txid)
742 : : {
743 : 12971 : mapTxSpends.insert(std::make_pair(outpoint, txid));
744 : :
745 : 12971 : UnlockCoin(outpoint);
746 : :
747 : 12971 : std::pair<TxSpends::iterator, TxSpends::iterator> range;
748 : 12971 : range = mapTxSpends.equal_range(outpoint);
749 : 12971 : SyncMetaData(range);
750 : 12971 : }
751 : :
752 : :
753 : 26809 : void CWallet::AddToSpends(const CWalletTx& wtx)
754 : : {
755 [ + + ]: 26809 : if (wtx.IsCoinBase()) // Coinbases don't spend anything!
756 : : return;
757 : :
758 [ + + ]: 19506 : for (const CTxIn& txin : wtx.tx->vin)
759 : 12971 : AddToSpends(txin.prevout, wtx.GetHash());
760 : : }
761 : :
762 : 24 : bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
763 : : {
764 : : // Only descriptor wallets can be encrypted
765 : 24 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
766 : :
767 [ + - ]: 24 : if (IsCrypted())
768 : : return false;
769 : :
770 : 24 : CKeyingMaterial plain_master_key;
771 : :
772 [ + - ]: 24 : plain_master_key.resize(WALLET_CRYPTO_KEY_SIZE);
773 [ - + ]: 24 : GetStrongRandBytes(plain_master_key);
774 : :
775 [ + - ]: 24 : CMasterKey master_key;
776 : :
777 [ + - ]: 24 : master_key.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE);
778 [ - + ]: 24 : GetStrongRandBytes(master_key.vchSalt);
779 : :
780 [ + - + - ]: 24 : if (!EncryptMasterKey(strWalletPassphrase, plain_master_key, master_key)) {
781 : : return false;
782 : : }
783 [ + - ]: 24 : WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", master_key.nDeriveIterations);
784 : :
785 : 24 : {
786 [ + - + - ]: 24 : LOCK2(m_relock_mutex, cs_wallet);
787 [ + - + - ]: 24 : mapMasterKeys[++nMasterKeyMaxID] = master_key;
788 [ + - + - ]: 24 : WalletBatch* encrypted_batch = new WalletBatch(GetDatabase());
789 [ + - - + ]: 24 : if (!encrypted_batch->TxnBegin()) {
790 [ # # ]: 0 : delete encrypted_batch;
791 : 0 : encrypted_batch = nullptr;
792 [ # # ]: 0 : return false;
793 : : }
794 [ + - ]: 24 : encrypted_batch->WriteMasterKey(nMasterKeyMaxID, master_key);
795 : :
796 [ + + ]: 127 : for (const auto& spk_man_pair : m_spk_managers) {
797 [ + - ]: 103 : auto spk_man = spk_man_pair.second.get();
798 [ + - - + ]: 103 : if (!spk_man->Encrypt(plain_master_key, encrypted_batch)) {
799 [ # # ]: 0 : encrypted_batch->TxnAbort();
800 : 0 : delete encrypted_batch;
801 : 0 : encrypted_batch = nullptr;
802 : : // We now probably have half of our keys encrypted in memory, and half not...
803 : : // die and let the user reload the unencrypted wallet.
804 : 0 : assert(false);
805 : : }
806 : : }
807 : :
808 [ + - - + ]: 24 : if (!encrypted_batch->TxnCommit()) {
809 [ # # ]: 0 : delete encrypted_batch;
810 : 0 : encrypted_batch = nullptr;
811 : : // We now have keys encrypted in memory, but not on disk...
812 : : // die to avoid confusion and let the user reload the unencrypted wallet.
813 : 0 : assert(false);
814 : : }
815 : :
816 [ + - ]: 48 : delete encrypted_batch;
817 : 24 : encrypted_batch = nullptr;
818 : :
819 [ + - ]: 24 : Lock();
820 [ + - ]: 24 : Unlock(strWalletPassphrase);
821 : :
822 : : // Make new descriptors with a new seed
823 [ + - + + ]: 24 : if (!IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
824 [ + - ]: 12 : SetupDescriptorScriptPubKeyMans();
825 : : }
826 [ + - ]: 24 : Lock();
827 : :
828 : : // Need to completely rewrite the wallet file; if we don't, the database might keep
829 : : // bits of the unencrypted private key in slack space in the database file.
830 [ + - ]: 24 : GetDatabase().Rewrite();
831 [ - - + - ]: 24 : }
832 [ + - ]: 24 : NotifyStatusChanged(this);
833 : :
834 : : return true;
835 : 24 : }
836 : :
837 : 0 : DBErrors CWallet::ReorderTransactions()
838 : : {
839 : 0 : LOCK(cs_wallet);
840 [ # # ]: 0 : WalletBatch batch(GetDatabase());
841 : :
842 : : // Old wallets didn't have any defined order for transactions
843 : : // Probably a bad idea to change the output of this
844 : :
845 : : // First: get all CWalletTx into a sorted-by-time multimap.
846 : 0 : typedef std::multimap<int64_t, CWalletTx*> TxItems;
847 : 0 : TxItems txByTime;
848 : :
849 [ # # # # ]: 0 : for (auto& entry : mapWallet)
850 : : {
851 : 0 : CWalletTx* wtx = &entry.second;
852 [ # # ]: 0 : txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx));
853 : : }
854 : :
855 : 0 : nOrderPosNext = 0;
856 : 0 : std::vector<int64_t> nOrderPosOffsets;
857 [ # # ]: 0 : for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it)
858 : : {
859 [ # # ]: 0 : CWalletTx *const pwtx = (*it).second;
860 : 0 : int64_t& nOrderPos = pwtx->nOrderPos;
861 : :
862 [ # # ]: 0 : if (nOrderPos == -1)
863 : : {
864 : 0 : nOrderPos = nOrderPosNext++;
865 [ # # ]: 0 : nOrderPosOffsets.push_back(nOrderPos);
866 : :
867 [ # # # # ]: 0 : if (!batch.WriteTx(*pwtx))
868 : : return DBErrors::LOAD_FAIL;
869 : : }
870 : : else
871 : : {
872 : 0 : int64_t nOrderPosOff = 0;
873 [ # # ]: 0 : for (const int64_t& nOffsetStart : nOrderPosOffsets)
874 : : {
875 [ # # ]: 0 : if (nOrderPos >= nOffsetStart)
876 : 0 : ++nOrderPosOff;
877 : : }
878 : 0 : nOrderPos += nOrderPosOff;
879 [ # # ]: 0 : nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1);
880 : :
881 [ # # ]: 0 : if (!nOrderPosOff)
882 : 0 : continue;
883 : :
884 : : // Since we're changing the order, write it back
885 [ # # # # ]: 0 : if (!batch.WriteTx(*pwtx))
886 : : return DBErrors::LOAD_FAIL;
887 : : }
888 : : }
889 [ # # ]: 0 : batch.WriteOrderPosNext(nOrderPosNext);
890 : :
891 : : return DBErrors::LOAD_OK;
892 [ # # ]: 0 : }
893 : :
894 : 18556 : int64_t CWallet::IncOrderPosNext(WalletBatch* batch)
895 : : {
896 : 18556 : AssertLockHeld(cs_wallet);
897 : 18556 : int64_t nRet = nOrderPosNext++;
898 [ + - ]: 18556 : if (batch) {
899 : 18556 : batch->WriteOrderPosNext(nOrderPosNext);
900 : : } else {
901 [ # # ]: 0 : WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext);
902 : : }
903 : 18556 : return nRet;
904 : : }
905 : :
906 : 718 : void CWallet::MarkDirty()
907 : : {
908 : 718 : {
909 : 718 : LOCK(cs_wallet);
910 [ + + + - ]: 3921 : for (auto& [_, wtx] : mapWallet)
911 : 3203 : wtx.MarkDirty();
912 : 718 : }
913 : 718 : }
914 : :
915 : 99 : bool CWallet::MarkReplaced(const Txid& originalHash, const Txid& newHash)
916 : : {
917 : 99 : LOCK(cs_wallet);
918 : :
919 [ + - ]: 99 : auto mi = mapWallet.find(originalHash);
920 : :
921 : : // There is a bug if MarkReplaced is not called on an existing wallet transaction.
922 [ - + ]: 99 : assert(mi != mapWallet.end());
923 : :
924 [ + - ]: 99 : CWalletTx& wtx = (*mi).second;
925 : :
926 : : // Ensure for now that we're not overwriting data
927 [ + - - + ]: 99 : assert(wtx.mapValue.count("replaced_by_txid") == 0);
928 : :
929 [ + - + - : 99 : wtx.mapValue["replaced_by_txid"] = newHash.ToString();
+ - ]
930 : :
931 : : // Refresh mempool status without waiting for transactionRemovedFromMempool or transactionAddedToMempool
932 [ + - ]: 99 : RefreshMempoolStatus(wtx, chain());
933 : :
934 [ + - ]: 99 : WalletBatch batch(GetDatabase());
935 : :
936 : 99 : bool success = true;
937 [ + - - + ]: 99 : if (!batch.WriteTx(wtx)) {
938 [ # # # # ]: 0 : WalletLogPrintf("%s: Updating batch tx %s failed\n", __func__, wtx.GetHash().ToString());
939 : 0 : success = false;
940 : : }
941 : :
942 [ + - ]: 99 : NotifyTransactionChanged(originalHash, CT_UPDATED);
943 : :
944 : 99 : return success;
945 [ + - ]: 198 : }
946 : :
947 : 2019 : void CWallet::SetSpentKeyState(WalletBatch& batch, const Txid& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations)
948 : : {
949 : 2019 : AssertLockHeld(cs_wallet);
950 : 2019 : const CWalletTx* srctx = GetWalletTx(hash);
951 [ + + ]: 2019 : if (!srctx) return;
952 : :
953 : 1877 : CTxDestination dst;
954 [ + - + - ]: 1877 : if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) {
955 [ + - + + ]: 1877 : if (IsMine(dst)) {
956 [ + - + + ]: 1208 : if (used != IsAddressPreviouslySpent(dst)) {
957 [ + - ]: 19 : if (used) {
958 [ + - ]: 19 : tx_destinations.insert(dst);
959 : : }
960 [ + - ]: 19 : SetAddressPreviouslySpent(batch, dst, used);
961 : : }
962 : : }
963 : : }
964 : 1877 : }
965 : :
966 : 439 : bool CWallet::IsSpentKey(const CScript& scriptPubKey) const
967 : : {
968 : 439 : AssertLockHeld(cs_wallet);
969 : 439 : CTxDestination dest;
970 [ + - + - ]: 439 : if (!ExtractDestination(scriptPubKey, dest)) {
971 : : return false;
972 : : }
973 [ + - + + ]: 439 : if (IsAddressPreviouslySpent(dest)) {
974 : 6 : return true;
975 : : }
976 : : return false;
977 : 439 : }
978 : :
979 : 25947 : CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const TxState& state, const UpdateWalletTxFn& update_wtx, bool rescanning_old_block)
980 : : {
981 : 25947 : LOCK(cs_wallet);
982 : :
983 [ + - ]: 25947 : WalletBatch batch(GetDatabase());
984 : :
985 [ + - ]: 25947 : Txid hash = tx->GetHash();
986 : :
987 [ + - + + ]: 25947 : if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
988 : : // Mark used destinations
989 : 856 : std::set<CTxDestination> tx_destinations;
990 : :
991 [ + + ]: 2875 : for (const CTxIn& txin : tx->vin) {
992 : 2019 : const COutPoint& op = txin.prevout;
993 [ + - ]: 2019 : SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations);
994 : : }
995 : :
996 [ + - ]: 856 : MarkDestinationsDirty(tx_destinations);
997 : 856 : }
998 : :
999 : : // Inserts only if not already there, returns tx inserted or tx found
1000 [ + - ]: 25947 : auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(tx, state));
1001 [ + + ]: 25947 : CWalletTx& wtx = (*ret.first).second;
1002 : 25947 : bool fInsertedNew = ret.second;
1003 [ + + + - : 25947 : bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew);
- + ]
1004 [ + + ]: 25947 : if (fInsertedNew) {
1005 [ + - ]: 18556 : wtx.nTimeReceived = GetTime();
1006 [ + - ]: 18556 : wtx.nOrderPos = IncOrderPosNext(&batch);
1007 [ + - + - ]: 18556 : wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1008 [ + - ]: 18556 : wtx.nTimeSmart = ComputeTimeSmart(wtx, rescanning_old_block);
1009 [ + - ]: 18556 : AddToSpends(wtx);
1010 : :
1011 : : // Update birth time when tx time is older than it.
1012 [ + - + - ]: 18556 : MaybeUpdateBirthTime(wtx.GetTxTime());
1013 : : }
1014 : :
1015 : 7391 : if (!fInsertedNew)
1016 : : {
1017 [ + + ]: 7391 : if (state.index() != wtx.m_state.index()) {
1018 : 4305 : wtx.m_state = state;
1019 : 4305 : fUpdated = true;
1020 : : } else {
1021 [ - + ]: 3086 : assert(TxStateSerializedIndex(wtx.m_state) == TxStateSerializedIndex(state));
1022 [ - + ]: 3086 : assert(TxStateSerializedBlockHash(wtx.m_state) == TxStateSerializedBlockHash(state));
1023 : : }
1024 : : // If we have a witness-stripped version of this transaction, and we
1025 : : // see a new version with a witness, then we must be upgrading a pre-segwit
1026 : : // wallet. Store the new version of the transaction with the witness,
1027 : : // as the stripped-version must be invalid.
1028 : : // TODO: Store all versions of the transaction, instead of just one.
1029 [ + + - + ]: 7391 : if (tx->HasWitness() && !wtx.tx->HasWitness()) {
1030 [ # # # # ]: 0 : wtx.SetTx(tx);
1031 : 0 : fUpdated = true;
1032 : : }
1033 : : }
1034 : :
1035 : : // Mark inactive coinbase transactions and their descendants as abandoned
1036 [ + + ]: 25947 : if (wtx.IsCoinBase() && wtx.isInactive()) {
1037 [ + - ]: 537 : std::vector<CWalletTx*> txs{&wtx};
1038 : :
1039 : 537 : TxStateInactive inactive_state = TxStateInactive{/*abandoned=*/true};
1040 : :
1041 [ + + ]: 1075 : while (!txs.empty()) {
1042 : 538 : CWalletTx* desc_tx = txs.back();
1043 [ + + ]: 538 : txs.pop_back();
1044 [ + + ]: 538 : desc_tx->m_state = inactive_state;
1045 : : // Break caches since we have changed the state
1046 : 538 : desc_tx->MarkDirty();
1047 [ + - ]: 538 : batch.WriteTx(*desc_tx);
1048 [ + - ]: 538 : MarkInputsDirty(desc_tx->tx);
1049 [ - + + + ]: 1614 : for (unsigned int i = 0; i < desc_tx->tx->vout.size(); ++i) {
1050 : 1076 : COutPoint outpoint(desc_tx->GetHash(), i);
1051 : 1076 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(outpoint);
1052 [ + + ]: 1077 : for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
1053 [ + - ]: 1 : const auto wit = mapWallet.find(it->second);
1054 [ + - ]: 1 : if (wit != mapWallet.end()) {
1055 [ + - ]: 1 : txs.push_back(&wit->second);
1056 : : }
1057 : : }
1058 : : }
1059 : : }
1060 : 537 : }
1061 : :
1062 : : //// debug print
1063 [ + - + + : 79419 : WalletLogPrintf("AddToWallet %s %s%s %s\n", hash.ToString(), (fInsertedNew ? "new" : ""), (fUpdated ? "update" : ""), TxStateString(state));
+ + + - +
- ]
1064 : :
1065 : : // Write to disk
1066 [ + + ]: 25947 : if (fInsertedNew || fUpdated)
1067 [ + - + - ]: 22862 : if (!batch.WriteTx(wtx))
1068 : : return nullptr;
1069 : :
1070 : : // Break debit/credit balance caches:
1071 : 25947 : wtx.MarkDirty();
1072 : :
1073 : : // Cache the outputs that belong to the wallet
1074 [ + - ]: 25947 : RefreshTXOsFromTx(wtx);
1075 : :
1076 : : // Notify UI of new or updated transaction
1077 [ + + + - ]: 33338 : NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED);
1078 : :
1079 : : #if HAVE_SYSTEM
1080 : : // notify an external script when a wallet transaction comes in or is updated
1081 [ - + ]: 25947 : std::string strCmd = m_notify_tx_changed_script;
1082 : :
1083 [ + + ]: 25947 : if (!strCmd.empty())
1084 : : {
1085 [ + - + - : 52 : ReplaceAll(strCmd, "%s", hash.GetHex());
+ - ]
1086 [ + + ]: 26 : if (auto* conf = wtx.state<TxStateConfirmed>())
1087 : : {
1088 [ + - + - : 44 : ReplaceAll(strCmd, "%b", conf->confirmed_block_hash.GetHex());
+ - ]
1089 [ + - + - : 44 : ReplaceAll(strCmd, "%h", ToString(conf->confirmed_block_height));
+ - ]
1090 : : } else {
1091 [ + - + - : 8 : ReplaceAll(strCmd, "%b", "unconfirmed");
+ - ]
1092 [ + - + - : 8 : ReplaceAll(strCmd, "%h", "-1");
+ - ]
1093 : : }
1094 : : #ifndef WIN32
1095 : : // Substituting the wallet name isn't currently supported on windows
1096 : : // because windows shell escaping has not been implemented yet:
1097 : : // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
1098 : : // A few ways it could be implemented in the future are described in:
1099 : : // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
1100 [ + - + - : 52 : ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
+ - ]
1101 : : #endif
1102 [ + - ]: 26 : std::thread t(runCommand, strCmd);
1103 [ + - ]: 26 : t.detach(); // thread runs free
1104 : 26 : }
1105 : : #endif
1106 : :
1107 : 25947 : return &wtx;
1108 [ + - ]: 77841 : }
1109 : :
1110 : 8253 : bool CWallet::LoadToWallet(const Txid& hash, const UpdateWalletTxFn& fill_wtx)
1111 : : {
1112 : 8253 : const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(nullptr, TxStateInactive{}));
1113 : 8253 : CWalletTx& wtx = ins.first->second;
1114 [ + - ]: 8253 : if (!fill_wtx(wtx, ins.second)) {
1115 : : return false;
1116 : : }
1117 : : // If wallet doesn't have a chain (e.g when using bitcoin-wallet tool),
1118 : : // don't bother to update txn.
1119 [ + + ]: 8253 : if (HaveChain()) {
1120 : 8174 : wtx.updateState(chain());
1121 : : }
1122 [ + - ]: 8253 : if (/* insertion took place */ ins.second) {
1123 : 8253 : wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1124 : : }
1125 : 8253 : AddToSpends(wtx);
1126 [ + + ]: 16682 : for (const CTxIn& txin : wtx.tx->vin) {
1127 : 8429 : auto it = mapWallet.find(txin.prevout.hash);
1128 [ + + ]: 8429 : if (it != mapWallet.end()) {
1129 [ + + ]: 458 : CWalletTx& prevtx = it->second;
1130 [ + + ]: 8435 : if (auto* prev = prevtx.state<TxStateBlockConflicted>()) {
1131 : 6 : MarkConflicted(prev->conflicting_block_hash, prev->conflicting_block_height, wtx.GetHash());
1132 : : }
1133 : : }
1134 : : }
1135 : :
1136 : : // Update birth time when tx time is older than it.
1137 : 8253 : MaybeUpdateBirthTime(wtx.GetTxTime());
1138 : :
1139 : : // Make sure the tx outputs are known by the wallet
1140 : 8253 : RefreshTXOsFromTx(wtx);
1141 : 8253 : return true;
1142 : : }
1143 : :
1144 : 143328 : bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, const SyncTxState& state, bool fUpdate, bool rescanning_old_block)
1145 : : {
1146 [ + + ]: 143328 : const CTransaction& tx = *ptx;
1147 : 143328 : {
1148 : 143328 : AssertLockHeld(cs_wallet);
1149 : :
1150 [ + + ]: 143328 : if (auto* conf = std::get_if<TxStateConfirmed>(&state)) {
1151 [ + + ]: 306963 : for (const CTxIn& txin : tx.vin) {
1152 : 172713 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout);
1153 [ + + ]: 180417 : while (range.first != range.second) {
1154 [ + + ]: 7704 : if (range.first->second != tx.GetHash()) {
1155 [ + - + - : 328 : WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), conf->confirmed_block_hash.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n);
+ - + - ]
1156 : 164 : MarkConflicted(conf->confirmed_block_hash, conf->confirmed_block_height, range.first->second);
1157 : : }
1158 : 7704 : range.first++;
1159 : : }
1160 : : }
1161 : : }
1162 : :
1163 : 143328 : bool fExisted = mapWallet.count(tx.GetHash()) != 0;
1164 [ + - ]: 143328 : if (fExisted && !fUpdate) return false;
1165 [ + + + + : 143328 : if (fExisted || IsMine(tx) || IsFromMe(tx))
+ + ]
1166 : : {
1167 : : /* Check if any keys in the wallet keypool that were supposed to be unused
1168 : : * have appeared in a new transaction. If so, remove those keys from the keypool.
1169 : : * This can happen when restoring an old wallet backup that does not contain
1170 : : * the mostly recently created transactions from newer versions of the wallet.
1171 : : */
1172 : :
1173 : : // loop though all outputs
1174 [ + + ]: 133701 : for (const CTxOut& txout: tx.vout) {
1175 [ + + ]: 157241 : for (const auto& spk_man : GetScriptPubKeyMans(txout.scriptPubKey)) {
1176 [ + - + + ]: 76379 : for (auto &dest : spk_man->MarkUnusedAddresses(txout.scriptPubKey)) {
1177 : : // If internal flag is not defined try to infer it from the ScriptPubKeyMan
1178 [ + - ]: 28402 : if (!dest.internal.has_value()) {
1179 [ + - ]: 28402 : dest.internal = IsInternalScriptPubKeyMan(spk_man);
1180 : : }
1181 : :
1182 : : // skip if can't determine whether it's a receiving address or not
1183 [ + + ]: 28402 : if (!dest.internal.has_value()) continue;
1184 : :
1185 : : // If this is a receiving address and it's not in the address book yet
1186 : : // (e.g. it wasn't generated on this node or we're restoring from backup)
1187 : : // add it to the address book for proper transaction accounting
1188 [ + + + - : 18598 : if (!*dest.internal && !FindAddressBookEntry(dest.dest, /* allow_change= */ false)) {
+ + ]
1189 [ + - + - ]: 22718 : SetAddressBook(dest.dest, "", AddressPurpose::RECEIVE);
1190 : : }
1191 : 47977 : }
1192 : 109264 : }
1193 : : }
1194 : :
1195 : : // Block disconnection override an abandoned tx as unconfirmed
1196 : : // which means user may have to call abandontransaction again
1197 [ + - ]: 48874 : TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);
1198 [ + - + - : 73311 : CWalletTx* wtx = AddToWallet(MakeTransactionRef(tx), tx_state, /*update_wtx=*/nullptr, rescanning_old_block);
+ - ]
1199 [ - + ]: 24437 : if (!wtx) {
1200 : : // Can only be nullptr if there was a db write error (missing db, read-only db or a db engine internal writing error).
1201 : : // As we only store arriving transaction in this process, and we don't want an inconsistent state, let's throw an error.
1202 [ # # ]: 0 : throw std::runtime_error("DB error adding transaction to wallet, write failed");
1203 : : }
1204 : : return true;
1205 : : }
1206 : : }
1207 : : return false;
1208 : : }
1209 : :
1210 : 0 : bool CWallet::TransactionCanBeAbandoned(const Txid& hashTx) const
1211 : : {
1212 : 0 : LOCK(cs_wallet);
1213 [ # # ]: 0 : const CWalletTx* wtx = GetWalletTx(hashTx);
1214 [ # # # # : 0 : return wtx && !wtx->isAbandoned() && GetTxDepthInMainChain(*wtx) == 0 && !wtx->InMempool();
# # # # #
# # # ]
1215 : 0 : }
1216 : :
1217 : 58 : void CWallet::UpdateTrucSiblingConflicts(const CWalletTx& parent_wtx, const Txid& child_txid, bool add_conflict) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet)
1218 : : {
1219 : : // Find all other txs in our wallet that spend utxos from this parent
1220 : : // so that we can mark them as mempool-conflicted by this new tx.
1221 [ - + + + ]: 232 : for (long unsigned int i = 0; i < parent_wtx.tx->vout.size(); i++) {
1222 [ + + ]: 214 : for (auto range = mapTxSpends.equal_range(COutPoint(parent_wtx.tx->GetHash(), i)); range.first != range.second; range.first++) {
1223 [ + + ]: 40 : const Txid& sibling_txid = range.first->second;
1224 : : // Skip the child_tx itself
1225 [ + + ]: 40 : if (sibling_txid == child_txid) continue;
1226 [ + - ]: 32 : RecursiveUpdateTxState(/*batch=*/nullptr, sibling_txid, [&child_txid, add_conflict](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1227 [ + + + + ]: 16 : return add_conflict ? (wtx.mempool_conflicts.insert(child_txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED)
1228 [ + + ]: 8 : : (wtx.mempool_conflicts.erase(child_txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED);
1229 : : });
1230 : : }
1231 : : }
1232 : 58 : }
1233 : :
1234 : 30828 : void CWallet::MarkInputsDirty(const CTransactionRef& tx)
1235 : : {
1236 [ + + ]: 72118 : for (const CTxIn& txin : tx->vin) {
1237 : 41290 : auto it = mapWallet.find(txin.prevout.hash);
1238 [ + + ]: 62962 : if (it != mapWallet.end()) {
1239 : 21672 : it->second.MarkDirty();
1240 : : }
1241 : : }
1242 : 30828 : }
1243 : :
1244 : 8 : bool CWallet::AbandonTransaction(const Txid& hashTx)
1245 : : {
1246 : 8 : LOCK(cs_wallet);
1247 [ + - ]: 8 : auto it = mapWallet.find(hashTx);
1248 [ - + ]: 8 : assert(it != mapWallet.end());
1249 [ + - + - ]: 8 : return AbandonTransaction(it->second);
1250 : 8 : }
1251 : :
1252 : 600 : bool CWallet::AbandonTransaction(CWalletTx& tx)
1253 : : {
1254 : : // Can't mark abandoned if confirmed or in mempool
1255 [ + + + + ]: 600 : if (GetTxDepthInMainChain(tx) != 0 || tx.InMempool()) {
1256 : 3 : return false;
1257 : : }
1258 : :
1259 : 1216 : auto try_updating_state = [](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1260 : : // If the orig tx was not in block/mempool, none of its spends can be.
1261 [ + - ]: 619 : assert(!wtx.isConfirmed());
1262 [ - + ]: 619 : assert(!wtx.InMempool());
1263 : : // If already conflicted or abandoned, no need to set abandoned
1264 [ + - + - ]: 619 : if (!wtx.isBlockConflicted() && !wtx.isAbandoned()) {
1265 [ + - ]: 511 : wtx.m_state = TxStateInactive{/*abandoned=*/true};
1266 : 511 : return TxUpdate::NOTIFY_CHANGED;
1267 : : }
1268 : : return TxUpdate::UNCHANGED;
1269 : : };
1270 : :
1271 : : // Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too.
1272 : : // States are not permanent, so these transactions can become unabandoned if they are re-added to the
1273 : : // mempool, or confirmed in a block, or conflicted.
1274 : : // Note: If the reorged coinbase is re-added to the main chain, the descendants that have not had their
1275 : : // states change will remain abandoned and will require manual broadcast if the user wants them.
1276 : :
1277 [ + - ]: 597 : RecursiveUpdateTxState(tx.GetHash(), try_updating_state);
1278 : :
1279 : 597 : return true;
1280 : : }
1281 : :
1282 : 170 : void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const Txid& hashTx)
1283 : : {
1284 : 170 : LOCK(cs_wallet);
1285 : :
1286 : : // If number of conflict confirms cannot be determined, this means
1287 : : // that the block is still unknown or not yet part of the main chain,
1288 : : // for example when loading the wallet during a reindex. Do nothing in that
1289 : : // case.
1290 [ + + + - ]: 170 : if (m_last_block_processed_height < 0 || conflicting_height < 0) {
1291 : : return;
1292 : : }
1293 : 164 : int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1;
1294 [ + - ]: 164 : if (conflictconfirms >= 0)
1295 : : return;
1296 : :
1297 : 337 : auto try_updating_state = [&](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1298 [ + + ]: 173 : if (conflictconfirms < GetTxDepthInMainChain(wtx)) {
1299 : : // Block is 'more conflicted' than current confirm; update.
1300 : : // Mark transaction as conflicted with this block.
1301 : 159 : wtx.m_state = TxStateBlockConflicted{hashBlock, conflicting_height};
1302 : 159 : return TxUpdate::CHANGED;
1303 : : }
1304 : : return TxUpdate::UNCHANGED;
1305 : 164 : };
1306 : :
1307 : : // Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too.
1308 [ + - + - : 328 : RecursiveUpdateTxState(hashTx, try_updating_state);
+ - ]
1309 : :
1310 : 170 : }
1311 : :
1312 : 769 : void CWallet::RecursiveUpdateTxState(const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1313 : 769 : WalletBatch batch(GetDatabase());
1314 [ + - ]: 769 : RecursiveUpdateTxState(&batch, tx_hash, try_updating_state);
1315 : 769 : }
1316 : :
1317 : 16875 : void CWallet::RecursiveUpdateTxState(WalletBatch* batch, const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1318 [ + - ]: 16875 : std::set<Txid> todo;
1319 : 16875 : std::set<Txid> done;
1320 : :
1321 [ + - ]: 16875 : todo.insert(tx_hash);
1322 : :
1323 [ + + ]: 33802 : while (!todo.empty()) {
1324 : 16927 : Txid now = *todo.begin();
1325 : 16927 : todo.erase(now);
1326 [ + - ]: 16927 : done.insert(now);
1327 [ + - ]: 16927 : auto it = mapWallet.find(now);
1328 [ - + ]: 16927 : assert(it != mapWallet.end());
1329 [ + - ]: 16927 : CWalletTx& wtx = it->second;
1330 : :
1331 [ + - ]: 16927 : TxUpdate update_state = try_updating_state(wtx);
1332 [ + + ]: 16927 : if (update_state != TxUpdate::UNCHANGED) {
1333 : 5853 : wtx.MarkDirty();
1334 [ + + + - ]: 5853 : if (batch) batch->WriteTx(wtx);
1335 : : // Iterate over all its outputs, and update those tx states as well (if applicable)
1336 [ - + + + ]: 17600 : for (unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
1337 : 11747 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(COutPoint(now, i));
1338 [ + + ]: 11799 : for (TxSpends::const_iterator iter = range.first; iter != range.second; ++iter) {
1339 [ + - ]: 52 : if (!done.count(iter->second)) {
1340 [ + - ]: 52 : todo.insert(iter->second);
1341 : : }
1342 : : }
1343 : : }
1344 : :
1345 [ + + ]: 5853 : if (update_state == TxUpdate::NOTIFY_CHANGED) {
1346 [ + - ]: 511 : NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED);
1347 : : }
1348 : :
1349 : : // If a transaction changes its tx state, that usually changes the balance
1350 : : // available of the outputs it spends. So force those to be recomputed
1351 [ + - ]: 5853 : MarkInputsDirty(wtx.tx);
1352 : : }
1353 : : }
1354 : 16875 : }
1355 : :
1356 : 143328 : bool CWallet::SyncTransaction(const CTransactionRef& ptx, const SyncTxState& state, bool update_tx, bool rescanning_old_block)
1357 : : {
1358 [ + + ]: 143328 : if (!AddToWalletIfInvolvingMe(ptx, state, update_tx, rescanning_old_block))
1359 : : return false; // Not one of ours
1360 : :
1361 : : // If a transaction changes 'conflicted' state, that changes the balance
1362 : : // available of the outputs it spends. So force those to be
1363 : : // recomputed, also:
1364 : 24437 : MarkInputsDirty(ptx);
1365 : 24437 : return true;
1366 : : }
1367 : :
1368 : 5582 : void CWallet::transactionAddedToMempool(const CTransactionRef& tx) {
1369 : 5582 : LOCK(cs_wallet);
1370 [ + - ]: 5582 : SyncTransaction(tx, TxStateInMempool{});
1371 : :
1372 [ + - ]: 5582 : auto it = mapWallet.find(tx->GetHash());
1373 [ + + ]: 5582 : if (it != mapWallet.end()) {
1374 [ + - ]: 3530 : RefreshMempoolStatus(it->second, chain());
1375 : : }
1376 : :
1377 : 5582 : const Txid& txid = tx->GetHash();
1378 : :
1379 [ + + ]: 17294 : for (const CTxIn& tx_in : tx->vin) {
1380 : : // For each wallet transaction spending this prevout..
1381 [ + + ]: 22267 : for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1382 [ + + ]: 10555 : const Txid& spent_id = range.first->second;
1383 : : // Skip the recently added tx
1384 [ + + ]: 10555 : if (spent_id == txid) continue;
1385 [ + - ]: 5194 : RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1386 [ + + ]: 2606 : return wtx.mempool_conflicts.insert(txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1387 : : });
1388 : : }
1389 : :
1390 : : }
1391 : :
1392 [ + + ]: 5582 : if (tx->version == TRUC_VERSION) {
1393 : : // Unconfirmed TRUC transactions are only allowed a 1-parent-1-child topology.
1394 : : // For any unconfirmed v3 parents (there should be a maximum of 1 except in reorgs),
1395 : : // record this child so the wallet doesn't try to spend any other outputs
1396 [ + + ]: 315 : for (const CTxIn& tx_in : tx->vin) {
1397 [ + - ]: 169 : auto parent_it = mapWallet.find(tx_in.prevout.hash);
1398 [ + + ]: 266 : if (parent_it != mapWallet.end()) {
1399 [ + + ]: 97 : CWalletTx& parent_wtx = parent_it->second;
1400 [ + + ]: 97 : if (parent_wtx.isUnconfirmed()) {
1401 [ - + ]: 29 : parent_wtx.truc_child_in_mempool = tx->GetHash();
1402 : : // Even though these siblings do not spend the same utxos, they can't
1403 : : // be present in the mempool at the same time because of TRUC policy rules
1404 [ + - ]: 29 : UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/true);
1405 : : }
1406 : : }
1407 : : }
1408 : : }
1409 : 5582 : }
1410 : :
1411 : 47674 : void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason) {
1412 : 47674 : LOCK(cs_wallet);
1413 [ + - ]: 47674 : auto it = mapWallet.find(tx->GetHash());
1414 [ + + ]: 47674 : if (it != mapWallet.end()) {
1415 [ + - ]: 14783 : RefreshMempoolStatus(it->second, chain());
1416 : : }
1417 : : // Handle transactions that were removed from the mempool because they
1418 : : // conflict with transactions in a newly connected block.
1419 [ + + ]: 47674 : if (reason == MemPoolRemovalReason::CONFLICT) {
1420 : : // Trigger external -walletnotify notifications for these transactions.
1421 : : // Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons:
1422 : : //
1423 : : // 1. The transactionRemovedFromMempool callback does not currently
1424 : : // provide the conflicting block's hash and height, and for backwards
1425 : : // compatibility reasons it may not be not safe to store conflicted
1426 : : // wallet transactions with a null block hash. See
1427 : : // https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993.
1428 : : // 2. For most of these transactions, the wallet's internal conflict
1429 : : // detection in the blockConnected handler will subsequently call
1430 : : // MarkConflicted and update them with CONFLICTED status anyway. This
1431 : : // applies to any wallet transaction that has inputs spent in the
1432 : : // block, or that has ancestors in the wallet with inputs spent by
1433 : : // the block.
1434 : : // 3. Longstanding behavior since the sync implementation in
1435 : : // https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync
1436 : : // implementation before that was to mark these transactions
1437 : : // unconfirmed rather than conflicted.
1438 : : //
1439 : : // Nothing described above should be seen as an unchangeable requirement
1440 : : // when improving this code in the future. The wallet's heuristics for
1441 : : // distinguishing between conflicted and unconfirmed transactions are
1442 : : // imperfect, and could be improved in general, see
1443 : : // https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking
1444 [ + - ]: 16 : SyncTransaction(tx, TxStateInactive{});
1445 : : }
1446 : :
1447 : 47674 : const Txid& txid = tx->GetHash();
1448 : :
1449 [ + + ]: 102566 : for (const CTxIn& tx_in : tx->vin) {
1450 : : // Iterate over all wallet transactions spending txin.prev
1451 : : // and recursively mark them as no longer conflicting with
1452 : : // txid
1453 [ + + ]: 68385 : for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1454 [ + - ]: 13493 : const Txid& spent_id = range.first->second;
1455 : :
1456 [ + - ]: 26986 : RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1457 [ + + ]: 13501 : return wtx.mempool_conflicts.erase(txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1458 : : });
1459 : : }
1460 : : }
1461 : :
1462 [ + + ]: 47674 : if (tx->version == TRUC_VERSION) {
1463 : : // If this tx has a parent, unset its truc_child_in_mempool to make it possible
1464 : : // to spend from the parent again. If this tx was replaced by another
1465 : : // child of the same parent, transactionAddedToMempool
1466 : : // will update truc_child_in_mempool
1467 [ + + ]: 898 : for (const CTxIn& tx_in : tx->vin) {
1468 [ + - ]: 563 : auto parent_it = mapWallet.find(tx_in.prevout.hash);
1469 [ + + ]: 1054 : if (parent_it != mapWallet.end()) {
1470 [ + + ]: 491 : CWalletTx& parent_wtx = parent_it->second;
1471 [ + + ]: 491 : if (parent_wtx.truc_child_in_mempool == tx->GetHash()) {
1472 [ + - ]: 29 : parent_wtx.truc_child_in_mempool = std::nullopt;
1473 [ + - ]: 29 : UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/false);
1474 : : }
1475 : : }
1476 : : }
1477 : : }
1478 : 47674 : }
1479 : :
1480 : 40868 : void CWallet::blockConnected(ChainstateRole role, const interfaces::BlockInfo& block)
1481 : : {
1482 [ + + ]: 40868 : if (role == ChainstateRole::BACKGROUND) {
1483 : : return;
1484 : : }
1485 [ - + ]: 40768 : assert(block.data);
1486 : 40768 : LOCK(cs_wallet);
1487 : :
1488 : : // Update the best block in memory first. This will set the best block's height, which is
1489 : : // needed by MarkConflicted.
1490 [ + - ]: 40768 : SetLastBlockProcessedInMem(block.height, block.hash);
1491 : :
1492 : : // No need to scan block if it was created before the wallet birthday.
1493 : : // Uses chain max time and twice the grace period to adjust time for block time variability.
1494 [ + + + - ]: 40768 : if (block.chain_time_max < m_birth_time.load() - (TIMESTAMP_WINDOW * 2)) return;
1495 : :
1496 : : // Scan block
1497 : : bool wallet_updated = false;
1498 [ - + + + ]: 87714 : for (size_t index = 0; index < block.data->vtx.size(); index++) {
1499 [ + - ]: 47415 : wallet_updated |= SyncTransaction(block.data->vtx[index], TxStateConfirmed{block.hash, block.height, static_cast<int>(index)});
1500 [ + - ]: 47415 : transactionRemovedFromMempool(block.data->vtx[index], MemPoolRemovalReason::BLOCK);
1501 : : }
1502 : :
1503 : : // Update on disk if this block resulted in us updating a tx, or periodically every 144 blocks (~1 day)
1504 [ + + + + ]: 40299 : if (wallet_updated || block.height % 144 == 0) {
1505 [ + - ]: 12431 : WriteBestBlock();
1506 : : }
1507 : 40768 : }
1508 : :
1509 : 3436 : void CWallet::blockDisconnected(const interfaces::BlockInfo& block)
1510 : : {
1511 [ - + ]: 3436 : assert(block.data);
1512 : 3436 : LOCK(cs_wallet);
1513 : :
1514 : : // At block disconnection, this will change an abandoned transaction to
1515 : : // be unconfirmed, whether or not the transaction is added back to the mempool.
1516 : : // User may have to call abandontransaction again. It may be addressed in the
1517 : : // future with a stickier abandoned state or even removing abandontransaction call.
1518 : 3436 : int disconnect_height = block.height;
1519 : :
1520 [ - + + + ]: 6916 : for (size_t index = 0; index < block.data->vtx.size(); index++) {
1521 [ + - ]: 3480 : const CTransactionRef& ptx = block.data->vtx[index];
1522 : : // Coinbase transactions are not only inactive but also abandoned,
1523 : : // meaning they should never be relayed standalone via the p2p protocol.
1524 [ + - ]: 3480 : SyncTransaction(ptx, TxStateInactive{/*abandoned=*/index == 0});
1525 : :
1526 [ + + ]: 7065 : for (const CTxIn& tx_in : ptx->vin) {
1527 : : // No other wallet transactions conflicted with this transaction
1528 [ + + ]: 3585 : if (mapTxSpends.count(tx_in.prevout) < 1) continue;
1529 : :
1530 : 85 : std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(tx_in.prevout);
1531 : :
1532 : : // For all of the spends that conflict with this transaction
1533 [ + + ]: 3678 : for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) {
1534 [ + + + - ]: 93 : CWalletTx& wtx = mapWallet.find(_it->second)->second;
1535 : :
1536 [ + + ]: 93 : if (!wtx.isBlockConflicted()) continue;
1537 : :
1538 : 20 : auto try_updating_state = [&](CWalletTx& tx) {
1539 [ + - ]: 12 : if (!tx.isBlockConflicted()) return TxUpdate::UNCHANGED;
1540 [ + + ]: 12 : if (tx.state<TxStateBlockConflicted>()->conflicting_block_height >= disconnect_height) {
1541 [ - + ]: 11 : tx.m_state = TxStateInactive{};
1542 : 11 : return TxUpdate::CHANGED;
1543 : : }
1544 : : return TxUpdate::UNCHANGED;
1545 : 8 : };
1546 : :
1547 [ + - ]: 16 : RecursiveUpdateTxState(wtx.tx->GetHash(), try_updating_state);
1548 : : }
1549 : : }
1550 : : }
1551 : :
1552 : : // Update the best block
1553 [ + - + - ]: 3436 : SetLastBlockProcessed(block.height - 1, *Assert(block.prev_hash));
1554 : 3436 : }
1555 : :
1556 : 38642 : void CWallet::updatedBlockTip()
1557 : : {
1558 : 38642 : m_best_block_time = GetTime();
1559 : 38642 : }
1560 : :
1561 : 6052 : void CWallet::BlockUntilSyncedToCurrentChain() const {
1562 : 6052 : AssertLockNotHeld(cs_wallet);
1563 : : // Skip the queue-draining stuff if we know we're caught up with
1564 : : // chain().Tip(), otherwise put a callback in the validation interface queue and wait
1565 : : // for the queue to drain enough to execute it (indicating we are caught up
1566 : : // at least with the time we entered this function).
1567 [ + - ]: 12104 : uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed);
1568 : 6052 : chain().waitForNotificationsIfTipChanged(last_block_hash);
1569 : 6052 : }
1570 : :
1571 : : // Note that this function doesn't distinguish between a 0-valued input,
1572 : : // and a not-"is mine" input.
1573 : 2177 : CAmount CWallet::GetDebit(const CTxIn &txin) const
1574 : : {
1575 : 2177 : LOCK(cs_wallet);
1576 [ + - ]: 2177 : auto txo = GetTXO(txin.prevout);
1577 [ + + ]: 2177 : if (txo) {
1578 : 1402 : return txo->GetTxOut().nValue;
1579 : : }
1580 : : return 0;
1581 : 2177 : }
1582 : :
1583 : 560200 : bool CWallet::IsMine(const CTxOut& txout) const
1584 : : {
1585 : 560200 : AssertLockHeld(cs_wallet);
1586 : 560200 : return IsMine(txout.scriptPubKey);
1587 : : }
1588 : :
1589 : 32871 : bool CWallet::IsMine(const CTxDestination& dest) const
1590 : : {
1591 : 32871 : AssertLockHeld(cs_wallet);
1592 [ + - ]: 32871 : return IsMine(GetScriptForDestination(dest));
1593 : : }
1594 : :
1595 : 595256 : bool CWallet::IsMine(const CScript& script) const
1596 : : {
1597 : 595256 : AssertLockHeld(cs_wallet);
1598 : :
1599 : : // Search the cache so that IsMine is called only on the relevant SPKMs instead of on everything in m_spk_managers
1600 : 595256 : const auto& it = m_cached_spks.find(script);
1601 [ + + ]: 595256 : if (it != m_cached_spks.end()) {
1602 : 194889 : bool res = false;
1603 [ + + ]: 389825 : for (const auto& spkm : it->second) {
1604 [ + + + - ]: 389825 : res = res || spkm->IsMine(script);
1605 : : }
1606 : : Assume(res);
1607 : : return res;
1608 : : }
1609 : :
1610 : : return false;
1611 : : }
1612 : :
1613 : 136022 : bool CWallet::IsMine(const CTransaction& tx) const
1614 : : {
1615 : 136022 : AssertLockHeld(cs_wallet);
1616 [ + + ]: 443806 : for (const CTxOut& txout : tx.vout)
1617 [ + + ]: 324720 : if (IsMine(txout))
1618 : : return true;
1619 : : return false;
1620 : : }
1621 : :
1622 : 2952 : bool CWallet::IsMine(const COutPoint& outpoint) const
1623 : : {
1624 : 2952 : AssertLockHeld(cs_wallet);
1625 : 2952 : auto wtx = GetWalletTx(outpoint.hash);
1626 [ + + ]: 2952 : if (!wtx) {
1627 : : return false;
1628 : : }
1629 [ - + + - ]: 2930 : if (outpoint.n >= wtx->tx->vout.size()) {
1630 : : return false;
1631 : : }
1632 : 2930 : return IsMine(wtx->tx->vout[outpoint.n]);
1633 : : }
1634 : :
1635 : 129397 : bool CWallet::IsFromMe(const CTransaction& tx) const
1636 : : {
1637 : 129397 : LOCK(cs_wallet);
1638 [ + + ]: 294765 : for (const CTxIn& txin : tx.vin) {
1639 [ + - + + ]: 168445 : if (GetTXO(txin.prevout)) return true;
1640 : : }
1641 : : return false;
1642 : 129397 : }
1643 : :
1644 : 1260 : CAmount CWallet::GetDebit(const CTransaction& tx) const
1645 : : {
1646 : 1260 : CAmount nDebit = 0;
1647 [ + + ]: 3424 : for (const CTxIn& txin : tx.vin)
1648 : : {
1649 : 2164 : nDebit += GetDebit(txin);
1650 [ - + ]: 2164 : if (!MoneyRange(nDebit))
1651 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": value out of range");
1652 : : }
1653 : 1260 : return nDebit;
1654 : : }
1655 : :
1656 : 4 : bool CWallet::IsHDEnabled() const
1657 : : {
1658 : : // All Active ScriptPubKeyMans must be HD for this to be true
1659 : 4 : bool result = false;
1660 [ + + ]: 36 : for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
1661 [ + - - + ]: 32 : if (!spk_man->IsHDEnabled()) return false;
1662 : 32 : result = true;
1663 : : }
1664 : 4 : return result;
1665 : : }
1666 : :
1667 : 11212 : bool CWallet::CanGetAddresses(bool internal) const
1668 : : {
1669 : 11212 : LOCK(cs_wallet);
1670 [ + + ]: 11212 : if (m_spk_managers.empty()) return false;
1671 [ + + ]: 12112 : for (OutputType t : OUTPUT_TYPES) {
1672 [ + - ]: 12099 : auto spk_man = GetScriptPubKeyMan(t, internal);
1673 [ + + + - : 12099 : if (spk_man && spk_man->CanGetAddresses(internal)) {
- + ]
1674 : : return true;
1675 : : }
1676 : : }
1677 : : return false;
1678 : 11212 : }
1679 : :
1680 : 99 : void CWallet::SetWalletFlag(uint64_t flags)
1681 : : {
1682 : 99 : WalletBatch batch(GetDatabase());
1683 [ + - ]: 99 : return SetWalletFlagWithDB(batch, flags);
1684 : 99 : }
1685 : :
1686 : 131 : void CWallet::SetWalletFlagWithDB(WalletBatch& batch, uint64_t flags)
1687 : : {
1688 : 131 : LOCK(cs_wallet);
1689 [ + - ]: 131 : m_wallet_flags |= flags;
1690 [ + - - + ]: 131 : if (!batch.WriteWalletFlags(m_wallet_flags))
1691 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1692 : 131 : }
1693 : :
1694 : 1 : void CWallet::UnsetWalletFlag(uint64_t flag)
1695 : : {
1696 : 1 : WalletBatch batch(GetDatabase());
1697 [ + - ]: 1 : UnsetWalletFlagWithDB(batch, flag);
1698 : 1 : }
1699 : :
1700 : 3115 : void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag)
1701 : : {
1702 : 3115 : LOCK(cs_wallet);
1703 [ + - ]: 3115 : m_wallet_flags &= ~flag;
1704 [ + - - + ]: 3115 : if (!batch.WriteWalletFlags(m_wallet_flags))
1705 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1706 : 3115 : }
1707 : :
1708 : 3114 : void CWallet::UnsetBlankWalletFlag(WalletBatch& batch)
1709 : : {
1710 : 3114 : UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET);
1711 : 3114 : }
1712 : :
1713 : 204981 : bool CWallet::IsWalletFlagSet(uint64_t flag) const
1714 : : {
1715 : 204981 : return (m_wallet_flags & flag);
1716 : : }
1717 : :
1718 : 878 : bool CWallet::LoadWalletFlags(uint64_t flags)
1719 : : {
1720 : 878 : LOCK(cs_wallet);
1721 [ + - ]: 878 : if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) {
1722 : : // contains unknown non-tolerable wallet flags
1723 : : return false;
1724 : : }
1725 : 878 : m_wallet_flags = flags;
1726 : :
1727 : 878 : return true;
1728 : 878 : }
1729 : :
1730 : 533 : void CWallet::InitWalletFlags(uint64_t flags)
1731 : : {
1732 : 533 : LOCK(cs_wallet);
1733 : :
1734 : : // We should never be writing unknown non-tolerable wallet flags
1735 [ - + ]: 533 : assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32));
1736 : : // This should only be used once, when creating a new wallet - so current flags are expected to be blank
1737 [ - + ]: 533 : assert(m_wallet_flags == 0);
1738 : :
1739 [ + - + - : 1066 : if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) {
- + ]
1740 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1741 : : }
1742 : :
1743 [ + - - + ]: 533 : if (!LoadWalletFlags(flags)) assert(false);
1744 : 533 : }
1745 : :
1746 : 426 : uint64_t CWallet::GetWalletFlags() const
1747 : : {
1748 : 426 : return m_wallet_flags;
1749 : : }
1750 : :
1751 : 33963 : void CWallet::MaybeUpdateBirthTime(int64_t time)
1752 : : {
1753 [ + + ]: 33963 : int64_t birthtime = m_birth_time.load();
1754 [ + + ]: 33963 : if (time < birthtime) {
1755 : 1239 : m_birth_time = time;
1756 : : }
1757 : 33963 : }
1758 : :
1759 : : /**
1760 : : * Scan active chain for relevant transactions after importing keys. This should
1761 : : * be called whenever new keys are added to the wallet, with the oldest key
1762 : : * creation time.
1763 : : *
1764 : : * @return Earliest timestamp that could be successfully scanned from. Timestamp
1765 : : * returned will be higher than startTime if relevant blocks could not be read.
1766 : : */
1767 : 543 : int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update)
1768 : : {
1769 : : // Find starting block. May be null if nCreateTime is greater than the
1770 : : // highest blockchain timestamp, in which case there is nothing that needs
1771 : : // to be scanned.
1772 : 543 : int start_height = 0;
1773 : 543 : uint256 start_block;
1774 : 543 : bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height));
1775 [ + - + - ]: 1086 : WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);
1776 : :
1777 [ + - ]: 543 : if (start) {
1778 : : // TODO: this should take into account failure by ScanResult::USER_ABORT
1779 : 543 : ScanResult result = ScanForWalletTransactions(start_block, start_height, /*max_height=*/{}, reserver, /*fUpdate=*/update, /*save_progress=*/false);
1780 [ + + ]: 543 : if (result.status == ScanResult::FAILURE) {
1781 : 1 : int64_t time_max;
1782 : 1 : CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max)));
1783 : 1 : return time_max + TIMESTAMP_WINDOW + 1;
1784 : : }
1785 : : }
1786 : : return startTime;
1787 : : }
1788 : :
1789 : : /**
1790 : : * Scan the block chain (starting in start_block) for transactions
1791 : : * from or to us. If fUpdate is true, found transactions that already
1792 : : * exist in the wallet will be updated. If max_height is not set, the
1793 : : * mempool will be scanned as well.
1794 : : *
1795 : : * @param[in] start_block Scan starting block. If block is not on the active
1796 : : * chain, the scan will return SUCCESS immediately.
1797 : : * @param[in] start_height Height of start_block
1798 : : * @param[in] max_height Optional max scanning height. If unset there is
1799 : : * no maximum and scanning can continue to the tip
1800 : : *
1801 : : * @return ScanResult returning scan information and indicating success or
1802 : : * failure. Return status will be set to SUCCESS if scan was
1803 : : * successful. FAILURE if a complete rescan was not possible (due to
1804 : : * pruning or corruption). USER_ABORT if the rescan was aborted before
1805 : : * it could complete.
1806 : : *
1807 : : * @pre Caller needs to make sure start_block (and the optional stop_block) are on
1808 : : * the main chain after to the addition of any new keys you want to detect
1809 : : * transactions for.
1810 : : */
1811 : 615 : CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate, const bool save_progress)
1812 : : {
1813 : 615 : constexpr auto INTERVAL_TIME{60s};
1814 : 615 : auto current_time{reserver.now()};
1815 : 615 : auto start_time{reserver.now()};
1816 : :
1817 [ - + ]: 615 : assert(reserver.isReserved());
1818 : :
1819 : 615 : uint256 block_hash = start_block;
1820 : 615 : ScanResult result;
1821 : :
1822 : 615 : std::unique_ptr<FastWalletRescanFilter> fast_rescan_filter;
1823 [ + - + + : 620 : if (chain().hasBlockFilterIndex(BlockFilterType::BASIC)) fast_rescan_filter = std::make_unique<FastWalletRescanFilter>(*this);
+ - ]
1824 : :
1825 [ + + + - ]: 1230 : WalletLogPrintf("Rescan started from block %s... (%s)\n", start_block.ToString(),
1826 [ + + + - ]: 1225 : fast_rescan_filter ? "fast variant using block filters" : "slow variant inspecting all blocks");
1827 : :
1828 [ + - ]: 615 : fAbortRescan = false;
1829 [ + - + - : 1230 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 0); // show rescan progress in GUI as dialog or on splashscreen, if rescan required on startup (e.g. due to corruption)
+ - ]
1830 [ + - + - ]: 1230 : uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1831 : 615 : uint256 end_hash = tip_hash;
1832 [ + + + - ]: 615 : if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash));
1833 [ + - ]: 615 : double progress_begin = chain().guessVerificationProgress(block_hash);
1834 [ + - ]: 615 : double progress_end = chain().guessVerificationProgress(end_hash);
1835 : 615 : double progress_current = progress_begin;
1836 : 615 : int block_height = start_height;
1837 [ + - + - : 67535 : while (!fAbortRescan && !chain().shutdownRequested()) {
+ - ]
1838 [ + + ]: 67535 : if (progress_end - progress_begin > 0.0) {
1839 : 67317 : m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin);
1840 : : } else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal)
1841 : 218 : m_scanning_progress = 0;
1842 : : }
1843 [ + + + + ]: 67535 : if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) {
1844 [ + + + + : 2468 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));
+ - + - +
- ]
1845 : : }
1846 : :
1847 [ + - + + ]: 67535 : bool next_interval = reserver.now() >= current_time + INTERVAL_TIME;
1848 [ + + ]: 67535 : if (next_interval) {
1849 [ + - ]: 2 : current_time = reserver.now();
1850 [ + - ]: 2 : WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current);
1851 : : }
1852 : :
1853 : 67535 : bool fetch_block{true};
1854 [ + + ]: 67535 : if (fast_rescan_filter) {
1855 [ + - ]: 616 : fast_rescan_filter->UpdateIfNeeded();
1856 [ + - ]: 616 : auto matches_block{fast_rescan_filter->MatchesBlock(block_hash)};
1857 [ + - ]: 616 : if (matches_block.has_value()) {
1858 [ + + ]: 616 : if (*matches_block) {
1859 [ + - + - : 124 : LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (filter matched)\n", block_height, block_hash.ToString());
+ - + - ]
1860 : : } else {
1861 : 554 : result.last_scanned_block = block_hash;
1862 : 554 : result.last_scanned_height = block_height;
1863 : 554 : fetch_block = false;
1864 : : }
1865 : : } else {
1866 [ # # # # : 0 : LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (WARNING: block filter not found!)\n", block_height, block_hash.ToString());
# # # # ]
1867 : : }
1868 : : }
1869 : :
1870 : : // Find next block separately from reading data above, because reading
1871 : : // is slow and there might be a reorg while it is read.
1872 : 67535 : bool block_still_active = false;
1873 : 67535 : bool next_block = false;
1874 : 67535 : uint256 next_block_hash;
1875 [ + - ]: 67535 : chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash)));
1876 : :
1877 [ + + ]: 67535 : if (fetch_block) {
1878 : : // Read block data and locator if needed (the locator is usually null unless we need to save progress)
1879 : 66981 : CBlock block;
1880 : 66981 : CBlockLocator loc;
1881 : : // Find block
1882 [ + + ]: 66981 : FoundBlock found_block{FoundBlock().data(block)};
1883 [ + + ]: 66981 : if (save_progress && next_interval) found_block.locator(loc);
1884 [ + - ]: 66981 : chain().findBlock(block_hash, found_block);
1885 : :
1886 [ + + ]: 66981 : if (!block.IsNull()) {
1887 [ + - ]: 66877 : LOCK(cs_wallet);
1888 [ - + ]: 66877 : if (!block_still_active) {
1889 : : // Abort scan if current block is no longer active, to prevent
1890 : : // marking transactions as coming from the wrong block.
1891 : 0 : result.last_failed_block = block_hash;
1892 : 0 : result.status = ScanResult::FAILURE;
1893 [ # # ]: 0 : break;
1894 : : }
1895 [ - + + + ]: 153712 : for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) {
1896 [ + - ]: 86835 : SyncTransaction(block.vtx[posInBlock], TxStateConfirmed{block_hash, block_height, static_cast<int>(posInBlock)}, fUpdate, /*rescanning_old_block=*/true);
1897 : : }
1898 : : // scan succeeded, record block as most recent successfully scanned
1899 : 66877 : result.last_scanned_block = block_hash;
1900 [ + + ]: 66877 : result.last_scanned_height = block_height;
1901 : :
1902 [ + + ]: 66877 : if (!loc.IsNull()) {
1903 [ + - ]: 2 : WalletLogPrintf("Saving scan progress %d.\n", block_height);
1904 [ + - ]: 2 : WalletBatch batch(GetDatabase());
1905 [ + - ]: 2 : batch.WriteBestBlock(loc);
1906 : 2 : }
1907 : 66877 : } else {
1908 : : // could not scan block, keep scanning but record this block as the most recent failure
1909 : 104 : result.last_failed_block = block_hash;
1910 : 104 : result.status = ScanResult::FAILURE;
1911 : : }
1912 : 66981 : }
1913 [ + + + + ]: 67535 : if (max_height && block_height >= *max_height) {
1914 : : break;
1915 : : }
1916 : : // If rescanning was triggered with cs_wallet permanently locked (AttachChain), additional blocks that were connected during the rescan
1917 : : // aren't processed here but will be processed with the pending blockConnected notifications after the lock is released.
1918 : : // If rescanning without a permanent cs_wallet lock, additional blocks that were added during the rescan will be re-processed if
1919 : : // the notification was processed and the last block height was updated.
1920 [ + - + + : 135066 : if (block_height >= WITH_LOCK(cs_wallet, return GetLastBlockHeight())) {
+ - ]
1921 : : break;
1922 : : }
1923 : :
1924 : 66921 : {
1925 [ + + ]: 66921 : if (!next_block) {
1926 : : // break successfully when rescan has reached the tip, or
1927 : : // previous block is no longer on the chain due to a reorg
1928 : : break;
1929 : : }
1930 : :
1931 : : // increment block and verification progress
1932 : 66920 : block_hash = next_block_hash;
1933 : 66920 : ++block_height;
1934 [ + - ]: 66920 : progress_current = chain().guessVerificationProgress(block_hash);
1935 : :
1936 : : // handle updated tip hash
1937 : 66920 : const uint256 prev_tip_hash = tip_hash;
1938 [ + - + - ]: 133840 : tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1939 [ + + - + ]: 66920 : if (!max_height && prev_tip_hash != tip_hash) {
1940 : : // in case the tip has changed, update progress max
1941 [ # # ]: 0 : progress_end = chain().guessVerificationProgress(tip_hash);
1942 : : }
1943 : : }
1944 : : }
1945 [ + + ]: 615 : if (!max_height) {
1946 [ + - ]: 613 : WalletLogPrintf("Scanning current mempool transactions.\n");
1947 [ + - + - ]: 1839 : WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
1948 : : }
1949 [ + - + - : 1230 : ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 100); // hide progress dialog in GUI
+ - ]
1950 [ + + + - ]: 615 : if (block_height && fAbortRescan) {
1951 [ # # ]: 0 : WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current);
1952 : 0 : result.status = ScanResult::USER_ABORT;
1953 [ + + + - : 615 : } else if (block_height && chain().shutdownRequested()) {
+ - ]
1954 [ # # ]: 0 : WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current);
1955 : 0 : result.status = ScanResult::USER_ABORT;
1956 : : } else {
1957 [ + - + - ]: 615 : WalletLogPrintf("Rescan completed in %15dms\n", Ticks<std::chrono::milliseconds>(reserver.now() - start_time));
1958 : : }
1959 : 615 : return result;
1960 : 615 : }
1961 : :
1962 : 1637 : bool CWallet::SubmitTxMemoryPoolAndRelay(CWalletTx& wtx, std::string& err_string, bool relay) const
1963 : : {
1964 : 1637 : AssertLockHeld(cs_wallet);
1965 : :
1966 : : // Can't relay if wallet is not broadcasting
1967 [ + - ]: 1637 : if (!GetBroadcastTransactions()) return false;
1968 : : // Don't relay abandoned transactions
1969 [ + + ]: 1637 : if (wtx.isAbandoned()) return false;
1970 : : // Don't try to submit coinbase transactions. These would fail anyway but would
1971 : : // cause log spam.
1972 [ + - ]: 1637 : if (wtx.IsCoinBase()) return false;
1973 : : // Don't try to submit conflicted or confirmed transactions.
1974 [ + - ]: 1637 : if (GetTxDepthInMainChain(wtx) != 0) return false;
1975 : :
1976 : : // Submit transaction to mempool for relay
1977 [ + - ]: 1637 : WalletLogPrintf("Submitting wtx %s to mempool for relay\n", wtx.GetHash().ToString());
1978 : : // We must set TxStateInMempool here. Even though it will also be set later by the
1979 : : // entered-mempool callback, if we did not there would be a race where a
1980 : : // user could call sendmoney in a loop and hit spurious out of funds errors
1981 : : // because we think that this newly generated transaction's change is
1982 : : // unavailable as we're not yet aware that it is in the mempool.
1983 : : //
1984 : : // If broadcast fails for any reason, trying to set wtx.m_state here would be incorrect.
1985 : : // If transaction was previously in the mempool, it should be updated when
1986 : : // TransactionRemovedFromMempool fires.
1987 : 1637 : bool ret = chain().broadcastTransaction(wtx.tx, m_default_max_tx_fee, relay, err_string);
1988 [ + + + + ]: 3184 : if (ret) wtx.m_state = TxStateInMempool{};
1989 : : return ret;
1990 : : }
1991 : :
1992 : 1997 : std::set<Txid> CWallet::GetTxConflicts(const CWalletTx& wtx) const
1993 : : {
1994 : 1997 : AssertLockHeld(cs_wallet);
1995 : :
1996 : 1997 : const Txid myHash{wtx.GetHash()};
1997 : 1997 : std::set<Txid> result{GetConflicts(myHash)};
1998 : 1997 : result.erase(myHash);
1999 : 1997 : return result;
2000 : : }
2001 : :
2002 : 139 : bool CWallet::ShouldResend() const
2003 : : {
2004 : : // Don't attempt to resubmit if the wallet is configured to not broadcast
2005 [ + - ]: 139 : if (!fBroadcastTransactions) return false;
2006 : :
2007 : : // During reindex, importing and IBD, old wallet transactions become
2008 : : // unconfirmed. Don't resend them as that would spam other nodes.
2009 : : // We only allow forcing mempool submission when not relaying to avoid this spam.
2010 [ + + ]: 139 : if (!chain().isReadyToBroadcast()) return false;
2011 : :
2012 : : // Do this infrequently and randomly to avoid giving away
2013 : : // that these are our transactions.
2014 [ + + ]: 74 : if (NodeClock::now() < m_next_resend) return false;
2015 : :
2016 : : return true;
2017 : : }
2018 : :
2019 : 963 : NodeClock::time_point CWallet::GetDefaultNextResend() { return FastRandomContext{}.rand_uniform_delay(NodeClock::now() + 12h, 24h); }
2020 : :
2021 : : // Resubmit transactions from the wallet to the mempool, optionally asking the
2022 : : // mempool to relay them. On startup, we will do this for all unconfirmed
2023 : : // transactions but will not ask the mempool to relay them. We do this on startup
2024 : : // to ensure that our own mempool is aware of our transactions. There
2025 : : // is a privacy side effect here as not broadcasting on startup also means that we won't
2026 : : // inform the world of our wallet's state, particularly if the wallet (or node) is not
2027 : : // yet synced.
2028 : : //
2029 : : // Otherwise this function is called periodically in order to relay our unconfirmed txs.
2030 : : // We do this on a random timer to slightly obfuscate which transactions
2031 : : // come from our wallet.
2032 : : //
2033 : : // TODO: Ideally, we'd only resend transactions that we think should have been
2034 : : // mined in the most recent block. Any transaction that wasn't in the top
2035 : : // blockweight of transactions in the mempool shouldn't have been mined,
2036 : : // and so is probably just sitting in the mempool waiting to be confirmed.
2037 : : // Rebroadcasting does nothing to speed up confirmation and only damages
2038 : : // privacy.
2039 : : //
2040 : : // The `force` option results in all unconfirmed transactions being submitted to
2041 : : // the mempool. This does not necessarily result in those transactions being relayed,
2042 : : // that depends on the `relay` option. Periodic rebroadcast uses the pattern
2043 : : // relay=true force=false, while loading into the mempool
2044 : : // (on start, or after import) uses relay=false force=true.
2045 : 1356 : void CWallet::ResubmitWalletTransactions(bool relay, bool force)
2046 : : {
2047 : : // Don't attempt to resubmit if the wallet is configured to not broadcast,
2048 : : // even if forcing.
2049 [ + + ]: 1356 : if (!fBroadcastTransactions) return;
2050 : :
2051 : 1353 : int submitted_tx_count = 0;
2052 : :
2053 : 1353 : { // cs_wallet scope
2054 : 1353 : LOCK(cs_wallet);
2055 : :
2056 : : // First filter for the transactions we want to rebroadcast.
2057 : : // We use a set with WalletTxOrderComparator so that rebroadcasting occurs in insertion order
2058 : 1353 : std::set<CWalletTx*, WalletTxOrderComparator> to_submit;
2059 [ + + + + ]: 15002 : for (auto& [txid, wtx] : mapWallet) {
2060 : : // Only rebroadcast unconfirmed txs
2061 [ + + ]: 13649 : if (!wtx.isUnconfirmed()) continue;
2062 : :
2063 : : // Attempt to rebroadcast all txes more than 5 minutes older than
2064 : : // the last block, or all txs if forcing.
2065 [ + + + + ]: 143 : if (!force && wtx.nTimeReceived > m_best_block_time - 5 * 60) continue;
2066 [ + - ]: 142 : to_submit.insert(&wtx);
2067 : : }
2068 : : // Now try submitting the transactions to the memory pool and (optionally) relay them.
2069 [ + + ]: 1495 : for (auto wtx : to_submit) {
2070 [ + - ]: 142 : std::string unused_err_string;
2071 [ + - + + ]: 142 : if (SubmitTxMemoryPoolAndRelay(*wtx, unused_err_string, relay)) ++submitted_tx_count;
2072 : 142 : }
2073 [ + - ]: 1353 : } // cs_wallet
2074 : :
2075 [ + + ]: 1353 : if (submitted_tx_count > 0) {
2076 : 59 : WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count);
2077 : : }
2078 : : }
2079 : :
2080 : : /** @} */ // end of mapWallet
2081 : :
2082 : 123 : void MaybeResendWalletTxs(WalletContext& context)
2083 : : {
2084 [ + + ]: 262 : for (const std::shared_ptr<CWallet>& pwallet : GetWallets(context)) {
2085 [ + - + + ]: 139 : if (!pwallet->ShouldResend()) continue;
2086 [ + - ]: 3 : pwallet->ResubmitWalletTransactions(/*relay=*/true, /*force=*/false);
2087 [ + - ]: 139 : pwallet->SetNextResend();
2088 : : }
2089 : 123 : }
2090 : :
2091 : :
2092 : 2524 : bool CWallet::SignTransaction(CMutableTransaction& tx) const
2093 : : {
2094 : 2524 : AssertLockHeld(cs_wallet);
2095 : :
2096 : : // Build coins map
2097 : 2524 : std::map<COutPoint, Coin> coins;
2098 [ + + ]: 11226 : for (auto& input : tx.vin) {
2099 [ + - ]: 8702 : const auto mi = mapWallet.find(input.prevout.hash);
2100 [ + - - + : 11226 : if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) {
+ - ]
2101 : : return false;
2102 : : }
2103 [ + + ]: 8702 : const CWalletTx& wtx = mi->second;
2104 [ + + ]: 8702 : int prev_height = wtx.state<TxStateConfirmed>() ? wtx.state<TxStateConfirmed>()->confirmed_block_height : 0;
2105 [ + - ]: 8702 : coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], prev_height, wtx.IsCoinBase());
2106 : : }
2107 [ + - ]: 2524 : std::map<int, bilingual_str> input_errors;
2108 [ + - ]: 2524 : return SignTransaction(tx, coins, SIGHASH_DEFAULT, input_errors);
2109 : 5048 : }
2110 : :
2111 : 2847 : bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const
2112 : : {
2113 : : // Try to sign with all ScriptPubKeyMans
2114 [ + + ]: 16093 : for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2115 : : // spk_man->SignTransaction will return true if the transaction is complete,
2116 : : // so we can exit early and return true if that happens
2117 [ + - + + ]: 16083 : if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) {
2118 : 2837 : return true;
2119 : : }
2120 : : }
2121 : :
2122 : : // At this point, one input was not fully signed otherwise we would have exited already
2123 : 10 : return false;
2124 : : }
2125 : :
2126 : 987 : std::optional<PSBTError> CWallet::FillPSBT(PartiallySignedTransaction& psbtx, bool& complete, std::optional<int> sighash_type, bool sign, bool bip32derivs, size_t * n_signed, bool finalize) const
2127 : : {
2128 [ - + ]: 987 : if (n_signed) {
2129 : 0 : *n_signed = 0;
2130 : : }
2131 : 987 : LOCK(cs_wallet);
2132 : : // Get all of the previous transactions
2133 [ - + + + ]: 4401 : for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
2134 [ + - ]: 3414 : const CTxIn& txin = psbtx.tx->vin[i];
2135 [ + - ]: 3414 : PSBTInput& input = psbtx.inputs.at(i);
2136 : :
2137 [ + - + + ]: 3414 : if (PSBTInputSigned(input)) {
2138 : 18 : continue;
2139 : : }
2140 : :
2141 : : // If we have no utxo, grab it from the wallet.
2142 [ + + ]: 3396 : if (!input.non_witness_utxo) {
2143 : 2030 : const Txid& txhash = txin.prevout.hash;
2144 [ + - ]: 2030 : const auto it = mapWallet.find(txhash);
2145 [ + + ]: 5144 : if (it != mapWallet.end()) {
2146 : 1730 : const CWalletTx& wtx = it->second;
2147 : : // We only need the non_witness_utxo, which is a superset of the witness_utxo.
2148 : : // The signing code will switch to the smaller witness_utxo if this is ok.
2149 : 1730 : input.non_witness_utxo = wtx.tx;
2150 : : }
2151 : : }
2152 : : }
2153 : :
2154 [ + - ]: 987 : const PrecomputedTransactionData txdata = PrecomputePSBTData(psbtx);
2155 : :
2156 : : // Fill in information from ScriptPubKeyMans
2157 [ + - + + ]: 7566 : for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2158 : 6588 : int n_signed_this_spkm = 0;
2159 [ + - ]: 6588 : const auto error{spk_man->FillPSBT(psbtx, txdata, sighash_type, sign, bip32derivs, &n_signed_this_spkm, finalize)};
2160 [ + + ]: 6588 : if (error) {
2161 : 9 : return error;
2162 : : }
2163 : :
2164 [ - + ]: 6579 : if (n_signed) {
2165 : 0 : (*n_signed) += n_signed_this_spkm;
2166 : : }
2167 : 9 : }
2168 : :
2169 [ + - ]: 978 : RemoveUnnecessaryTransactions(psbtx);
2170 : :
2171 : : // Complete if every input is now signed
2172 : 978 : complete = true;
2173 [ - + + + ]: 4382 : for (size_t i = 0; i < psbtx.inputs.size(); ++i) {
2174 [ + - + - ]: 3404 : complete &= PSBTInputSignedAndVerified(psbtx, i, &txdata);
2175 : : }
2176 : :
2177 : 978 : return {};
2178 [ + - ]: 1974 : }
2179 : :
2180 : 9 : SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const
2181 : : {
2182 : 9 : SignatureData sigdata;
2183 [ + - ]: 9 : CScript script_pub_key = GetScriptForDestination(pkhash);
2184 [ + - ]: 34 : for (const auto& spk_man_pair : m_spk_managers) {
2185 [ + - + + ]: 34 : if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
2186 [ + - ]: 9 : LOCK(cs_wallet); // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
2187 [ + - + - ]: 9 : return spk_man_pair.second->SignMessage(message, pkhash, str_sig);
2188 : 9 : }
2189 : : }
2190 : : return SigningResult::PRIVATE_KEY_NOT_AVAILABLE;
2191 : 9 : }
2192 : :
2193 : 3516 : OutputType CWallet::TransactionChangeType(const std::optional<OutputType>& change_type, const std::vector<CRecipient>& vecSend) const
2194 : : {
2195 : : // If -changetype is specified, always use that change type.
2196 [ + + ]: 3516 : if (change_type) {
2197 : 297 : return *change_type;
2198 : : }
2199 : :
2200 : : // if m_default_address_type is legacy, use legacy address as change.
2201 [ + + ]: 3219 : if (m_default_address_type == OutputType::LEGACY) {
2202 : : return OutputType::LEGACY;
2203 : : }
2204 : :
2205 : 3193 : bool any_tr{false};
2206 : 3193 : bool any_wpkh{false};
2207 : 3193 : bool any_sh{false};
2208 : 3193 : bool any_pkh{false};
2209 : :
2210 [ + + ]: 42895 : for (const auto& recipient : vecSend) {
2211 [ + - ]: 39702 : if (std::get_if<WitnessV1Taproot>(&recipient.dest)) {
2212 : : any_tr = true;
2213 [ + - ]: 39421 : } else if (std::get_if<WitnessV0KeyHash>(&recipient.dest)) {
2214 : : any_wpkh = true;
2215 [ + - ]: 46821 : } else if (std::get_if<ScriptHash>(&recipient.dest)) {
2216 : : any_sh = true;
2217 [ + - ]: 45762 : } else if (std::get_if<PKHash>(&recipient.dest)) {
2218 : 5937 : any_pkh = true;
2219 : : }
2220 : : }
2221 : :
2222 : 3193 : const bool has_bech32m_spkman(GetScriptPubKeyMan(OutputType::BECH32M, /*internal=*/true));
2223 [ + + ]: 3193 : if (has_bech32m_spkman && any_tr) {
2224 : : // Currently tr is the only type supported by the BECH32M spkman
2225 : : return OutputType::BECH32M;
2226 : : }
2227 : 2916 : const bool has_bech32_spkman(GetScriptPubKeyMan(OutputType::BECH32, /*internal=*/true));
2228 [ + + ]: 2916 : if (has_bech32_spkman && any_wpkh) {
2229 : : // Currently wpkh is the only type supported by the BECH32 spkman
2230 : : return OutputType::BECH32;
2231 : : }
2232 : 353 : const bool has_p2sh_segwit_spkman(GetScriptPubKeyMan(OutputType::P2SH_SEGWIT, /*internal=*/true));
2233 [ + + ]: 353 : if (has_p2sh_segwit_spkman && any_sh) {
2234 : : // Currently sh_wpkh is the only type supported by the P2SH_SEGWIT spkman
2235 : : // As of 2021 about 80% of all SH are wrapping WPKH, so use that
2236 : : return OutputType::P2SH_SEGWIT;
2237 : : }
2238 : 308 : const bool has_legacy_spkman(GetScriptPubKeyMan(OutputType::LEGACY, /*internal=*/true));
2239 [ + + ]: 308 : if (has_legacy_spkman && any_pkh) {
2240 : : // Currently pkh is the only type supported by the LEGACY spkman
2241 : : return OutputType::LEGACY;
2242 : : }
2243 : :
2244 [ + + ]: 263 : if (has_bech32m_spkman) {
2245 : : return OutputType::BECH32M;
2246 : : }
2247 [ + + ]: 32 : if (has_bech32_spkman) {
2248 : : return OutputType::BECH32;
2249 : : }
2250 : : // else use m_default_address_type for change
2251 : 18 : return m_default_address_type;
2252 : : }
2253 : :
2254 : 1502 : void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm)
2255 : : {
2256 : 1502 : LOCK(cs_wallet);
2257 [ + - + - : 3004 : WalletLogPrintf("CommitTransaction:\n%s\n", util::RemoveSuffixView(tx->ToString(), "\n"));
+ - ]
2258 : :
2259 : : // Add tx to wallet, because if it has change it's also ours,
2260 : : // otherwise just for transaction history.
2261 [ + - + - : 4506 : CWalletTx* wtx = AddToWallet(tx, TxStateInactive{}, [&](CWalletTx& wtx, bool new_tx) {
+ - ]
2262 : 1502 : CHECK_NONFATAL(wtx.mapValue.empty());
2263 : 1502 : CHECK_NONFATAL(wtx.vOrderForm.empty());
2264 : 1502 : wtx.mapValue = std::move(mapValue);
2265 : 1502 : wtx.vOrderForm = std::move(orderForm);
2266 : 1502 : return true;
2267 : : });
2268 : :
2269 : : // wtx can only be null if the db write failed.
2270 [ - + ]: 1502 : if (!wtx) {
2271 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Wallet db error, transaction commit failed");
2272 : : }
2273 : :
2274 : : // Notify that old coins are spent
2275 [ + + ]: 5332 : for (const CTxIn& txin : tx->vin) {
2276 [ + - ]: 3830 : CWalletTx &coin = mapWallet.at(txin.prevout.hash);
2277 : 3830 : coin.MarkDirty();
2278 [ + - ]: 3830 : NotifyTransactionChanged(coin.GetHash(), CT_UPDATED);
2279 : : }
2280 : :
2281 [ + + ]: 1502 : if (!fBroadcastTransactions) {
2282 : : // Don't submit tx to the mempool
2283 [ + - ]: 7 : return;
2284 : : }
2285 : :
2286 [ + - ]: 1495 : std::string err_string;
2287 [ + - + + ]: 1495 : if (!SubmitTxMemoryPoolAndRelay(*wtx, err_string, true)) {
2288 [ + - ]: 3 : WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string);
2289 : : // TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure.
2290 : : }
2291 [ + - ]: 2997 : }
2292 : :
2293 : 889 : DBErrors CWallet::LoadWallet()
2294 : : {
2295 : 889 : LOCK(cs_wallet);
2296 : :
2297 [ + - ]: 889 : Assert(m_spk_managers.empty());
2298 [ + - ]: 889 : Assert(m_wallet_flags == 0);
2299 [ + - + - ]: 889 : DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this);
2300 [ - + ]: 889 : if (nLoadWalletRet == DBErrors::NEED_REWRITE)
2301 : : {
2302 [ # # # # ]: 0 : if (GetDatabase().Rewrite())
2303 : : {
2304 [ # # ]: 0 : for (const auto& spk_man_pair : m_spk_managers) {
2305 [ # # ]: 0 : spk_man_pair.second->RewriteDB();
2306 : : }
2307 : : }
2308 : : }
2309 : :
2310 [ + + ]: 889 : if (m_spk_managers.empty()) {
2311 [ - + ]: 560 : assert(m_external_spk_managers.empty());
2312 [ - + ]: 560 : assert(m_internal_spk_managers.empty());
2313 : : }
2314 : :
2315 [ + - ]: 889 : return nLoadWalletRet;
2316 : 889 : }
2317 : :
2318 : 9 : util::Result<void> CWallet::RemoveTxs(std::vector<Txid>& txs_to_remove)
2319 : : {
2320 : 9 : AssertLockHeld(cs_wallet);
2321 [ + - ]: 9 : bilingual_str str_err; // future: make RunWithinTxn return a util::Result
2322 [ + - + - ]: 9 : bool was_txn_committed = RunWithinTxn(GetDatabase(), /*process_desc=*/"remove transactions", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
2323 : 9 : util::Result<void> result{RemoveTxs(batch, txs_to_remove)};
2324 [ + + + - ]: 10 : if (!result) str_err = util::ErrorString(result);
2325 : 9 : return result.has_value();
2326 : 9 : });
2327 [ + + + - ]: 11 : if (!str_err.empty()) return util::Error{str_err};
2328 [ - + - - ]: 8 : if (!was_txn_committed) return util::Error{_("Error starting/committing db txn for wallet transactions removal process")};
2329 : 8 : return {}; // all good
2330 : 9 : }
2331 : :
2332 : 15 : util::Result<void> CWallet::RemoveTxs(WalletBatch& batch, std::vector<Txid>& txs_to_remove)
2333 : : {
2334 : 15 : AssertLockHeld(cs_wallet);
2335 [ - + ]: 15 : if (!batch.HasActiveTxn()) return util::Error{strprintf(_("The transactions removal process can only be executed within a db txn"))};
2336 : :
2337 : : // Check for transaction existence and remove entries from disk
2338 : 15 : std::vector<decltype(mapWallet)::const_iterator> erased_txs;
2339 : 15 : bilingual_str str_err;
2340 [ + + ]: 34 : for (const Txid& hash : txs_to_remove) {
2341 [ + - ]: 20 : auto it_wtx = mapWallet.find(hash);
2342 [ + + ]: 20 : if (it_wtx == mapWallet.end()) {
2343 [ + - + - ]: 3 : return util::Error{strprintf(_("Transaction %s does not belong to this wallet"), hash.GetHex())};
2344 : : }
2345 [ + - - + ]: 19 : if (!batch.EraseTx(hash)) {
2346 [ # # # # ]: 0 : return util::Error{strprintf(_("Failure removing transaction: %s"), hash.GetHex())};
2347 : : }
2348 [ + - ]: 19 : erased_txs.emplace_back(it_wtx);
2349 : : }
2350 : :
2351 : : // Register callback to update the memory state only when the db txn is actually dumped to disk
2352 [ + - + - : 84 : batch.RegisterTxnListener({.on_commit=[&, erased_txs]() EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
+ - ]
2353 : : // Update the in-memory state and notify upper layers about the removals
2354 [ + + ]: 33 : for (const auto& it : erased_txs) {
2355 : 19 : const Txid hash{it->first};
2356 : 19 : wtxOrdered.erase(it->second.m_it_wtxOrdered);
2357 [ + + ]: 38 : for (const auto& txin : it->second.tx->vin)
2358 : 19 : mapTxSpends.erase(txin.prevout);
2359 [ - + + + ]: 49 : for (unsigned int i = 0; i < it->second.tx->vout.size(); ++i) {
2360 : 30 : m_txos.erase(COutPoint(hash, i));
2361 : : }
2362 : 19 : mapWallet.erase(it);
2363 : 19 : NotifyTransactionChanged(hash, CT_DELETED);
2364 : : }
2365 : :
2366 : 14 : MarkDirty();
2367 : 14 : }, .on_abort={}});
2368 : :
2369 : 14 : return {};
2370 [ + - + - ]: 29 : }
2371 : :
2372 : 29138 : bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& new_purpose)
2373 : : {
2374 : 29138 : bool fUpdated = false;
2375 : 29138 : bool is_mine;
2376 : 29138 : std::optional<AddressPurpose> purpose;
2377 : 29138 : {
2378 : 29138 : LOCK(cs_wallet);
2379 : 29138 : std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address);
2380 [ + + - + ]: 29138 : fUpdated = mi != m_address_book.end() && !mi->second.IsChange();
2381 : :
2382 [ + + + - ]: 29138 : CAddressBookData& record = mi != m_address_book.end() ? mi->second : m_address_book[address];
2383 [ - + ]: 58276 : record.SetLabel(strName);
2384 [ + - ]: 29138 : is_mine = IsMine(address);
2385 [ + - ]: 29138 : if (new_purpose) { /* update purpose only if requested */
2386 : 29138 : record.purpose = new_purpose;
2387 : : }
2388 [ + - ]: 29138 : purpose = record.purpose;
2389 : 0 : }
2390 : :
2391 : 29138 : const std::string& encoded_dest = EncodeDestination(address);
2392 [ + - + - : 58276 : if (new_purpose && !batch.WritePurpose(encoded_dest, PurposeToString(*new_purpose))) {
+ - - + -
+ ]
2393 [ # # ]: 0 : WalletLogPrintf("Error: fail to write address book 'purpose' entry\n");
2394 : : return false;
2395 : : }
2396 [ + - - + ]: 29138 : if (!batch.WriteName(encoded_dest, strName)) {
2397 [ # # ]: 0 : WalletLogPrintf("Error: fail to write address book 'name' entry\n");
2398 : : return false;
2399 : : }
2400 : :
2401 : : // In very old wallets, address purpose may not be recorded so we derive it from IsMine
2402 [ + + + - ]: 58276 : NotifyAddressBookChanged(address, strName, is_mine,
2403 [ + + + - ]: 29139 : purpose.value_or(is_mine ? AddressPurpose::RECEIVE : AddressPurpose::SEND),
2404 : : (fUpdated ? CT_UPDATED : CT_NEW));
2405 : : return true;
2406 : 29138 : }
2407 : :
2408 : 29138 : bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& purpose)
2409 : : {
2410 : 29138 : WalletBatch batch(GetDatabase());
2411 [ + - ]: 29138 : return SetAddressBookWithDB(batch, address, strName, purpose);
2412 : 29138 : }
2413 : :
2414 : 0 : bool CWallet::DelAddressBook(const CTxDestination& address)
2415 : : {
2416 [ # # ]: 0 : return RunWithinTxn(GetDatabase(), /*process_desc=*/"address book entry removal", [&](WalletBatch& batch){
2417 : 0 : return DelAddressBookWithDB(batch, address);
2418 : 0 : });
2419 : : }
2420 : :
2421 : 26 : bool CWallet::DelAddressBookWithDB(WalletBatch& batch, const CTxDestination& address)
2422 : : {
2423 : 26 : const std::string& dest = EncodeDestination(address);
2424 : 26 : {
2425 [ + - ]: 26 : LOCK(cs_wallet);
2426 : : // If we want to delete receiving addresses, we should avoid calling EraseAddressData because it will delete the previously_spent value. Could instead just erase the label so it becomes a change address, and keep the data.
2427 : : // NOTE: This isn't a problem for sending addresses because they don't have any data that needs to be kept.
2428 : : // When adding new address data, it should be considered here whether to retain or delete it.
2429 [ + - - + ]: 26 : if (IsMine(address)) {
2430 [ # # ]: 0 : WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, CLIENT_BUGREPORT);
2431 : : return false;
2432 : : }
2433 : : // Delete data rows associated with this address
2434 [ + - - + ]: 26 : if (!batch.EraseAddressData(address)) {
2435 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry data\n");
2436 : : return false;
2437 : : }
2438 : :
2439 : : // Delete purpose entry
2440 [ + - - + ]: 26 : if (!batch.ErasePurpose(dest)) {
2441 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry purpose\n");
2442 : : return false;
2443 : : }
2444 : :
2445 : : // Delete name entry
2446 [ + - - + ]: 26 : if (!batch.EraseName(dest)) {
2447 [ # # ]: 0 : WalletLogPrintf("Error: cannot erase address book entry name\n");
2448 : : return false;
2449 : : }
2450 : :
2451 : : // finally, remove it from the map
2452 [ + - ]: 26 : m_address_book.erase(address);
2453 : 0 : }
2454 : :
2455 : : // All good, signal changes
2456 [ + - + - ]: 26 : NotifyAddressBookChanged(address, "", /*is_mine=*/false, AddressPurpose::SEND, CT_DELETED);
2457 : 26 : return true;
2458 : 26 : }
2459 : :
2460 : 426 : size_t CWallet::KeypoolCountExternalKeys() const
2461 : : {
2462 : 426 : AssertLockHeld(cs_wallet);
2463 : :
2464 : 426 : unsigned int count = 0;
2465 [ + + ]: 1781 : for (auto spk_man : m_external_spk_managers) {
2466 : 1355 : count += spk_man.second->GetKeyPoolSize();
2467 : : }
2468 : :
2469 : 426 : return count;
2470 : : }
2471 : :
2472 : 1308 : unsigned int CWallet::GetKeyPoolSize() const
2473 : : {
2474 : 1308 : AssertLockHeld(cs_wallet);
2475 : :
2476 : 1308 : unsigned int count = 0;
2477 [ + + ]: 8698 : for (auto spk_man : GetActiveScriptPubKeyMans()) {
2478 [ + - ]: 7390 : count += spk_man->GetKeyPoolSize();
2479 : : }
2480 : 1308 : return count;
2481 : : }
2482 : :
2483 : 925 : bool CWallet::TopUpKeyPool(unsigned int kpSize)
2484 : : {
2485 : 925 : LOCK(cs_wallet);
2486 : 925 : bool res = true;
2487 [ + - + + ]: 5905 : for (auto spk_man : GetActiveScriptPubKeyMans()) {
2488 [ + - ]: 4980 : res &= spk_man->TopUp(kpSize);
2489 : : }
2490 [ + - ]: 925 : return res;
2491 : 925 : }
2492 : :
2493 : 17088 : util::Result<CTxDestination> CWallet::GetNewDestination(const OutputType type, const std::string label)
2494 : : {
2495 : 17088 : LOCK(cs_wallet);
2496 [ + - ]: 17088 : auto spk_man = GetScriptPubKeyMan(type, /*internal=*/false);
2497 [ + + ]: 17088 : if (!spk_man) {
2498 [ + - + - ]: 6 : return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2499 : : }
2500 : :
2501 [ + - ]: 17086 : auto op_dest = spk_man->GetNewDestination(type);
2502 [ + + ]: 17086 : if (op_dest) {
2503 [ + - ]: 17082 : SetAddressBook(*op_dest, label, AddressPurpose::RECEIVE);
2504 : : }
2505 : :
2506 : 17086 : return op_dest;
2507 : 34174 : }
2508 : :
2509 : 237 : util::Result<CTxDestination> CWallet::GetNewChangeDestination(const OutputType type)
2510 : : {
2511 : 237 : LOCK(cs_wallet);
2512 : :
2513 [ + - ]: 237 : ReserveDestination reservedest(this, type);
2514 [ + - ]: 237 : auto op_dest = reservedest.GetReservedDestination(true);
2515 [ + + + - ]: 237 : if (op_dest) reservedest.KeepDestination();
2516 : :
2517 : 237 : return op_dest;
2518 [ + - ]: 474 : }
2519 : :
2520 : 856 : void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) {
2521 [ + + + + ]: 254032 : for (auto& entry : mapWallet) {
2522 : 253176 : CWalletTx& wtx = entry.second;
2523 [ + + ]: 253176 : if (wtx.m_is_cache_empty) continue;
2524 [ - + + + ]: 183 : for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
2525 : 120 : CTxDestination dst;
2526 [ + - + + : 120 : if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.count(dst)) {
+ + ]
2527 : 2 : wtx.MarkDirty();
2528 : 2 : break;
2529 : : }
2530 : 120 : }
2531 : : }
2532 : 856 : }
2533 : :
2534 : 124 : void CWallet::ForEachAddrBookEntry(const ListAddrBookFunc& func) const
2535 : : {
2536 : 124 : AssertLockHeld(cs_wallet);
2537 [ + + ]: 1453 : for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book) {
2538 : 1329 : const auto& entry = item.second;
2539 [ + - ]: 2658 : func(item.first, entry.GetLabel(), entry.IsChange(), entry.purpose);
2540 : : }
2541 : 124 : }
2542 : :
2543 : 24 : std::vector<CTxDestination> CWallet::ListAddrBookAddresses(const std::optional<AddrBookFilter>& _filter) const
2544 : : {
2545 : 24 : AssertLockHeld(cs_wallet);
2546 : 24 : std::vector<CTxDestination> result;
2547 [ + - + - ]: 24 : AddrBookFilter filter = _filter ? *_filter : AddrBookFilter();
2548 [ + - ]: 24 : ForEachAddrBookEntry([&result, &filter](const CTxDestination& dest, const std::string& label, bool is_change, const std::optional<AddressPurpose>& purpose) {
2549 : : // Filter by change
2550 [ + - + - ]: 196 : if (filter.ignore_change && is_change) return;
2551 : : // Filter by label
2552 [ + - + + ]: 196 : if (filter.m_op_label && *filter.m_op_label != label) return;
2553 : : // All good
2554 : 40 : result.emplace_back(dest);
2555 : : });
2556 : 24 : return result;
2557 : 24 : }
2558 : :
2559 : 38 : std::set<std::string> CWallet::ListAddrBookLabels(const std::optional<AddressPurpose> purpose) const
2560 : : {
2561 : 38 : AssertLockHeld(cs_wallet);
2562 [ + - ]: 38 : std::set<std::string> label_set;
2563 [ + - ]: 38 : ForEachAddrBookEntry([&](const CTxDestination& _dest, const std::string& _label,
2564 : : bool _is_change, const std::optional<AddressPurpose>& _purpose) {
2565 [ + - ]: 489 : if (_is_change) return;
2566 [ + + + - ]: 489 : if (!purpose || purpose == _purpose) {
2567 : 478 : label_set.insert(_label);
2568 : : }
2569 : : });
2570 : 38 : return label_set;
2571 : 0 : }
2572 : :
2573 : 2000 : util::Result<CTxDestination> ReserveDestination::GetReservedDestination(bool internal)
2574 : : {
2575 : 2000 : m_spk_man = pwallet->GetScriptPubKeyMan(type, internal);
2576 [ + + ]: 2000 : if (!m_spk_man) {
2577 : 24 : return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2578 : : }
2579 : :
2580 [ + - ]: 1988 : if (nIndex == -1) {
2581 : 1988 : int64_t index;
2582 : 1988 : auto op_address = m_spk_man->GetReservedDestination(type, internal, index);
2583 [ + + ]: 1988 : if (!op_address) return op_address;
2584 : 1984 : nIndex = index;
2585 [ + - ]: 3968 : address = *op_address;
2586 : 1988 : }
2587 : 1984 : return address;
2588 : : }
2589 : :
2590 : 3648 : void ReserveDestination::KeepDestination()
2591 : : {
2592 [ + + ]: 3648 : if (nIndex != -1) {
2593 : 1888 : m_spk_man->KeepDestination(nIndex, type);
2594 : : }
2595 : 3648 : nIndex = -1;
2596 : 3648 : address = CNoDestination();
2597 : 3648 : }
2598 : :
2599 : 3753 : void ReserveDestination::ReturnDestination()
2600 : : {
2601 [ + + ]: 3753 : if (nIndex != -1) {
2602 : 96 : m_spk_man->ReturnDestination(nIndex, fInternal, address);
2603 : : }
2604 : 3753 : nIndex = -1;
2605 : 3753 : address = CNoDestination();
2606 : 3753 : }
2607 : :
2608 : 5 : util::Result<void> CWallet::DisplayAddress(const CTxDestination& dest)
2609 : : {
2610 : 5 : CScript scriptPubKey = GetScriptForDestination(dest);
2611 [ + - + - ]: 5 : for (const auto& spk_man : GetScriptPubKeyMans(scriptPubKey)) {
2612 [ + - ]: 5 : auto signer_spk_man = dynamic_cast<ExternalSignerScriptPubKeyMan *>(spk_man);
2613 [ - + ]: 5 : if (signer_spk_man == nullptr) {
2614 : 0 : continue;
2615 : : }
2616 [ + + ]: 5 : auto signer{ExternalSignerScriptPubKeyMan::GetExternalSigner()};
2617 [ - + - - : 4 : if (!signer) throw std::runtime_error(util::ErrorString(signer).original);
- - ]
2618 [ + - ]: 4 : return signer_spk_man->DisplayAddress(dest, *signer);
2619 : 5 : }
2620 [ # # ]: 0 : return util::Error{_("There is no ScriptPubKeyManager for this address")};
2621 : 4 : }
2622 : :
2623 : 78 : void CWallet::LoadLockedCoin(const COutPoint& coin, bool persistent)
2624 : : {
2625 : 78 : AssertLockHeld(cs_wallet);
2626 : 78 : m_locked_coins.emplace(coin, persistent);
2627 : 78 : }
2628 : :
2629 : 76 : bool CWallet::LockCoin(const COutPoint& output, bool persist)
2630 : : {
2631 : 76 : AssertLockHeld(cs_wallet);
2632 : 76 : LoadLockedCoin(output, persist);
2633 [ + + ]: 76 : if (persist) {
2634 : 1 : WalletBatch batch(GetDatabase());
2635 [ + - ]: 1 : return batch.WriteLockedUTXO(output);
2636 : 1 : }
2637 : : return true;
2638 : : }
2639 : :
2640 : 12973 : bool CWallet::UnlockCoin(const COutPoint& output)
2641 : : {
2642 : 12973 : AssertLockHeld(cs_wallet);
2643 : 12973 : auto locked_coin_it = m_locked_coins.find(output);
2644 [ + + ]: 12973 : if (locked_coin_it != m_locked_coins.end()) {
2645 : 10 : bool persisted = locked_coin_it->second;
2646 : 10 : m_locked_coins.erase(locked_coin_it);
2647 [ + + ]: 10 : if (persisted) {
2648 : 1 : WalletBatch batch(GetDatabase());
2649 [ + - ]: 1 : return batch.EraseLockedUTXO(output);
2650 : 1 : }
2651 : : }
2652 : : return true;
2653 : : }
2654 : :
2655 : 4 : bool CWallet::UnlockAllCoins()
2656 : : {
2657 : 4 : AssertLockHeld(cs_wallet);
2658 : 4 : bool success = true;
2659 : 4 : WalletBatch batch(GetDatabase());
2660 [ - + + + ]: 52 : for (const auto& [coin, persistent] : m_locked_coins) {
2661 [ - + - - : 48 : if (persistent) success = success && batch.EraseLockedUTXO(coin);
- - - - ]
2662 : : }
2663 : 4 : m_locked_coins.clear();
2664 : 4 : return success;
2665 : 4 : }
2666 : :
2667 : 463272 : bool CWallet::IsLockedCoin(const COutPoint& output) const
2668 : : {
2669 : 463272 : AssertLockHeld(cs_wallet);
2670 : 463272 : return m_locked_coins.count(output) > 0;
2671 : : }
2672 : :
2673 : 9 : void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const
2674 : : {
2675 : 9 : AssertLockHeld(cs_wallet);
2676 [ + + ]: 13 : for (const auto& [coin, _] : m_locked_coins) {
2677 : 4 : vOutpts.push_back(coin);
2678 : : }
2679 : 9 : }
2680 : :
2681 : : /**
2682 : : * Compute smart timestamp for a transaction being added to the wallet.
2683 : : *
2684 : : * Logic:
2685 : : * - If sending a transaction, assign its timestamp to the current time.
2686 : : * - If receiving a transaction outside a block, assign its timestamp to the
2687 : : * current time.
2688 : : * - If receiving a transaction during a rescanning process, assign all its
2689 : : * (not already known) transactions' timestamps to the block time.
2690 : : * - If receiving a block with a future timestamp, assign all its (not already
2691 : : * known) transactions' timestamps to the current time.
2692 : : * - If receiving a block with a past timestamp, before the most recent known
2693 : : * transaction (that we care about), assign all its (not already known)
2694 : : * transactions' timestamps to the same timestamp as that most-recent-known
2695 : : * transaction.
2696 : : * - If receiving a block with a past timestamp, but after the most recent known
2697 : : * transaction, assign all its (not already known) transactions' timestamps to
2698 : : * the block time.
2699 : : *
2700 : : * For more information see CWalletTx::nTimeSmart,
2701 : : * https://bitcointalk.org/?topic=54527, or
2702 : : * https://github.com/bitcoin/bitcoin/pull/1393.
2703 : : */
2704 : 18556 : unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const
2705 : : {
2706 : 18556 : std::optional<uint256> block_hash;
2707 [ + + ]: 18556 : if (auto* conf = wtx.state<TxStateConfirmed>()) {
2708 : 15171 : block_hash = conf->confirmed_block_hash;
2709 [ - + ]: 3385 : } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
2710 : 0 : block_hash = conf->conflicting_block_hash;
2711 : : }
2712 : :
2713 : 18556 : unsigned int nTimeSmart = wtx.nTimeReceived;
2714 [ + + ]: 18556 : if (block_hash) {
2715 : 15171 : int64_t blocktime;
2716 : 15171 : int64_t block_max_time;
2717 [ + - ]: 15171 : if (chain().findBlock(*block_hash, FoundBlock().time(blocktime).maxTime(block_max_time))) {
2718 [ + + ]: 15171 : if (rescanning_old_block) {
2719 : 4274 : nTimeSmart = block_max_time;
2720 : : } else {
2721 : 10897 : int64_t latestNow = wtx.nTimeReceived;
2722 : 10897 : int64_t latestEntry = 0;
2723 : :
2724 : : // Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future
2725 : 10897 : int64_t latestTolerated = latestNow + 300;
2726 : 10897 : const TxItems& txOrdered = wtxOrdered;
2727 [ + + ]: 21796 : for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) {
2728 : 21668 : CWalletTx* const pwtx = it->second;
2729 [ + + ]: 21668 : if (pwtx == &wtx) {
2730 : 10897 : continue;
2731 : : }
2732 : 10771 : int64_t nSmartTime;
2733 : 10771 : nSmartTime = pwtx->nTimeSmart;
2734 [ - + ]: 10771 : if (!nSmartTime) {
2735 : 0 : nSmartTime = pwtx->nTimeReceived;
2736 : : }
2737 [ + + ]: 10771 : if (nSmartTime <= latestTolerated) {
2738 : 10769 : latestEntry = nSmartTime;
2739 [ + + ]: 10769 : if (nSmartTime > latestNow) {
2740 : 1 : latestNow = nSmartTime;
2741 : : }
2742 : : break;
2743 : : }
2744 : : }
2745 : :
2746 [ + + + + ]: 12019 : nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow));
2747 : : }
2748 : : } else {
2749 [ # # # # ]: 0 : WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), block_hash->ToString());
2750 : : }
2751 : : }
2752 : 18556 : return nTimeSmart;
2753 : : }
2754 : :
2755 : 19 : bool CWallet::SetAddressPreviouslySpent(WalletBatch& batch, const CTxDestination& dest, bool used)
2756 : : {
2757 [ + - ]: 19 : if (std::get_if<CNoDestination>(&dest))
2758 : : return false;
2759 : :
2760 [ - + ]: 19 : if (!used) {
2761 [ # # ]: 0 : if (auto* data{common::FindKey(m_address_book, dest)}) data->previously_spent = false;
2762 : 0 : return batch.WriteAddressPreviouslySpent(dest, false);
2763 : : }
2764 : :
2765 : 19 : LoadAddressPreviouslySpent(dest);
2766 : 19 : return batch.WriteAddressPreviouslySpent(dest, true);
2767 : : }
2768 : :
2769 : 26 : void CWallet::LoadAddressPreviouslySpent(const CTxDestination& dest)
2770 : : {
2771 : 26 : m_address_book[dest].previously_spent = true;
2772 : 26 : }
2773 : :
2774 : 3 : void CWallet::LoadAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& request)
2775 : : {
2776 : 3 : m_address_book[dest].receive_requests[id] = request;
2777 : 3 : }
2778 : :
2779 : 1652 : bool CWallet::IsAddressPreviouslySpent(const CTxDestination& dest) const
2780 : : {
2781 [ + + ]: 1652 : if (auto* data{common::FindKey(m_address_book, dest)}) return data->previously_spent;
2782 : : return false;
2783 : : }
2784 : :
2785 : 2 : std::vector<std::string> CWallet::GetAddressReceiveRequests() const
2786 : : {
2787 : 2 : std::vector<std::string> values;
2788 [ + + ]: 5 : for (const auto& [dest, entry] : m_address_book) {
2789 [ + - + + ]: 6 : for (const auto& [id, request] : entry.receive_requests) {
2790 [ + - ]: 3 : values.emplace_back(request);
2791 : : }
2792 : : }
2793 : 2 : return values;
2794 : 0 : }
2795 : :
2796 : 4 : bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value)
2797 : : {
2798 [ + - ]: 4 : if (!batch.WriteAddressReceiveRequest(dest, id, value)) return false;
2799 : 4 : m_address_book[dest].receive_requests[id] = value;
2800 : 4 : return true;
2801 : : }
2802 : :
2803 : 1 : bool CWallet::EraseAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id)
2804 : : {
2805 [ + - ]: 1 : if (!batch.EraseAddressReceiveRequest(dest, id)) return false;
2806 : 1 : m_address_book[dest].receive_requests.erase(id);
2807 : 1 : return true;
2808 : : }
2809 : :
2810 : 1322 : static util::Result<fs::path> GetWalletPath(const std::string& name)
2811 : : {
2812 : : // Do some checking on wallet path. It should be either a:
2813 : : //
2814 : : // 1. Path where a directory can be created.
2815 : : // 2. Path to an existing directory.
2816 : : // 3. Path to a symlink to a directory.
2817 : : // 4. For backwards compatibility, the name of a data file in -walletdir.
2818 [ + - + - ]: 2644 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(name));
2819 [ + - ]: 1322 : fs::file_type path_type = fs::symlink_status(wallet_path).type();
2820 [ + + + + : 2648 : if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory ||
+ + + + ]
2821 [ + - + + ]: 16 : (path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) ||
2822 [ + - + - : 1328 : (path_type == fs::file_type::regular && fs::PathFromString(name).filename() == fs::PathFromString(name)))) {
+ - - + +
+ + + - -
- - ]
2823 [ + - + - ]: 8 : return util::Error{Untranslated(strprintf(
2824 : : "Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and "
2825 : : "database/log.?????????? files can be stored, a location where such a directory could be created, "
2826 : : "or (for backwards compatibility) the name of an existing data file in -walletdir (%s)",
2827 [ + - + - ]: 20 : name, fs::quoted(fs::PathToString(GetWalletDir()))))};
2828 : : }
2829 [ + - ]: 2636 : return wallet_path;
2830 : 1322 : }
2831 : :
2832 : 1280 : std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string)
2833 : : {
2834 : 1280 : const auto& wallet_path = GetWalletPath(name);
2835 [ + + ]: 1280 : if (!wallet_path) {
2836 [ + - ]: 4 : error_string = util::ErrorString(wallet_path);
2837 : 4 : status = DatabaseStatus::FAILED_BAD_PATH;
2838 : 4 : return nullptr;
2839 : : }
2840 [ + - ]: 1276 : return MakeDatabase(*wallet_path, options, status, error_string);
2841 : 1280 : }
2842 : :
2843 : 874 : std::shared_ptr<CWallet> CWallet::Create(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings)
2844 : : {
2845 : 874 : interfaces::Chain* chain = context.chain;
2846 : 874 : ArgsManager& args = *Assert(context.args);
2847 : 874 : const std::string& walletFile = database->Filename();
2848 : :
2849 : 874 : const auto start{SteadyClock::now()};
2850 : : // TODO: Can't use std::make_shared because we need a custom deleter but
2851 : : // should be possible to use std::allocate_shared.
2852 [ + - + - : 1748 : std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
+ - - - ]
2853 [ + - + - : 1745 : walletInstance->m_keypool_size = std::max(args.GetIntArg("-keypool", DEFAULT_KEYPOOL_SIZE), int64_t{1});
+ + ]
2854 [ + - + - : 874 : walletInstance->m_notify_tx_changed_script = args.GetArg("-walletnotify", "");
+ - ]
2855 : :
2856 : : // Load wallet
2857 : 874 : bool rescan_required = false;
2858 [ + - ]: 874 : DBErrors nLoadWalletRet = walletInstance->LoadWallet();
2859 [ + + ]: 874 : if (nLoadWalletRet != DBErrors::LOAD_OK) {
2860 [ - + ]: 2 : if (nLoadWalletRet == DBErrors::CORRUPT) {
2861 [ # # ]: 0 : error = strprintf(_("Error loading %s: Wallet corrupted"), walletFile);
2862 : 0 : return nullptr;
2863 : : }
2864 [ + + ]: 2 : else if (nLoadWalletRet == DBErrors::NONCRITICAL_ERROR)
2865 : : {
2866 [ + - ]: 3 : warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"
2867 : : " or address metadata may be missing or incorrect."),
2868 : : walletFile));
2869 : : }
2870 [ - + ]: 1 : else if (nLoadWalletRet == DBErrors::TOO_NEW) {
2871 [ # # ]: 0 : error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), walletFile, CLIENT_NAME);
2872 : 0 : return nullptr;
2873 : : }
2874 [ - + ]: 1 : else if (nLoadWalletRet == DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED) {
2875 [ # # ]: 0 : error = strprintf(_("Error loading %s: External signer wallet being loaded without external signer support compiled"), walletFile);
2876 : 0 : return nullptr;
2877 : : }
2878 [ - + ]: 1 : else if (nLoadWalletRet == DBErrors::NEED_REWRITE)
2879 : : {
2880 [ # # ]: 0 : error = strprintf(_("Wallet needed to be rewritten: restart %s to complete"), CLIENT_NAME);
2881 : 0 : return nullptr;
2882 [ - + ]: 1 : } else if (nLoadWalletRet == DBErrors::NEED_RESCAN) {
2883 [ # # ]: 0 : warnings.push_back(strprintf(_("Error reading %s! Transaction data may be missing or incorrect."
2884 : : " Rescanning wallet."), walletFile));
2885 : 0 : rescan_required = true;
2886 [ - + ]: 1 : } else if (nLoadWalletRet == DBErrors::UNKNOWN_DESCRIPTOR) {
2887 [ # # ]: 0 : error = strprintf(_("Unrecognized descriptor found. Loading wallet %s\n\n"
2888 : : "The wallet might have been created on a newer version.\n"
2889 : 0 : "Please try running the latest software version.\n"), walletFile);
2890 : 0 : return nullptr;
2891 [ + - ]: 1 : } else if (nLoadWalletRet == DBErrors::UNEXPECTED_LEGACY_ENTRY) {
2892 [ + - ]: 1 : error = strprintf(_("Unexpected legacy entry in descriptor wallet found. Loading wallet %s\n\n"
2893 : 1 : "The wallet might have been tampered with or created with malicious intent.\n"), walletFile);
2894 : 1 : return nullptr;
2895 [ # # ]: 0 : } else if (nLoadWalletRet == DBErrors::LEGACY_WALLET) {
2896 [ # # ]: 0 : error = strprintf(_("Error loading %s: Wallet is a legacy wallet. Please migrate to a descriptor wallet using the migration tool (migratewallet RPC)."), walletFile);
2897 : 0 : return nullptr;
2898 : : } else {
2899 [ # # ]: 0 : error = strprintf(_("Error loading %s"), walletFile);
2900 : 0 : return nullptr;
2901 : : }
2902 : : }
2903 : :
2904 : : // This wallet is in its first run if there are no ScriptPubKeyMans and it isn't blank or no privkeys
2905 [ + + + + ]: 1422 : const bool fFirstRun = walletInstance->m_spk_managers.empty() &&
2906 [ + + + - : 1412 : !walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) &&
+ + ]
2907 [ + - ]: 539 : !walletInstance->IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET);
2908 : 873 : if (fFirstRun)
2909 : : {
2910 [ + - ]: 532 : LOCK(walletInstance->cs_wallet);
2911 : :
2912 : : // Init with passed flags.
2913 : : // Always set the cache upgrade flag as this feature is supported from the beginning.
2914 [ + - ]: 532 : walletInstance->InitWalletFlags(wallet_creation_flags | WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
2915 : :
2916 : : // Only descriptor wallets can be created
2917 [ + - - + ]: 532 : assert(walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
2918 : :
2919 [ + + + + ]: 532 : if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) || !(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) {
2920 [ + + ]: 317 : walletInstance->SetupDescriptorScriptPubKeyMans();
2921 : : }
2922 : :
2923 [ + + ]: 529 : if (chain) {
2924 [ + - ]: 511 : std::optional<int> tip_height = chain->getHeight();
2925 [ + - ]: 511 : if (tip_height) {
2926 [ + - + - ]: 511 : walletInstance->SetLastBlockProcessed(*tip_height, chain->getBlockHash(*tip_height));
2927 : : }
2928 : : }
2929 [ - + ]: 873 : } else if (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS) {
2930 : : // Make it impossible to disable private keys after creation
2931 [ # # ]: 0 : error = strprintf(_("Error loading %s: Private keys can only be disabled during creation"), walletFile);
2932 : 0 : return nullptr;
2933 [ + - + + ]: 341 : } else if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
2934 [ + - + + ]: 58 : for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
2935 [ + - - + ]: 16 : if (spk_man->HavePrivateKeys()) {
2936 [ # # ]: 0 : warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));
2937 : 0 : break;
2938 : : }
2939 : 42 : }
2940 : : }
2941 : :
2942 [ + - + - : 870 : if (!args.GetArg("-addresstype", "").empty()) {
+ - + + ]
2943 [ + - + - : 150 : std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-addresstype", ""));
+ - + - ]
2944 [ - + ]: 75 : if (!parsed) {
2945 [ # # # # : 0 : error = strprintf(_("Unknown address type '%s'"), args.GetArg("-addresstype", ""));
# # # # ]
2946 : 0 : return nullptr;
2947 : : }
2948 : 75 : walletInstance->m_default_address_type = parsed.value();
2949 : : }
2950 : :
2951 [ + - + - : 870 : if (!args.GetArg("-changetype", "").empty()) {
+ - + + ]
2952 [ + - + - : 28 : std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-changetype", ""));
+ - + - ]
2953 [ - + ]: 14 : if (!parsed) {
2954 [ # # # # : 0 : error = strprintf(_("Unknown change type '%s'"), args.GetArg("-changetype", ""));
# # # # ]
2955 : 0 : return nullptr;
2956 : : }
2957 : 14 : walletInstance->m_default_change_type = parsed.value();
2958 : : }
2959 : :
2960 [ + - + - : 1740 : if (const auto arg{args.GetArg("-mintxfee")}) {
+ + ]
2961 [ + - ]: 13 : std::optional<CAmount> min_tx_fee = ParseMoney(*arg);
2962 [ - + ]: 13 : if (!min_tx_fee) {
2963 [ # # # # ]: 0 : error = AmountErrMsg("mintxfee", *arg);
2964 : 0 : return nullptr;
2965 [ - + ]: 13 : } else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
2966 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") +
# # ]
2967 [ # # # # ]: 0 : _("This is the minimum transaction fee you pay on every transaction."));
2968 : : }
2969 : :
2970 : 13 : walletInstance->m_min_fee = CFeeRate{min_tx_fee.value()};
2971 : 0 : }
2972 : :
2973 [ + - + - : 1740 : if (const auto arg{args.GetArg("-maxapsfee")}) {
+ + ]
2974 [ - + ]: 2 : const std::string& max_aps_fee{*arg};
2975 [ - + ]: 2 : if (max_aps_fee == "-1") {
2976 : 0 : walletInstance->m_max_aps_fee = -1;
2977 [ + - + - ]: 2 : } else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) {
2978 [ - + ]: 2 : if (max_fee.value() > HIGH_APS_FEE) {
2979 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") +
# # ]
2980 [ # # # # ]: 0 : _("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection."));
2981 : : }
2982 : 2 : walletInstance->m_max_aps_fee = max_fee.value();
2983 : : } else {
2984 [ # # # # ]: 0 : error = AmountErrMsg("maxapsfee", max_aps_fee);
2985 : 0 : return nullptr;
2986 : : }
2987 : 0 : }
2988 : :
2989 [ + - + - : 1740 : if (const auto arg{args.GetArg("-fallbackfee")}) {
+ + ]
2990 [ + - ]: 865 : std::optional<CAmount> fallback_fee = ParseMoney(*arg);
2991 [ - + ]: 865 : if (!fallback_fee) {
2992 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-fallbackfee", *arg);
2993 : 0 : return nullptr;
2994 [ - + ]: 865 : } else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) {
2995 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") +
# # ]
2996 [ # # # # ]: 0 : _("This is the transaction fee you may pay when fee estimates are not available."));
2997 : : }
2998 : 865 : walletInstance->m_fallback_fee = CFeeRate{fallback_fee.value()};
2999 : 0 : }
3000 : :
3001 : : // Disable fallback fee in case value was set to 0, enable if non-null value
3002 [ + - ]: 870 : walletInstance->m_allow_fallback_fee = walletInstance->m_fallback_fee.GetFeePerK() != 0;
3003 : :
3004 [ + - + - : 1740 : if (const auto arg{args.GetArg("-discardfee")}) {
+ + ]
3005 [ + - ]: 6 : std::optional<CAmount> discard_fee = ParseMoney(*arg);
3006 [ - + ]: 6 : if (!discard_fee) {
3007 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-discardfee", *arg);
3008 : 0 : return nullptr;
3009 [ + + ]: 6 : } else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) {
3010 [ + - + - : 24 : warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") +
+ - ]
3011 [ + - + - ]: 8 : _("This is the transaction fee you may discard if change is smaller than dust at this level"));
3012 : : }
3013 : 6 : walletInstance->m_discard_rate = CFeeRate{discard_fee.value()};
3014 : 0 : }
3015 : :
3016 [ + - + - : 1740 : if (const auto arg{args.GetArg("-paytxfee")}) {
+ + ]
3017 [ + - ]: 12 : warnings.push_back(_("-paytxfee is deprecated and will be fully removed in v31.0."));
3018 : :
3019 [ + - ]: 6 : std::optional<CAmount> pay_tx_fee = ParseMoney(*arg);
3020 [ - + ]: 6 : if (!pay_tx_fee) {
3021 [ # # # # ]: 0 : error = AmountErrMsg("paytxfee", *arg);
3022 : 0 : return nullptr;
3023 [ - + ]: 6 : } else if (pay_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
3024 [ # # # # : 0 : warnings.push_back(AmountHighWarn("-paytxfee") + Untranslated(" ") +
# # ]
3025 [ # # # # ]: 0 : _("This is the transaction fee you will pay if you send a transaction."));
3026 : : }
3027 : :
3028 [ + - + - ]: 6 : walletInstance->m_pay_tx_fee = CFeeRate{pay_tx_fee.value(), 1000};
3029 : :
3030 [ + - + - : 6 : if (chain && walletInstance->m_pay_tx_fee < chain->relayMinFee()) {
- + ]
3031 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least %s)"),
3032 [ # # # # ]: 0 : "-paytxfee", *arg, chain->relayMinFee().ToString());
3033 : 0 : return nullptr;
3034 : : }
3035 : 0 : }
3036 : :
3037 [ + - + - : 1740 : if (const auto arg{args.GetArg("-maxtxfee")}) {
+ + ]
3038 [ + - ]: 2 : std::optional<CAmount> max_fee = ParseMoney(*arg);
3039 [ - + ]: 2 : if (!max_fee) {
3040 [ # # # # ]: 0 : error = AmountErrMsg("maxtxfee", *arg);
3041 : 0 : return nullptr;
3042 [ - + ]: 2 : } else if (max_fee.value() > HIGH_MAX_TX_FEE) {
3043 [ # # ]: 0 : warnings.push_back(strprintf(_("%s is set very high! Fees this large could be paid on a single transaction."), "-maxtxfee"));
3044 : : }
3045 : :
3046 [ + - + - : 4 : if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) {
+ - + - ]
3047 [ # # ]: 0 : error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),
3048 [ # # # # ]: 0 : "-maxtxfee", *arg, chain->relayMinFee().ToString());
3049 : 0 : return nullptr;
3050 : : }
3051 : :
3052 [ + - ]: 2 : walletInstance->m_default_max_tx_fee = max_fee.value();
3053 : 0 : }
3054 : :
3055 [ + - + - : 1740 : if (const auto arg{args.GetArg("-consolidatefeerate")}) {
- + ]
3056 [ # # # # ]: 0 : if (std::optional<CAmount> consolidate_feerate = ParseMoney(*arg)) {
3057 : 0 : walletInstance->m_consolidate_feerate = CFeeRate(*consolidate_feerate);
3058 : : } else {
3059 [ # # # # ]: 0 : error = AmountErrMsg("consolidatefeerate", *arg);
3060 : 0 : return nullptr;
3061 : : }
3062 : 0 : }
3063 : :
3064 [ + + + - : 870 : if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB) {
+ + ]
3065 [ + - + - : 12 : warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") +
+ - ]
3066 [ + - + - ]: 4 : _("The wallet will avoid paying less than the minimum relay fee."));
3067 : : }
3068 : :
3069 [ + - + - ]: 870 : walletInstance->m_confirm_target = args.GetIntArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET);
3070 [ + - + - ]: 870 : walletInstance->m_spend_zero_conf_change = args.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE);
3071 [ + - + - ]: 870 : walletInstance->m_signal_rbf = args.GetBoolArg("-walletrbf", DEFAULT_WALLET_RBF);
3072 : :
3073 [ + - ]: 870 : walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3074 : :
3075 : : // Try to top up keypool. No-op if the wallet is locked.
3076 [ + - ]: 870 : walletInstance->TopUpKeyPool();
3077 : :
3078 : : // Cache the first key time
3079 : 870 : std::optional<int64_t> time_first_key;
3080 [ + - + + ]: 5898 : for (auto spk_man : walletInstance->GetAllScriptPubKeyMans()) {
3081 [ + - ]: 5028 : int64_t time = spk_man->GetTimeFirstKey();
3082 [ + + + + ]: 5028 : if (!time_first_key || time < *time_first_key) time_first_key = time;
3083 : : }
3084 [ + + + - ]: 870 : if (time_first_key) walletInstance->MaybeUpdateBirthTime(*time_first_key);
3085 : :
3086 [ + + + - : 870 : if (chain && !AttachChain(walletInstance, *chain, rescan_required, error, warnings)) {
+ + ]
3087 [ + + ]: 2 : walletInstance->m_chain_notifications_handler.reset(); // Reset this pointer so that the wallet will actually be unloaded
3088 : 2 : return nullptr;
3089 : : }
3090 : :
3091 : 868 : {
3092 [ + - ]: 868 : LOCK(walletInstance->cs_wallet);
3093 [ + - + - ]: 868 : walletInstance->SetBroadcastTransactions(args.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST));
3094 [ + - + - ]: 868 : walletInstance->WalletLogPrintf("setKeyPool.size() = %u\n", walletInstance->GetKeyPoolSize());
3095 [ + - ]: 868 : walletInstance->WalletLogPrintf("mapWallet.size() = %u\n", walletInstance->mapWallet.size());
3096 [ + - ]: 868 : walletInstance->WalletLogPrintf("m_address_book.size() = %u\n", walletInstance->m_address_book.size());
3097 : 0 : }
3098 : :
3099 : 868 : return walletInstance;
3100 : 874 : }
3101 : :
3102 : 812 : bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, const bool rescan_required, bilingual_str& error, std::vector<bilingual_str>& warnings)
3103 : : {
3104 : 812 : LOCK(walletInstance->cs_wallet);
3105 : : // allow setting the chain if it hasn't been set already but prevent changing it
3106 [ + - - + ]: 812 : assert(!walletInstance->m_chain || walletInstance->m_chain == &chain);
3107 [ + - ]: 812 : walletInstance->m_chain = &chain;
3108 : :
3109 : : // Unless allowed, ensure wallet files are not reused across chains:
3110 [ + - + - : 812 : if (!gArgs.GetBoolArg("-walletcrosschain", DEFAULT_WALLETCROSSCHAIN)) {
+ - ]
3111 [ + - ]: 812 : WalletBatch batch(walletInstance->GetDatabase());
3112 : 812 : CBlockLocator locator;
3113 [ + - + + : 1623 : if (batch.ReadBestBlock(locator) && locator.vHave.size() > 0 && chain.getHeight()) {
+ - + - +
+ ]
3114 : : // Wallet is assumed to be from another chain, if genesis block in the active
3115 : : // chain differs from the genesis block known to the wallet.
3116 [ + - + + ]: 803 : if (chain.getBlockHash(0) != locator.vHave.back()) {
3117 [ + - + - ]: 2 : error = Untranslated("Wallet files should not be reused across chains. Restart bitcoind with -walletcrosschain to override.");
3118 : 1 : return false;
3119 : : }
3120 : : }
3121 : 1624 : }
3122 : :
3123 : : // Register wallet with validationinterface. It's done before rescan to avoid
3124 : : // missing block connections during the rescan.
3125 : : // Because of the wallet lock being held, block connection notifications are going to
3126 : : // be pending on the validation-side until lock release. Blocks that are connected while the
3127 : : // rescan is ongoing will not be processed in the rescan but with the block connected notifications,
3128 : : // so the wallet will only be completeley synced after the notifications delivery.
3129 [ + - - + ]: 811 : walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance);
3130 : :
3131 : : // If rescan_required = true, rescan_height remains equal to 0
3132 : 811 : int rescan_height = 0;
3133 [ + - ]: 811 : if (!rescan_required)
3134 : : {
3135 [ + - ]: 811 : WalletBatch batch(walletInstance->GetDatabase());
3136 : 811 : CBlockLocator locator;
3137 [ + - + + ]: 811 : if (batch.ReadBestBlock(locator)) {
3138 [ + - + + ]: 810 : if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) {
3139 : 802 : rescan_height = *fork_height;
3140 : : }
3141 : : }
3142 : 1622 : }
3143 : :
3144 [ + - ]: 811 : const std::optional<int> tip_height = chain.getHeight();
3145 [ + + ]: 811 : if (tip_height) {
3146 [ + - + - ]: 803 : walletInstance->SetLastBlockProcessedInMem(*tip_height, chain.getBlockHash(*tip_height));
3147 : : } else {
3148 [ + - ]: 8 : walletInstance->SetLastBlockProcessedInMem(-1, uint256());
3149 : : }
3150 : :
3151 [ + + + + ]: 811 : if (tip_height && *tip_height != rescan_height)
3152 : : {
3153 : : // No need to read and scan block if block was created before
3154 : : // our wallet birthday (as adjusted for block time variability)
3155 [ + - ]: 55 : std::optional<int64_t> time_first_key = walletInstance->m_birth_time.load();
3156 [ + - ]: 55 : if (time_first_key) {
3157 [ + - ]: 55 : FoundBlock found = FoundBlock().height(rescan_height);
3158 [ + - ]: 55 : chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, found);
3159 [ - + ]: 55 : if (!found.found) {
3160 : : // We were unable to find a block that had a time more recent than our earliest timestamp
3161 : : // or a height higher than the wallet was synced to, indicating that the wallet is newer than the
3162 : : // current chain tip. Skip rescanning in this case.
3163 : 0 : rescan_height = *tip_height;
3164 : : }
3165 : : }
3166 : :
3167 : : // Technically we could execute the code below in any case, but performing the
3168 : : // `while` loop below can make startup very slow, so only check blocks on disk
3169 : : // if necessary.
3170 [ + - + + : 55 : if (chain.havePruned() || chain.hasAssumedValidChain()) {
+ - + + ]
3171 : 5 : int block_height = *tip_height;
3172 [ + - + - : 705 : while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) {
+ + + + ]
3173 : 700 : --block_height;
3174 : : }
3175 : :
3176 [ + + ]: 5 : if (rescan_height != block_height) {
3177 : : // We can't rescan beyond blocks we don't have data for, stop and throw an error.
3178 : : // This might happen if a user uses an old wallet within a pruned node
3179 : : // or if they ran -disablewallet for a longer time, then decided to re-enable
3180 : : // Exit early and print an error.
3181 : : // It also may happen if an assumed-valid chain is in use and therefore not
3182 : : // all block data is available.
3183 : : // If a block is pruned after this check, we will load the wallet,
3184 : : // but fail the rescan with a generic error.
3185 : :
3186 [ + - - + : 1 : error = chain.havePruned() ?
+ - ]
3187 [ # # ]: 0 : _("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of a pruned node)") :
3188 : : strprintf(_(
3189 : : "Error loading wallet. Wallet requires blocks to be downloaded, "
3190 : : "and software does not currently support loading wallets while "
3191 : : "blocks are being downloaded out of order when using assumeutxo "
3192 : : "snapshots. Wallet should be able to load successfully after "
3193 : 1 : "node sync reaches height %s"), block_height);
3194 : 1 : return false;
3195 : : }
3196 : : }
3197 : :
3198 [ + - + - ]: 54 : chain.initMessage(_("Rescanning…"));
3199 [ + - ]: 54 : walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height);
3200 : :
3201 : 54 : {
3202 : 54 : WalletRescanReserver reserver(*walletInstance);
3203 [ - + ]: 54 : if (!reserver.reserve()) {
3204 [ # # ]: 0 : error = _("Failed to acquire rescan reserver during wallet initialization");
3205 : 0 : return false;
3206 : : }
3207 [ + - + - ]: 54 : ScanResult scan_res = walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, /*max_height=*/{}, reserver, /*fUpdate=*/true, /*save_progress=*/true);
3208 [ - + ]: 54 : if (ScanResult::SUCCESS != scan_res.status) {
3209 [ # # ]: 0 : error = _("Failed to rescan the wallet during initialization");
3210 : 0 : return false;
3211 : : }
3212 : : // Set and update the best block record
3213 : : // Set last block scanned as the last block processed as it may be different in case of a reorg.
3214 : : // Also save the best block locator because rescanning only updates it intermittently.
3215 [ + - ]: 54 : walletInstance->SetLastBlockProcessed(*scan_res.last_scanned_height, scan_res.last_scanned_block);
3216 : 54 : }
3217 : : }
3218 : :
3219 : : return true;
3220 : 812 : }
3221 : :
3222 : 49748 : const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const
3223 : : {
3224 : 49748 : const auto& address_book_it = m_address_book.find(dest);
3225 [ + + ]: 49748 : if (address_book_it == m_address_book.end()) return nullptr;
3226 [ + - + + ]: 36516 : if ((!allow_change) && address_book_it->second.IsChange()) {
3227 : : return nullptr;
3228 : : }
3229 : 36513 : return &address_book_it->second;
3230 : : }
3231 : :
3232 : 810 : void CWallet::postInitProcess()
3233 : : {
3234 : : // Add wallet transactions that aren't already in a block to mempool
3235 : : // Do this here as mempool requires genesis block to be loaded
3236 : 810 : ResubmitWalletTransactions(/*relay=*/false, /*force=*/true);
3237 : :
3238 : : // Update wallet transactions with current mempool transactions.
3239 [ + - ]: 2430 : WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
3240 : 810 : }
3241 : :
3242 : 76 : bool CWallet::BackupWallet(const std::string& strDest) const
3243 : : {
3244 [ + - ]: 228 : WITH_LOCK(cs_wallet, WriteBestBlock());
3245 : 76 : return GetDatabase().Backup(strDest);
3246 : : }
3247 : :
3248 : 1230163 : int CWallet::GetTxDepthInMainChain(const CWalletTx& wtx) const
3249 : : {
3250 : 1230163 : AssertLockHeld(cs_wallet);
3251 [ + + ]: 1230163 : if (auto* conf = wtx.state<TxStateConfirmed>()) {
3252 [ - + ]: 1147003 : assert(conf->confirmed_block_height >= 0);
3253 : 1147003 : return GetLastBlockHeight() - conf->confirmed_block_height + 1;
3254 [ + + ]: 83160 : } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
3255 [ - + ]: 4435 : assert(conf->conflicting_block_height >= 0);
3256 : 4435 : return -1 * (GetLastBlockHeight() - conf->conflicting_block_height + 1);
3257 : : } else {
3258 : : return 0;
3259 : : }
3260 : : }
3261 : :
3262 : 704394 : int CWallet::GetTxBlocksToMaturity(const CWalletTx& wtx) const
3263 : : {
3264 : 704394 : AssertLockHeld(cs_wallet);
3265 : :
3266 [ + + ]: 704394 : if (!wtx.IsCoinBase()) {
3267 : : return 0;
3268 : : }
3269 : 421356 : int chain_depth = GetTxDepthInMainChain(wtx);
3270 [ - + ]: 421356 : assert(chain_depth >= 0); // coinbase tx should not be conflicted
3271 [ + + ]: 421356 : return std::max(0, (COINBASE_MATURITY+1) - chain_depth);
3272 : : }
3273 : :
3274 : 704394 : bool CWallet::IsTxImmatureCoinBase(const CWalletTx& wtx) const
3275 : : {
3276 : 704394 : AssertLockHeld(cs_wallet);
3277 : :
3278 : : // note GetBlocksToMaturity is 0 for non-coinbase tx
3279 : 704394 : return GetTxBlocksToMaturity(wtx) > 0;
3280 : : }
3281 : :
3282 : 11816 : bool CWallet::IsCrypted() const
3283 : : {
3284 : 11816 : return HasEncryptionKeys();
3285 : : }
3286 : :
3287 : 8074 : bool CWallet::IsLocked() const
3288 : : {
3289 [ + + ]: 8074 : if (!IsCrypted()) {
3290 : : return false;
3291 : : }
3292 : 3721 : LOCK(cs_wallet);
3293 [ + - ]: 3721 : return vMasterKey.empty();
3294 : 3721 : }
3295 : :
3296 : 84 : bool CWallet::Lock()
3297 : : {
3298 [ + - ]: 84 : if (!IsCrypted())
3299 : : return false;
3300 : :
3301 : 84 : {
3302 [ + - ]: 84 : LOCK2(m_relock_mutex, cs_wallet);
3303 [ + + ]: 84 : if (!vMasterKey.empty()) {
3304 [ - + + - ]: 56 : memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type));
3305 [ + - + - ]: 140 : vMasterKey.clear();
3306 : : }
3307 [ + - ]: 84 : }
3308 : :
3309 : 84 : NotifyStatusChanged(this);
3310 : 84 : return true;
3311 : : }
3312 : :
3313 : 75 : bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn)
3314 : : {
3315 : 75 : {
3316 : 75 : LOCK(cs_wallet);
3317 [ + + ]: 812 : for (const auto& spk_man_pair : m_spk_managers) {
3318 [ + - - + ]: 737 : if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn)) {
3319 [ # # ]: 0 : return false;
3320 : : }
3321 : : }
3322 [ + - ]: 75 : vMasterKey = vMasterKeyIn;
3323 : 0 : }
3324 : 75 : NotifyStatusChanged(this);
3325 : 75 : return true;
3326 : : }
3327 : :
3328 : 32437 : std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const
3329 : : {
3330 : 32437 : std::set<ScriptPubKeyMan*> spk_mans;
3331 [ + + ]: 97311 : for (bool internal : {false, true}) {
3332 [ + + ]: 324370 : for (OutputType t : OUTPUT_TYPES) {
3333 [ + - ]: 259496 : auto spk_man = GetScriptPubKeyMan(t, internal);
3334 [ + + ]: 259496 : if (spk_man) {
3335 [ + - ]: 143879 : spk_mans.insert(spk_man);
3336 : : }
3337 : : }
3338 : : }
3339 : 32437 : return spk_mans;
3340 : 0 : }
3341 : :
3342 : 225 : bool CWallet::IsActiveScriptPubKeyMan(const ScriptPubKeyMan& spkm) const
3343 : : {
3344 [ + + + + ]: 841 : for (const auto& [_, ext_spkm] : m_external_spk_managers) {
3345 [ + + ]: 721 : if (ext_spkm == &spkm) return true;
3346 : : }
3347 [ + + + + ]: 342 : for (const auto& [_, int_spkm] : m_internal_spk_managers) {
3348 [ + + ]: 321 : if (int_spkm == &spkm) return true;
3349 : : }
3350 : : return false;
3351 : : }
3352 : :
3353 : 4868 : std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const
3354 : : {
3355 : 4868 : std::set<ScriptPubKeyMan*> spk_mans;
3356 [ + + ]: 43687 : for (const auto& spk_man_pair : m_spk_managers) {
3357 [ + - ]: 38819 : spk_mans.insert(spk_man_pair.second.get());
3358 : : }
3359 : 4868 : return spk_mans;
3360 : 0 : }
3361 : :
3362 : 316532 : ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const OutputType& type, bool internal) const
3363 : : {
3364 [ + + ]: 316532 : const std::map<OutputType, ScriptPubKeyMan*>& spk_managers = internal ? m_internal_spk_managers : m_external_spk_managers;
3365 : 316532 : std::map<OutputType, ScriptPubKeyMan*>::const_iterator it = spk_managers.find(type);
3366 [ + + ]: 316532 : if (it == spk_managers.end()) {
3367 : : return nullptr;
3368 : : }
3369 : 195262 : return it->second;
3370 : : }
3371 : :
3372 : 172962 : std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script) const
3373 : : {
3374 [ + - ]: 172962 : std::set<ScriptPubKeyMan*> spk_mans;
3375 : :
3376 : : // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3377 [ + - ]: 172962 : const auto& it = m_cached_spks.find(script);
3378 [ + + ]: 172962 : if (it != m_cached_spks.end()) {
3379 [ + - ]: 111531 : spk_mans.insert(it->second.begin(), it->second.end());
3380 : : }
3381 : 172962 : SignatureData sigdata;
3382 [ + - ]: 284502 : Assume(std::all_of(spk_mans.begin(), spk_mans.end(), [&script, &sigdata](ScriptPubKeyMan* spkm) { return spkm->CanProvide(script, sigdata); }));
3383 : :
3384 : 172962 : return spk_mans;
3385 : 172962 : }
3386 : :
3387 : 7453 : ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const
3388 : : {
3389 [ + + ]: 7453 : if (m_spk_managers.count(id) > 0) {
3390 : 7443 : return m_spk_managers.at(id).get();
3391 : : }
3392 : : return nullptr;
3393 : : }
3394 : :
3395 : 367979 : std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const
3396 : : {
3397 : 367979 : SignatureData sigdata;
3398 [ + - ]: 735958 : return GetSolvingProvider(script, sigdata);
3399 : 367979 : }
3400 : :
3401 : 367979 : std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const
3402 : : {
3403 : : // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3404 : 367979 : const auto& it = m_cached_spks.find(script);
3405 [ + + ]: 367979 : if (it != m_cached_spks.end()) {
3406 : : // All spkms for a given script must already be able to make a SigningProvider for the script, so just return the first one.
3407 : 257743 : Assume(it->second.at(0)->CanProvide(script, sigdata));
3408 : 257743 : return it->second.at(0)->GetSolvingProvider(script);
3409 : : }
3410 : :
3411 : 110236 : return nullptr;
3412 : : }
3413 : :
3414 : 35452 : std::vector<WalletDescriptor> CWallet::GetWalletDescriptors(const CScript& script) const
3415 : : {
3416 : 35452 : std::vector<WalletDescriptor> descs;
3417 [ + - + + ]: 70905 : for (const auto spk_man: GetScriptPubKeyMans(script)) {
3418 [ + - + - ]: 35453 : if (const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man)) {
3419 [ + - ]: 35453 : LOCK(desc_spk_man->cs_desc_man);
3420 [ + - + - ]: 70906 : descs.push_back(desc_spk_man->GetWalletDescriptor());
3421 : 35453 : }
3422 : : }
3423 : 35452 : return descs;
3424 : 0 : }
3425 : :
3426 : 737 : LegacyDataSPKM* CWallet::GetLegacyDataSPKM() const
3427 : : {
3428 [ + - ]: 737 : if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3429 : : return nullptr;
3430 : : }
3431 : 737 : auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3432 [ + - ]: 737 : if (it == m_internal_spk_managers.end()) return nullptr;
3433 [ + - ]: 737 : return dynamic_cast<LegacyDataSPKM*>(it->second);
3434 : : }
3435 : :
3436 : 6468 : void CWallet::AddScriptPubKeyMan(const uint256& id, std::unique_ptr<ScriptPubKeyMan> spkm_man)
3437 : : {
3438 : : // Add spkm_man to m_spk_managers before calling any method
3439 : : // that might access it.
3440 : 6468 : const auto& spkm = m_spk_managers[id] = std::move(spkm_man);
3441 : :
3442 : : // Update birth time if needed
3443 : 6468 : MaybeUpdateBirthTime(spkm->GetTimeFirstKey());
3444 : 6468 : }
3445 : :
3446 : 639 : LegacyDataSPKM* CWallet::GetOrCreateLegacyDataSPKM()
3447 : : {
3448 : 639 : SetupLegacyScriptPubKeyMan();
3449 : 639 : return GetLegacyDataSPKM();
3450 : : }
3451 : :
3452 : 639 : void CWallet::SetupLegacyScriptPubKeyMan()
3453 : : {
3454 [ + + + - : 639 : if (!m_internal_spk_managers.empty() || !m_external_spk_managers.empty() || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
+ - - + ]
3455 : 602 : return;
3456 : : }
3457 : :
3458 [ + - - + : 37 : Assert(m_database->Format() == "bdb_ro" || m_database->Format() == "mock");
- - - - +
- - + - -
- - ]
3459 : 37 : std::unique_ptr<ScriptPubKeyMan> spk_manager = std::make_unique<LegacyDataSPKM>(*this);
3460 : :
3461 [ + + + - ]: 148 : for (const auto& type : LEGACY_OUTPUT_TYPES) {
3462 [ + - ]: 111 : m_internal_spk_managers[type] = spk_manager.get();
3463 [ + - ]: 111 : m_external_spk_managers[type] = spk_manager.get();
3464 : : }
3465 [ + - ]: 37 : uint256 id = spk_manager->GetID();
3466 [ + - ]: 37 : AddScriptPubKeyMan(id, std::move(spk_manager));
3467 : 37 : }
3468 : :
3469 : 2466 : bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const
3470 : : {
3471 : 2466 : LOCK(cs_wallet);
3472 [ + - + - ]: 2466 : return cb(vMasterKey);
3473 : 2466 : }
3474 : :
3475 : 108690 : bool CWallet::HasEncryptionKeys() const
3476 : : {
3477 : 108690 : return !mapMasterKeys.empty();
3478 : : }
3479 : :
3480 : 1 : bool CWallet::HaveCryptedKeys() const
3481 : : {
3482 [ - + ]: 1 : for (const auto& spkm : GetAllScriptPubKeyMans()) {
3483 [ # # # # ]: 0 : if (spkm->HaveCryptedKeys()) return true;
3484 : : }
3485 : 1 : return false;
3486 : : }
3487 : :
3488 : 1380 : void CWallet::ConnectScriptPubKeyManNotifiers()
3489 : : {
3490 [ + + ]: 7964 : for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
3491 [ + - + - ]: 13168 : spk_man->NotifyCanGetAddressesChanged.connect(NotifyCanGetAddressesChanged);
3492 [ + - + - ]: 19752 : spk_man->NotifyFirstKeyTimeChanged.connect(std::bind(&CWallet::MaybeUpdateBirthTime, this, std::placeholders::_2));
3493 : 1380 : }
3494 : 1380 : }
3495 : :
3496 : 2514 : DescriptorScriptPubKeyMan& CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc)
3497 : : {
3498 : 2514 : DescriptorScriptPubKeyMan* spk_manager;
3499 [ + + ]: 2514 : if (IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3500 [ + - ]: 8 : spk_manager = new ExternalSignerScriptPubKeyMan(*this, desc, m_keypool_size);
3501 : : } else {
3502 [ + - ]: 2506 : spk_manager = new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size);
3503 : : }
3504 [ + - ]: 2514 : AddScriptPubKeyMan(id, std::unique_ptr<ScriptPubKeyMan>(spk_manager));
3505 : 2514 : return *spk_manager;
3506 : : }
3507 : :
3508 : 3098 : DescriptorScriptPubKeyMan& CWallet::SetupDescriptorScriptPubKeyMan(WalletBatch& batch, const CExtKey& master_key, const OutputType& output_type, bool internal)
3509 : : {
3510 : 3098 : AssertLockHeld(cs_wallet);
3511 [ + - + - ]: 3098 : auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, m_keypool_size));
3512 [ + - + + ]: 3098 : if (IsCrypted()) {
3513 [ + - - + ]: 138 : if (IsLocked()) {
3514 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors");
3515 : : }
3516 [ + - - + : 138 : if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, &batch)) {
- - - - ]
3517 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors");
3518 : : }
3519 : : }
3520 [ + - ]: 3098 : spk_manager->SetupDescriptorGeneration(batch, master_key, output_type, internal);
3521 [ + - ]: 3098 : DescriptorScriptPubKeyMan* out = spk_manager.get();
3522 [ + - ]: 3098 : uint256 id = spk_manager->GetID();
3523 [ + - ]: 3098 : AddScriptPubKeyMan(id, std::move(spk_manager));
3524 [ + - ]: 3098 : AddActiveScriptPubKeyManWithDb(batch, id, output_type, internal);
3525 : 3098 : return *out;
3526 : 3098 : }
3527 : :
3528 : 386 : void CWallet::SetupDescriptorScriptPubKeyMans(WalletBatch& batch, const CExtKey& master_key)
3529 : : {
3530 : 386 : AssertLockHeld(cs_wallet);
3531 [ + + ]: 1158 : for (bool internal : {false, true}) {
3532 [ + + ]: 3860 : for (OutputType t : OUTPUT_TYPES) {
3533 : 3088 : SetupDescriptorScriptPubKeyMan(batch, master_key, t, internal);
3534 : : }
3535 : : }
3536 : 386 : }
3537 : :
3538 : 359 : void CWallet::SetupOwnDescriptorScriptPubKeyMans(WalletBatch& batch)
3539 : : {
3540 : 359 : AssertLockHeld(cs_wallet);
3541 [ - + ]: 359 : assert(!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER));
3542 : : // Make a seed
3543 : 359 : CKey seed_key = GenerateRandomKey();
3544 [ + - ]: 359 : CPubKey seed = seed_key.GetPubKey();
3545 [ + - - + ]: 359 : assert(seed_key.VerifyPubKey(seed));
3546 : :
3547 : : // Get the extended key
3548 [ + - ]: 359 : CExtKey master_key;
3549 [ + - + - ]: 718 : master_key.SetSeed(seed_key);
3550 : :
3551 [ + - ]: 359 : SetupDescriptorScriptPubKeyMans(batch, master_key);
3552 : 359 : }
3553 : :
3554 : 363 : void CWallet::SetupDescriptorScriptPubKeyMans()
3555 : : {
3556 : 363 : AssertLockHeld(cs_wallet);
3557 : :
3558 [ + + ]: 363 : if (!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3559 [ + - - + ]: 358 : if (!RunWithinTxn(GetDatabase(), /*process_desc=*/"setup descriptors", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet){
3560 : 358 : SetupOwnDescriptorScriptPubKeyMans(batch);
3561 : 358 : return true;
3562 [ # # ]: 0 : })) throw std::runtime_error("Error: cannot process db transaction for descriptors setup");
3563 : : } else {
3564 : 5 : auto signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
3565 [ + + + - : 5 : if (!signer) throw std::runtime_error(util::ErrorString(signer).original);
+ - ]
3566 : :
3567 : : // TODO: add account parameter
3568 : 3 : int account = 0;
3569 [ + - ]: 3 : UniValue signer_res = signer->GetDescriptors(account);
3570 : :
3571 [ - + - - : 3 : if (!signer_res.isObject()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
- - ]
3572 : :
3573 [ + - ]: 3 : WalletBatch batch(GetDatabase());
3574 [ + - - + : 3 : if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors import");
- - ]
3575 : :
3576 [ + + ]: 7 : for (bool internal : {false, true}) {
3577 [ + + + - ]: 8 : const UniValue& descriptor_vals = signer_res.find_value(internal ? "internal" : "receive");
3578 [ - + - - : 5 : if (!descriptor_vals.isArray()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
- - ]
3579 [ + - + - : 21 : for (const UniValue& desc_val : descriptor_vals.get_array().getValues()) {
+ + ]
3580 : 17 : const std::string& desc_str = desc_val.getValStr();
3581 : 17 : FlatSigningProvider keys;
3582 [ + - ]: 17 : std::string desc_error;
3583 [ + - ]: 17 : auto descs = Parse(desc_str, keys, desc_error, false);
3584 [ + + ]: 17 : if (descs.empty()) {
3585 [ + - + - : 5 : throw std::runtime_error(std::string(__func__) + ": Invalid descriptor \"" + desc_str + "\" (" + desc_error + ")");
+ - + - ]
3586 : : }
3587 [ + - ]: 16 : auto& desc = descs.at(0);
3588 [ + - - + ]: 16 : if (!desc->GetOutputType()) {
3589 : 0 : continue;
3590 : : }
3591 [ + - ]: 16 : OutputType t = *desc->GetOutputType();
3592 [ + - + - : 16 : auto spk_manager = std::unique_ptr<ExternalSignerScriptPubKeyMan>(new ExternalSignerScriptPubKeyMan(*this, m_keypool_size));
+ - ]
3593 [ + - ]: 16 : spk_manager->SetupDescriptor(batch, std::move(desc));
3594 [ + - ]: 16 : uint256 id = spk_manager->GetID();
3595 [ + - ]: 16 : AddScriptPubKeyMan(id, std::move(spk_manager));
3596 [ + - ]: 16 : AddActiveScriptPubKeyManWithDb(batch, id, t, internal);
3597 : 18 : }
3598 : : }
3599 : :
3600 : : // Ensure imported descriptors are committed to disk
3601 [ + - - + : 2 : if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors import");
- - ]
3602 : 3 : }
3603 : 360 : }
3604 : :
3605 : 237 : void CWallet::AddActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3606 : : {
3607 : 237 : WalletBatch batch(GetDatabase());
3608 [ + - ]: 237 : return AddActiveScriptPubKeyManWithDb(batch, id, type, internal);
3609 : 237 : }
3610 : :
3611 : 3351 : void CWallet::AddActiveScriptPubKeyManWithDb(WalletBatch& batch, uint256 id, OutputType type, bool internal)
3612 : : {
3613 [ - + ]: 3351 : if (!batch.WriteActiveScriptPubKeyMan(static_cast<uint8_t>(type), id, internal)) {
3614 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed");
3615 : : }
3616 : 3351 : LoadActiveScriptPubKeyMan(id, type, internal);
3617 : 3351 : }
3618 : :
3619 : 5449 : void CWallet::LoadActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3620 : : {
3621 : : // Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets.
3622 : : // Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types.
3623 : 5449 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3624 : :
3625 [ + + + - ]: 8205 : WalletLogPrintf("Setting spkMan to active: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3626 [ + + ]: 5449 : auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3627 : 5449 : auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers;
3628 : 5449 : auto spk_man = m_spk_managers.at(id).get();
3629 : 5449 : spk_mans[type] = spk_man;
3630 : :
3631 : 5449 : const auto it = spk_mans_other.find(type);
3632 [ + + + + ]: 5449 : if (it != spk_mans_other.end() && it->second == spk_man) {
3633 : 2 : spk_mans_other.erase(type);
3634 : : }
3635 : :
3636 : 5449 : NotifyCanGetAddressesChanged();
3637 : 5449 : }
3638 : :
3639 : 216 : void CWallet::DeactivateScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3640 : : {
3641 : 216 : auto spk_man = GetScriptPubKeyMan(type, internal);
3642 [ + + + + ]: 216 : if (spk_man != nullptr && spk_man->GetID() == id) {
3643 [ - + + - ]: 1 : WalletLogPrintf("Deactivate spkMan: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3644 : 1 : WalletBatch batch(GetDatabase());
3645 [ + - - + ]: 1 : if (!batch.EraseActiveScriptPubKeyMan(static_cast<uint8_t>(type), internal)) {
3646 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed");
3647 : : }
3648 : :
3649 [ + - ]: 1 : auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3650 : 1 : spk_mans.erase(type);
3651 : 1 : }
3652 : :
3653 : 216 : NotifyCanGetAddressesChanged();
3654 : 216 : }
3655 : :
3656 : 707 : DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const
3657 : : {
3658 : 707 : auto spk_man_pair = m_spk_managers.find(desc.id);
3659 : :
3660 [ + + ]: 707 : if (spk_man_pair != m_spk_managers.end()) {
3661 : : // Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match
3662 [ + - ]: 20 : DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair->second.get());
3663 [ + - + - ]: 20 : if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) {
3664 : 20 : return spk_manager;
3665 : : }
3666 : : }
3667 : :
3668 : : return nullptr;
3669 : : }
3670 : :
3671 : 28713 : std::optional<bool> CWallet::IsInternalScriptPubKeyMan(ScriptPubKeyMan* spk_man) const
3672 : : {
3673 : : // only active ScriptPubKeyMan can be internal
3674 [ + + ]: 28713 : if (!GetActiveScriptPubKeyMans().count(spk_man)) {
3675 : 9850 : return std::nullopt;
3676 : : }
3677 : :
3678 [ + - ]: 18863 : const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man);
3679 [ - + ]: 18863 : if (!desc_spk_man) {
3680 [ # # # # ]: 0 : throw std::runtime_error(std::string(__func__) + ": unexpected ScriptPubKeyMan type.");
3681 : : }
3682 : :
3683 : 18863 : LOCK(desc_spk_man->cs_desc_man);
3684 [ + - + - ]: 18863 : const auto& type = desc_spk_man->GetWalletDescriptor().descriptor->GetOutputType();
3685 [ - + ]: 18863 : assert(type.has_value());
3686 : :
3687 [ + - + - ]: 18863 : return GetScriptPubKeyMan(*type, /* internal= */ true) == desc_spk_man;
3688 : 18863 : }
3689 : :
3690 : 707 : util::Result<std::reference_wrapper<DescriptorScriptPubKeyMan>> CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal)
3691 : : {
3692 : 707 : AssertLockHeld(cs_wallet);
3693 : :
3694 : 707 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3695 : :
3696 : 707 : auto spk_man = GetDescriptorScriptPubKeyMan(desc);
3697 [ + + ]: 707 : if (spk_man) {
3698 [ + - ]: 20 : WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString());
3699 [ + + ]: 20 : if (auto spkm_res = spk_man->UpdateWalletDescriptor(desc); !spkm_res) {
3700 [ + - ]: 9 : return util::Error{util::ErrorString(spkm_res)};
3701 : 20 : }
3702 : : } else {
3703 [ + - + - ]: 687 : auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size));
3704 [ + - ]: 687 : spk_man = new_spk_man.get();
3705 : :
3706 : : // Save the descriptor to memory
3707 [ + - ]: 687 : uint256 id = new_spk_man->GetID();
3708 [ + - ]: 687 : AddScriptPubKeyMan(id, std::move(new_spk_man));
3709 : 687 : }
3710 : :
3711 : : // Add the private keys to the descriptor
3712 [ + + ]: 1218 : for (const auto& entry : signing_provider.keys) {
3713 : 514 : const CKey& key = entry.second;
3714 : 514 : spk_man->AddDescriptorKey(key, key.GetPubKey());
3715 : : }
3716 : :
3717 : : // Top up key pool, the manager will generate new scriptPubKeys internally
3718 [ - + ]: 704 : if (!spk_man->TopUp()) {
3719 : 0 : return util::Error{_("Could not top up scriptPubKeys")};
3720 : : }
3721 : :
3722 : : // Apply the label if necessary
3723 : : // Note: we disable labels for ranged descriptors
3724 [ + + ]: 704 : if (!desc.descriptor->IsRange()) {
3725 : 329 : auto script_pub_keys = spk_man->GetScriptPubKeys();
3726 [ - + ]: 329 : if (script_pub_keys.empty()) {
3727 [ # # ]: 0 : return util::Error{_("Could not generate scriptPubKeys (cache is empty)")};
3728 : : }
3729 : :
3730 [ + + ]: 329 : if (!internal) {
3731 [ + + + - ]: 1203 : for (const auto& script : script_pub_keys) {
3732 : 874 : CTxDestination dest;
3733 [ + + + - ]: 874 : if (ExtractDestination(script, dest)) {
3734 [ + - ]: 682 : SetAddressBook(dest, label, AddressPurpose::RECEIVE);
3735 : : }
3736 : 874 : }
3737 : : }
3738 : 329 : }
3739 : :
3740 : : // Save the descriptor to DB
3741 : 704 : spk_man->WriteDescriptor();
3742 : :
3743 : : // Break balance caches so that outputs that are now IsMine in already known txs will be included in the balance
3744 : 704 : MarkDirty();
3745 : :
3746 : 704 : return std::reference_wrapper(*spk_man);
3747 : : }
3748 : :
3749 : 37 : bool CWallet::MigrateToSQLite(bilingual_str& error)
3750 : : {
3751 : 37 : AssertLockHeld(cs_wallet);
3752 : :
3753 : 37 : WalletLogPrintf("Migrating wallet storage database from BerkeleyDB to SQLite.\n");
3754 : :
3755 [ - + ]: 37 : if (m_database->Format() == "sqlite") {
3756 : 0 : error = _("Error: This wallet already uses SQLite");
3757 : 0 : return false;
3758 : : }
3759 : :
3760 : : // Get all of the records for DB type migration
3761 : 37 : std::unique_ptr<DatabaseBatch> batch = m_database->MakeBatch();
3762 [ + - ]: 37 : std::unique_ptr<DatabaseCursor> cursor = batch->GetNewCursor();
3763 : 37 : std::vector<std::pair<SerializeData, SerializeData>> records;
3764 [ - + ]: 37 : if (!cursor) {
3765 [ # # ]: 0 : error = _("Error: Unable to begin reading all records in the database");
3766 : 0 : return false;
3767 : : }
3768 : 1157 : DatabaseCursor::Status status = DatabaseCursor::Status::FAIL;
3769 : 2277 : while (true) {
3770 : 1157 : DataStream ss_key{};
3771 : 1157 : DataStream ss_value{};
3772 [ + - ]: 1157 : status = cursor->Next(ss_key, ss_value);
3773 [ + + ]: 1157 : if (status != DatabaseCursor::Status::MORE) {
3774 : : break;
3775 : : }
3776 [ + - ]: 1120 : SerializeData key(ss_key.begin(), ss_key.end());
3777 [ + - ]: 1120 : SerializeData value(ss_value.begin(), ss_value.end());
3778 [ + - ]: 1120 : records.emplace_back(key, value);
3779 : 1157 : }
3780 [ + - ]: 37 : cursor.reset();
3781 [ + - ]: 37 : batch.reset();
3782 [ - + ]: 37 : if (status != DatabaseCursor::Status::DONE) {
3783 [ # # ]: 0 : error = _("Error: Unable to read all records in the database");
3784 : 0 : return false;
3785 : : }
3786 : :
3787 : : // Close this database and delete the file
3788 [ + - + - ]: 37 : fs::path db_path = fs::PathFromString(m_database->Filename());
3789 [ + - ]: 37 : m_database->Close();
3790 [ + - ]: 37 : fs::remove(db_path);
3791 : :
3792 : : // Generate the path for the location of the migrated wallet
3793 : : // Wallets that are plain files rather than wallet directories will be migrated to be wallet directories.
3794 [ + - + - : 74 : const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(m_name));
+ - ]
3795 : :
3796 : : // Make new DB
3797 [ + - ]: 37 : DatabaseOptions opts;
3798 : 37 : opts.require_create = true;
3799 : 37 : opts.require_format = DatabaseFormat::SQLITE;
3800 : 37 : DatabaseStatus db_status;
3801 [ + - ]: 37 : std::unique_ptr<WalletDatabase> new_db = MakeDatabase(wallet_path, opts, db_status, error);
3802 [ - + ]: 37 : assert(new_db); // This is to prevent doing anything further with this wallet. The original file was deleted, but a backup exists.
3803 [ + - ]: 37 : m_database.reset();
3804 : 37 : m_database = std::move(new_db);
3805 : :
3806 : : // Write existing records into the new DB
3807 [ + - ]: 74 : batch = m_database->MakeBatch();
3808 [ + - ]: 37 : bool began = batch->TxnBegin();
3809 [ - + ]: 37 : assert(began); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3810 [ - + + + ]: 1157 : for (const auto& [key, value] : records) {
3811 [ - + - + : 1120 : if (!batch->Write(std::span{key}, std::span{value})) {
+ - - + ]
3812 [ # # ]: 0 : batch->TxnAbort();
3813 [ # # ]: 0 : m_database->Close();
3814 [ # # # # : 0 : fs::remove(m_database->Filename());
# # ]
3815 : 0 : assert(false); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3816 : : }
3817 : : }
3818 [ + - ]: 37 : bool committed = batch->TxnCommit();
3819 [ - + ]: 37 : assert(committed); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3820 : 37 : return true;
3821 : 111 : }
3822 : :
3823 : 34 : std::optional<MigrationData> CWallet::GetDescriptorsForLegacy(bilingual_str& error) const
3824 : : {
3825 : 34 : AssertLockHeld(cs_wallet);
3826 : :
3827 : 34 : LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3828 [ - + ]: 34 : if (!Assume(legacy_spkm)) {
3829 : : // This shouldn't happen
3830 [ # # ]: 0 : error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));
3831 : 0 : return std::nullopt;
3832 : : }
3833 : :
3834 : 34 : std::optional<MigrationData> res = legacy_spkm->MigrateToDescriptor();
3835 [ - + ]: 34 : if (res == std::nullopt) {
3836 [ # # ]: 0 : error = _("Error: Unable to produce descriptors for this legacy wallet. Make sure to provide the wallet's passphrase if it is encrypted.");
3837 : 0 : return std::nullopt;
3838 : : }
3839 : 34 : return res;
3840 : 34 : }
3841 : :
3842 : 32 : util::Result<void> CWallet::ApplyMigrationData(WalletBatch& local_wallet_batch, MigrationData& data)
3843 : : {
3844 : 32 : AssertLockHeld(cs_wallet);
3845 : :
3846 : 32 : LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3847 [ - + ]: 32 : if (!Assume(legacy_spkm)) {
3848 : : // This shouldn't happen
3849 [ # # ]: 0 : return util::Error{Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"))};
3850 : : }
3851 : :
3852 : : // Note: when the legacy wallet has no spendable scripts, it must be empty at the end of the process.
3853 [ + + - + ]: 32 : bool has_spendable_material = !data.desc_spkms.empty() || data.master_key.key.IsValid();
3854 : :
3855 : : // Get all invalid or non-watched scripts that will not be migrated
3856 [ + - ]: 32 : std::set<CTxDestination> not_migrated_dests;
3857 [ + - + + : 36 : for (const auto& script : legacy_spkm->GetNotMineScriptPubKeys()) {
+ - ]
3858 : 4 : CTxDestination dest;
3859 [ + - + - : 4 : if (ExtractDestination(script, dest)) not_migrated_dests.emplace(dest);
+ - ]
3860 : 4 : }
3861 : :
3862 : : // When the legacy wallet has no spendable scripts, the main wallet will be empty, leaving its script cache empty as well.
3863 : : // The watch-only and/or solvable wallet(s) will contain the scripts in their respective caches.
3864 : 32 : if (!data.desc_spkms.empty()) Assume(!m_cached_spks.empty());
3865 : 32 : if (!data.watch_descs.empty()) Assume(!data.watchonly_wallet->m_cached_spks.empty());
3866 : 32 : if (!data.solvable_descs.empty()) Assume(!data.solvable_wallet->m_cached_spks.empty());
3867 : :
3868 [ + + ]: 148 : for (auto& desc_spkm : data.desc_spkms) {
3869 [ + - - + ]: 116 : if (m_spk_managers.count(desc_spkm->GetID()) > 0) {
3870 [ # # ]: 0 : return util::Error{_("Error: Duplicate descriptors created during migration. Your wallet may be corrupted.")};
3871 : : }
3872 [ + - ]: 116 : uint256 id = desc_spkm->GetID();
3873 [ + - ]: 116 : AddScriptPubKeyMan(id, std::move(desc_spkm));
3874 : : }
3875 : :
3876 : : // Remove the LegacyScriptPubKeyMan from disk
3877 [ + - - + ]: 32 : if (!legacy_spkm->DeleteRecordsWithDB(local_wallet_batch)) {
3878 [ # # ]: 0 : return util::Error{_("Error: cannot remove legacy wallet records")};
3879 : : }
3880 : :
3881 : : // Remove the LegacyScriptPubKeyMan from memory
3882 [ + - ]: 32 : m_spk_managers.erase(legacy_spkm->GetID());
3883 : 32 : m_external_spk_managers.clear();
3884 : 32 : m_internal_spk_managers.clear();
3885 : :
3886 : : // Setup new descriptors (only if we are migrating any key material)
3887 [ + - ]: 32 : SetWalletFlagWithDB(local_wallet_batch, WALLET_FLAG_DESCRIPTORS);
3888 [ + + + - : 32 : if (has_spendable_material && !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
+ + ]
3889 : : // Use the existing master key if we have it
3890 [ + + ]: 28 : if (data.master_key.key.IsValid()) {
3891 [ + - ]: 27 : SetupDescriptorScriptPubKeyMans(local_wallet_batch, data.master_key);
3892 : : } else {
3893 : : // Setup with a new seed if we don't.
3894 [ + - ]: 1 : SetupOwnDescriptorScriptPubKeyMans(local_wallet_batch);
3895 : : }
3896 : : }
3897 : :
3898 : : // Get best block locator so that we can copy it to the watchonly and solvables
3899 : 32 : CBlockLocator best_block_locator;
3900 [ + - - + ]: 32 : if (!local_wallet_batch.ReadBestBlock(best_block_locator)) {
3901 [ # # ]: 0 : return util::Error{_("Error: Unable to read wallet's best block locator record")};
3902 : : }
3903 : :
3904 : : // Update m_txos to match the descriptors remaining in this wallet
3905 : 32 : m_txos.clear();
3906 [ + - ]: 32 : RefreshAllTXOs();
3907 : :
3908 : : // Check if the transactions in the wallet are still ours. Either they belong here, or they belong in the watchonly wallet.
3909 : : // We need to go through these in the tx insertion order so that lookups to spends works.
3910 : 32 : std::vector<Txid> txids_to_delete;
3911 : 32 : std::unique_ptr<WalletBatch> watchonly_batch;
3912 [ + + ]: 32 : if (data.watchonly_wallet) {
3913 [ + - ]: 20 : watchonly_batch = std::make_unique<WalletBatch>(data.watchonly_wallet->GetDatabase());
3914 [ + - - + : 10 : if (!watchonly_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.watchonly_wallet->GetName())};
- - ]
3915 : : // Copy the next tx order pos to the watchonly wallet
3916 [ + - ]: 10 : LOCK(data.watchonly_wallet->cs_wallet);
3917 [ + - ]: 10 : data.watchonly_wallet->nOrderPosNext = nOrderPosNext;
3918 [ + - ]: 10 : watchonly_batch->WriteOrderPosNext(data.watchonly_wallet->nOrderPosNext);
3919 : : // Write the best block locator to avoid rescanning on reload
3920 [ + - - + ]: 10 : if (!watchonly_batch->WriteBestBlock(best_block_locator)) {
3921 [ # # # # ]: 0 : return util::Error{_("Error: Unable to write watchonly wallet best block locator record")};
3922 : : }
3923 : 10 : }
3924 : 32 : std::unique_ptr<WalletBatch> solvables_batch;
3925 [ + + ]: 32 : if (data.solvable_wallet) {
3926 [ + - ]: 10 : solvables_batch = std::make_unique<WalletBatch>(data.solvable_wallet->GetDatabase());
3927 [ + - - + : 5 : if (!solvables_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.solvable_wallet->GetName())};
- - ]
3928 : : // Write the best block locator to avoid rescanning on reload
3929 [ + - - + ]: 5 : if (!solvables_batch->WriteBestBlock(best_block_locator)) {
3930 [ # # ]: 0 : return util::Error{_("Error: Unable to write solvable wallet best block locator record")};
3931 : : }
3932 : : }
3933 [ + - + + ]: 89 : for (const auto& [_pos, wtx] : wtxOrdered) {
3934 : : // Check it is the watchonly wallet's
3935 : : // solvable_wallet doesn't need to be checked because transactions for those scripts weren't being watched for
3936 [ + - + + : 57 : bool is_mine = IsMine(*wtx->tx) || IsFromMe(*wtx->tx);
+ - + + ]
3937 [ + + ]: 57 : if (data.watchonly_wallet) {
3938 [ + - ]: 22 : LOCK(data.watchonly_wallet->cs_wallet);
3939 [ + - + + : 22 : if (data.watchonly_wallet->IsMine(*wtx->tx) || data.watchonly_wallet->IsFromMe(*wtx->tx)) {
+ - + + ]
3940 : : // Add to watchonly wallet
3941 [ + - ]: 14 : const Txid& hash = wtx->GetHash();
3942 : 14 : const CWalletTx& to_copy_wtx = *wtx;
3943 [ + - - + ]: 14 : if (!data.watchonly_wallet->LoadToWallet(hash, [&](CWalletTx& ins_wtx, bool new_tx) EXCLUSIVE_LOCKS_REQUIRED(data.watchonly_wallet->cs_wallet) {
3944 [ + - ]: 14 : if (!new_tx) return false;
3945 [ + - - + ]: 28 : ins_wtx.SetTx(to_copy_wtx.tx);
3946 : 14 : ins_wtx.CopyFrom(to_copy_wtx);
3947 : 14 : return true;
3948 : : })) {
3949 [ # # # # : 0 : return util::Error{strprintf(_("Error: Could not add watchonly tx %s to watchonly wallet"), wtx->GetHash().GetHex())};
# # ]
3950 : : }
3951 [ + - + - ]: 14 : watchonly_batch->WriteTx(data.watchonly_wallet->mapWallet.at(hash));
3952 : : // Mark as to remove from the migrated wallet only if it does not also belong to it
3953 [ + + ]: 14 : if (!is_mine) {
3954 [ + - ]: 11 : txids_to_delete.push_back(hash);
3955 : : }
3956 : 14 : continue;
3957 [ + - ]: 14 : }
3958 : 22 : }
3959 [ - + ]: 43 : if (!is_mine) {
3960 : : // Both not ours and not in the watchonly wallet
3961 [ # # # # ]: 0 : return util::Error{strprintf(_("Error: Transaction %s in wallet cannot be identified to belong to migrated wallets"), wtx->GetHash().GetHex())};
3962 : : }
3963 : : }
3964 : :
3965 : : // Do the removes
3966 [ - + + + ]: 32 : if (txids_to_delete.size() > 0) {
3967 [ + - - + ]: 6 : if (auto res = RemoveTxs(local_wallet_batch, txids_to_delete); !res) {
3968 [ # # # # ]: 0 : return util::Error{_("Error: Could not delete watchonly transactions. ") + util::ErrorString(res)};
3969 : 6 : }
3970 : : }
3971 : :
3972 : : // Pair external wallets with their corresponding db handler
3973 : 32 : std::vector<std::pair<std::shared_ptr<CWallet>, std::unique_ptr<WalletBatch>>> wallets_vec;
3974 [ + + + - ]: 32 : if (data.watchonly_wallet) wallets_vec.emplace_back(data.watchonly_wallet, std::move(watchonly_batch));
3975 [ + + + - ]: 32 : if (data.solvable_wallet) wallets_vec.emplace_back(data.solvable_wallet, std::move(solvables_batch));
3976 : :
3977 : : // Write address book entry to disk
3978 : 89 : auto func_store_addr = [](WalletBatch& batch, const CTxDestination& dest, const CAddressBookData& entry) {
3979 : 57 : auto address{EncodeDestination(dest)};
3980 [ + - + - : 114 : if (entry.purpose) batch.WritePurpose(address, PurposeToString(*entry.purpose));
+ - ]
3981 [ + - + - ]: 57 : if (entry.label) batch.WriteName(address, *entry.label);
3982 [ - - - + ]: 57 : for (const auto& [id, request] : entry.receive_requests) {
3983 [ # # ]: 0 : batch.WriteAddressReceiveRequest(dest, id, request);
3984 : : }
3985 [ + + + - ]: 57 : if (entry.previously_spent) batch.WriteAddressPreviouslySpent(dest, true);
3986 : 57 : };
3987 : :
3988 : : // Check the address book data in the same way we did for transactions
3989 : 32 : std::vector<CTxDestination> dests_to_delete;
3990 [ + - + + ]: 118 : for (const auto& [dest, record] : m_address_book) {
3991 : : // Ensure "receive" entries that are no longer part of the original wallet are transferred to another wallet
3992 : : // Entries for everything else ("send") will be cloned to all wallets.
3993 [ + - + - : 165 : bool require_transfer = record.purpose == AddressPurpose::RECEIVE && !IsMine(dest);
+ + ]
3994 : 86 : bool copied = false;
3995 [ + - + + ]: 122 : for (auto& [wallet, batch] : wallets_vec) {
3996 [ + - ]: 58 : LOCK(wallet->cs_wallet);
3997 [ + + + - : 58 : if (require_transfer && !wallet->IsMine(dest)) continue;
+ + + - ]
3998 : :
3999 : : // Copy the entire address book entry
4000 [ + - + - ]: 57 : wallet->m_address_book[dest] = record;
4001 [ + - ]: 57 : func_store_addr(*batch, dest, record);
4002 : :
4003 : 57 : copied = true;
4004 : : // Only delete 'receive' records that are no longer part of the original wallet
4005 [ + + ]: 57 : if (require_transfer) {
4006 [ + - ]: 22 : dests_to_delete.push_back(dest);
4007 [ + - ]: 22 : break;
4008 : : }
4009 : 58 : }
4010 : :
4011 : : // Fail immediately if we ever found an entry that was ours and cannot be transferred
4012 : : // to any of the created wallets (watch-only, solvable).
4013 : : // Means that no inferred descriptor maps to the stored entry. Which mustn't happen.
4014 [ + + ]: 86 : if (require_transfer && !copied) {
4015 : :
4016 : : // Skip invalid/non-watched scripts that will not be migrated
4017 [ + - ]: 4 : if (not_migrated_dests.count(dest) > 0) {
4018 [ + - ]: 4 : dests_to_delete.push_back(dest);
4019 : 4 : continue;
4020 : : }
4021 : :
4022 [ # # ]: 0 : return util::Error{_("Error: Address book data in wallet cannot be identified to belong to migrated wallets")};
4023 : : }
4024 : : }
4025 : :
4026 : : // Persist external wallets address book entries
4027 [ + - + + ]: 47 : for (auto& [wallet, batch] : wallets_vec) {
4028 [ + - - + ]: 15 : if (!batch->TxnCommit()) {
4029 [ # # ]: 0 : return util::Error{strprintf(_("Error: Unable to write data to disk for wallet %s"), wallet->GetName())};
4030 : : }
4031 : : }
4032 : :
4033 : : // Remove the things to delete in this wallet
4034 [ - + + + ]: 32 : if (dests_to_delete.size() > 0) {
4035 [ + + ]: 36 : for (const auto& dest : dests_to_delete) {
4036 [ + - - + ]: 26 : if (!DelAddressBookWithDB(local_wallet_batch, dest)) {
4037 [ # # ]: 0 : return util::Error{_("Error: Unable to remove watchonly address book data")};
4038 : : }
4039 : : }
4040 : : }
4041 : :
4042 : : // If there was no key material in the main wallet, there should be no records on it anymore.
4043 : : // This wallet will be discarded at the end of the process. Only wallets that contain the
4044 : : // migrated records will be presented to the user.
4045 [ + + ]: 32 : if (!has_spendable_material) {
4046 [ - + - - ]: 2 : if (!m_address_book.empty()) return util::Error{_("Error: Not all address book records were migrated")};
4047 [ - + - - ]: 2 : if (!mapWallet.empty()) return util::Error{_("Error: Not all transaction records were migrated")};
4048 : : }
4049 : :
4050 : 32 : return {}; // all good
4051 : 96 : }
4052 : :
4053 : 143858 : bool CWallet::CanGrindR() const
4054 : : {
4055 : 143858 : return !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS);
4056 : : }
4057 : :
4058 : 34 : bool DoMigration(CWallet& wallet, WalletContext& context, bilingual_str& error, MigrationResult& res) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet)
4059 : : {
4060 : 34 : AssertLockHeld(wallet.cs_wallet);
4061 : :
4062 : : // Get all of the descriptors from the legacy wallet
4063 : 34 : std::optional<MigrationData> data = wallet.GetDescriptorsForLegacy(error);
4064 [ + - ]: 34 : if (data == std::nullopt) return false;
4065 : :
4066 : : // Create the watchonly and solvable wallets if necessary
4067 [ - + + + : 34 : if (data->watch_descs.size() > 0 || data->solvable_descs.size() > 0) {
- + + + ]
4068 [ + - ]: 13 : DatabaseOptions options;
4069 : 13 : options.require_existing = false;
4070 : 13 : options.require_create = true;
4071 : 13 : options.require_format = DatabaseFormat::SQLITE;
4072 : :
4073 [ + - ]: 13 : WalletContext empty_context;
4074 : 13 : empty_context.args = context.args;
4075 : :
4076 : : // Make the wallets
4077 : 13 : options.create_flags = WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET | WALLET_FLAG_DESCRIPTORS;
4078 [ + - + + ]: 13 : if (wallet.IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
4079 : 1 : options.create_flags |= WALLET_FLAG_AVOID_REUSE;
4080 : : }
4081 [ + - + - ]: 13 : if (wallet.IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
4082 : 13 : options.create_flags |= WALLET_FLAG_KEY_ORIGIN_METADATA;
4083 : : }
4084 [ - + + + ]: 13 : if (data->watch_descs.size() > 0) {
4085 [ + - ]: 12 : wallet.WalletLogPrintf("Making a new watchonly wallet containing the watched scripts\n");
4086 : :
4087 : 12 : DatabaseStatus status;
4088 : 12 : std::vector<bilingual_str> warnings;
4089 [ + - ]: 12 : std::string wallet_name = wallet.GetName() + "_watchonly";
4090 [ + - ]: 12 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4091 [ - + ]: 12 : if (!database) {
4092 [ # # ]: 0 : error = strprintf(_("Wallet file creation failed: %s"), error);
4093 : 0 : return false;
4094 : : }
4095 : :
4096 [ + - - + ]: 12 : data->watchonly_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4097 [ - + ]: 12 : if (!data->watchonly_wallet) {
4098 [ # # ]: 0 : error = _("Error: Failed to create new watchonly wallet");
4099 : 0 : return false;
4100 : : }
4101 : 12 : res.watchonly_wallet = data->watchonly_wallet;
4102 [ + - ]: 12 : LOCK(data->watchonly_wallet->cs_wallet);
4103 : :
4104 : : // Parse the descriptors and add them to the new wallet
4105 [ + + ]: 48 : for (const auto& [desc_str, creation_time] : data->watch_descs) {
4106 : : // Parse the descriptor
4107 : 36 : FlatSigningProvider keys;
4108 [ + - ]: 36 : std::string parse_err;
4109 [ + - ]: 36 : std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4110 [ - + - + ]: 36 : assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4111 [ + - + - : 36 : assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
- + ]
4112 : :
4113 : : // Add to the wallet
4114 [ + - + - : 36 : WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
+ - ]
4115 [ + - + - : 72 : if (auto spkm_res = data->watchonly_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
- + ]
4116 [ # # # # ]: 0 : throw std::runtime_error(util::ErrorString(spkm_res).original);
4117 : 0 : }
4118 : 36 : }
4119 : :
4120 : : // Add the wallet to settings
4121 [ + - ]: 12 : UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4122 : 12 : }
4123 [ - + + + ]: 13 : if (data->solvable_descs.size() > 0) {
4124 [ + - ]: 7 : wallet.WalletLogPrintf("Making a new watchonly wallet containing the unwatched solvable scripts\n");
4125 : :
4126 : 7 : DatabaseStatus status;
4127 : 7 : std::vector<bilingual_str> warnings;
4128 [ + - ]: 7 : std::string wallet_name = wallet.GetName() + "_solvables";
4129 [ + - ]: 7 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4130 [ + + ]: 7 : if (!database) {
4131 [ + - ]: 2 : error = strprintf(_("Wallet file creation failed: %s"), error);
4132 : 2 : return false;
4133 : : }
4134 : :
4135 [ + - - + ]: 5 : data->solvable_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4136 [ - + ]: 5 : if (!data->solvable_wallet) {
4137 [ # # ]: 0 : error = _("Error: Failed to create new watchonly wallet");
4138 : 0 : return false;
4139 : : }
4140 : 5 : res.solvables_wallet = data->solvable_wallet;
4141 [ + - ]: 5 : LOCK(data->solvable_wallet->cs_wallet);
4142 : :
4143 : : // Parse the descriptors and add them to the new wallet
4144 [ + + ]: 17 : for (const auto& [desc_str, creation_time] : data->solvable_descs) {
4145 : : // Parse the descriptor
4146 : 12 : FlatSigningProvider keys;
4147 [ + - ]: 12 : std::string parse_err;
4148 [ + - ]: 12 : std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4149 [ - + - + ]: 12 : assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4150 [ + - + - : 12 : assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
- + ]
4151 : :
4152 : : // Add to the wallet
4153 [ + - + - : 12 : WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
+ - ]
4154 [ + - + - : 24 : if (auto spkm_res = data->solvable_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
- + ]
4155 [ # # # # ]: 0 : throw std::runtime_error(util::ErrorString(spkm_res).original);
4156 : 0 : }
4157 : 12 : }
4158 : :
4159 : : // Add the wallet to settings
4160 [ + - ]: 5 : UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4161 : 7 : }
4162 : 13 : }
4163 : :
4164 : : // Add the descriptors to wallet, remove LegacyScriptPubKeyMan, and cleanup txs and address book data
4165 [ + - + - ]: 32 : return RunWithinTxn(wallet.GetDatabase(), /*process_desc=*/"apply migration process", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet){
4166 [ - + ]: 32 : if (auto res_migration = wallet.ApplyMigrationData(batch, *data); !res_migration) {
4167 [ # # ]: 0 : error = util::ErrorString(res_migration);
4168 : 0 : return false;
4169 : 0 : }
4170 : 32 : wallet.WalletLogPrintf("Wallet migration complete.\n");
4171 : 32 : return true;
4172 : : });
4173 : 34 : }
4174 : :
4175 : 43 : util::Result<MigrationResult> MigrateLegacyToDescriptor(const std::string& wallet_name, const SecureString& passphrase, WalletContext& context)
4176 : : {
4177 : 43 : std::vector<bilingual_str> warnings;
4178 [ + - ]: 43 : bilingual_str error;
4179 : :
4180 : : // The only kind of wallets that could be loaded are descriptor ones, which don't need to be migrated.
4181 [ + - + + ]: 43 : if (auto wallet = GetWallet(context, wallet_name)) {
4182 [ + - - + ]: 1 : assert(wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4183 [ + - ]: 3 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4184 : : } else {
4185 : : // Check if the wallet is BDB
4186 [ + - - + ]: 82 : const auto& wallet_path = GetWalletPath(wallet_name);
4187 [ - + ]: 42 : if (!wallet_path) {
4188 [ # # ]: 0 : return util::Error{util::ErrorString(wallet_path)};
4189 : : }
4190 [ + - + + ]: 42 : if (!fs::exists(*wallet_path)) {
4191 [ + - ]: 3 : return util::Error{_("Error: Wallet does not exist")};
4192 : : }
4193 [ + - + - : 82 : if (!IsBDBFile(BDBDataFile(*wallet_path))) {
+ + ]
4194 [ + - ]: 3 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4195 : : }
4196 : 3 : }
4197 : :
4198 : : // Load the wallet but only in the context of this function.
4199 : : // No signals should be connected nor should anything else be aware of this wallet
4200 [ + - ]: 40 : WalletContext empty_context;
4201 : 40 : empty_context.args = context.args;
4202 [ + - ]: 40 : DatabaseOptions options;
4203 : 40 : options.require_existing = true;
4204 : 40 : options.require_format = DatabaseFormat::BERKELEY_RO;
4205 : 40 : DatabaseStatus status;
4206 [ + - ]: 40 : std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4207 [ - + ]: 40 : if (!database) {
4208 [ # # # # : 0 : return util::Error{Untranslated("Wallet file verification failed.") + Untranslated(" ") + error};
# # # # #
# ]
4209 : : }
4210 : :
4211 : : // Make the local wallet
4212 [ + - ]: 40 : std::shared_ptr<CWallet> local_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4213 [ - + ]: 40 : if (!local_wallet) {
4214 [ # # # # : 0 : return util::Error{Untranslated("Wallet loading failed.") + Untranslated(" ") + error};
# # # # #
# ]
4215 : : }
4216 : :
4217 [ + - ]: 80 : return MigrateLegacyToDescriptor(std::move(local_wallet), passphrase, context);
4218 : 83 : }
4219 : :
4220 : 40 : util::Result<MigrationResult> MigrateLegacyToDescriptor(std::shared_ptr<CWallet> local_wallet, const SecureString& passphrase, WalletContext& context)
4221 : : {
4222 : 40 : MigrationResult res;
4223 [ - + ]: 40 : bilingual_str error;
4224 : 40 : std::vector<bilingual_str> warnings;
4225 : :
4226 [ - + ]: 40 : DatabaseOptions options;
4227 : 40 : options.require_existing = true;
4228 : 40 : DatabaseStatus status;
4229 : :
4230 [ - + ]: 40 : const std::string wallet_name = local_wallet->GetName();
4231 : :
4232 : : // Before anything else, check if there is something to migrate.
4233 [ + - - + ]: 40 : if (local_wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4234 [ # # ]: 0 : return util::Error{_("Error: This wallet is already a descriptor wallet")};
4235 : : }
4236 : :
4237 : : // Make a backup of the DB in the wallet's directory with a unique filename
4238 : : // using the wallet name and current timestamp. The backup filename is based
4239 : : // on the name of the parent directory containing the wallet data in most
4240 : : // cases, but in the case where the wallet name is a path to a data file,
4241 : : // the name of the data file is used, and in the case where the wallet name
4242 : : // is blank, "default_wallet" is used.
4243 [ + + ]: 40 : const std::string backup_prefix = wallet_name.empty() ? "default_wallet" : [&] {
4244 : : // fs::weakly_canonical resolves relative specifiers and remove trailing slashes.
4245 [ + - + - ]: 156 : const auto legacy_wallet_path = fs::weakly_canonical(GetWalletDir() / fs::PathFromString(wallet_name));
4246 [ + - - + ]: 195 : return fs::PathToString(legacy_wallet_path.filename());
4247 [ + - + - ]: 79 : }();
4248 : :
4249 [ + - + - : 40 : fs::path backup_filename = fs::PathFromString(strprintf("%s_%d.legacy.bak", backup_prefix, GetTime()));
+ - ]
4250 [ + - + - ]: 40 : fs::path backup_path = fsbridge::AbsPathJoin(GetWalletDir(), backup_filename);
4251 [ - + + - : 80 : if (!local_wallet->BackupWallet(fs::PathToString(backup_path))) {
- + ]
4252 [ # # ]: 0 : return util::Error{_("Error: Unable to make a backup of your wallet")};
4253 : : }
4254 [ + - ]: 40 : res.backup_path = backup_path;
4255 : :
4256 : 40 : bool success = false;
4257 : :
4258 : : // Unlock the wallet if needed
4259 [ + - + + : 40 : if (local_wallet->IsLocked() && !local_wallet->Unlock(passphrase)) {
+ - + + ]
4260 [ + + ]: 3 : if (passphrase.find('\0') == std::string::npos) {
4261 [ + - + - ]: 6 : return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase was not provided or was incorrect.")};
4262 : : } else {
4263 [ + - + - ]: 2 : return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase entered was incorrect. "
4264 : : "The passphrase contains a null character (ie - a zero byte). "
4265 : : "If this passphrase was set with a version of this software prior to 25.0, "
4266 : : "please try again with only the characters up to — but not including — "
4267 : 1 : "the first null character.")};
4268 : : }
4269 : : }
4270 : :
4271 : : // Indicates whether the current wallet is empty after migration.
4272 : : // Notes:
4273 : : // When non-empty: the local wallet becomes the main spendable wallet.
4274 : : // When empty: The local wallet is excluded from the result, as the
4275 : : // user does not expect an empty spendable wallet after
4276 : : // migrating only watch-only scripts.
4277 : 37 : bool empty_local_wallet = false;
4278 : :
4279 : 37 : {
4280 [ + - ]: 37 : LOCK(local_wallet->cs_wallet);
4281 : : // First change to using SQLite
4282 [ + - - + : 37 : if (!local_wallet->MigrateToSQLite(error)) return util::Error{error};
- - - - ]
4283 : :
4284 : : // Do the migration of keys and scripts for non-empty wallets, and cleanup if it fails
4285 [ + - + + ]: 37 : if (HasLegacyRecords(*local_wallet)) {
4286 [ + - ]: 34 : success = DoMigration(*local_wallet, context, error, res);
4287 : : // No scripts mean empty wallet after migration
4288 [ + - ]: 34 : empty_local_wallet = local_wallet->GetAllScriptPubKeyMans().empty();
4289 : : } else {
4290 : : // Make sure that descriptors flag is actually set
4291 [ + - ]: 3 : local_wallet->SetWalletFlag(WALLET_FLAG_DESCRIPTORS);
4292 : : success = true;
4293 : : }
4294 : 0 : }
4295 : :
4296 : : // In case of loading failure, we need to remember the wallet dirs to remove.
4297 : : // A `set` is used as it may be populated with the same wallet directory paths multiple times,
4298 : : // both before and after loading. This ensures the set is complete even if one of the wallets
4299 : : // fails to load.
4300 [ + + ]: 37 : std::set<fs::path> wallet_dirs;
4301 [ + + ]: 37 : if (success) {
4302 : 35 : Assume(!res.wallet); // We will set it here.
4303 : : // Check if the local wallet is empty after migration
4304 [ + + ]: 35 : if (empty_local_wallet) {
4305 : : // This wallet has no records. We can safely remove it.
4306 [ + - ]: 2 : std::vector<fs::path> paths_to_remove = local_wallet->GetDatabase().Files();
4307 : 2 : local_wallet.reset();
4308 [ + - + + ]: 6 : for (const auto& path_to_remove : paths_to_remove) fs::remove_all(path_to_remove);
4309 : 2 : }
4310 : :
4311 : : // Migration successful, load all the migrated wallets.
4312 [ + + ]: 140 : for (std::shared_ptr<CWallet>* wallet_ptr : {&local_wallet, &res.watchonly_wallet, &res.solvables_wallet}) {
4313 [ + + + + ]: 105 : if (success && *wallet_ptr) {
4314 : 48 : std::shared_ptr<CWallet>& wallet = *wallet_ptr;
4315 : : // Save db path and load wallet
4316 [ + - + - : 240 : wallet_dirs.insert(fs::PathFromString(wallet->GetDatabase().Filename()).parent_path());
+ - + - ]
4317 [ - + ]: 48 : assert(wallet.use_count() == 1);
4318 [ - + ]: 48 : std::string wallet_name = wallet->GetName();
4319 : 48 : wallet.reset();
4320 [ + - - + ]: 96 : wallet = LoadWallet(context, wallet_name, /*load_on_start=*/std::nullopt, options, status, error, warnings);
4321 [ + + ]: 48 : success = (wallet != nullptr);
4322 : :
4323 : : // When no wallet is set, set the main wallet.
4324 [ + + + + ]: 48 : if (success && !res.wallet) {
4325 [ + - ]: 34 : res.wallet_name = wallet->GetName();
4326 : 34 : res.wallet = std::move(wallet);
4327 : : }
4328 : 48 : }
4329 : : }
4330 : : }
4331 [ + + ]: 35 : if (!success) {
4332 : : // Make list of wallets to cleanup
4333 : 3 : std::vector<std::shared_ptr<CWallet>> created_wallets;
4334 [ + + + - ]: 3 : if (local_wallet) created_wallets.push_back(std::move(local_wallet));
4335 [ + + + - ]: 3 : if (res.watchonly_wallet) created_wallets.push_back(std::move(res.watchonly_wallet));
4336 [ - + - - ]: 3 : if (res.solvables_wallet) created_wallets.push_back(std::move(res.solvables_wallet));
4337 : :
4338 : : // Get the directories to remove after unloading
4339 [ + + ]: 7 : for (std::shared_ptr<CWallet>& w : created_wallets) {
4340 [ + - + - : 12 : wallet_dirs.emplace(fs::PathFromString(w->GetDatabase().Filename()).parent_path());
+ - + - ]
4341 : : }
4342 : :
4343 : : // Unload the wallets
4344 [ + + ]: 7 : for (std::shared_ptr<CWallet>& w : created_wallets) {
4345 [ - + ]: 4 : if (w->HaveChain()) {
4346 : : // Unloading for wallets that were loaded for normal use
4347 [ # # # # ]: 0 : if (!RemoveWallet(context, w, /*load_on_start=*/false)) {
4348 [ # # # # ]: 0 : error += _("\nUnable to cleanup failed migration");
4349 [ # # ]: 0 : return util::Error{error};
4350 : : }
4351 [ # # ]: 0 : WaitForDeleteWallet(std::move(w));
4352 : : } else {
4353 : : // Unloading for wallets in local context
4354 [ - + ]: 4 : assert(w.use_count() == 1);
4355 : 4 : w.reset();
4356 : : }
4357 : : }
4358 : :
4359 : : // Delete the wallet directories
4360 [ + + ]: 8 : for (const fs::path& dir : wallet_dirs) {
4361 [ + - ]: 5 : fs::remove_all(dir);
4362 : : }
4363 : :
4364 : : // Restore the backup
4365 : : // Convert the backup file to the wallet db file by renaming it and moving it into the wallet's directory.
4366 [ + - ]: 3 : bilingual_str restore_error;
4367 [ + - ]: 6 : const auto& ptr_wallet = RestoreWallet(context, backup_path, wallet_name, /*load_on_start=*/std::nullopt, status, restore_error, warnings, /*load_after_restore=*/false);
4368 [ - + ]: 3 : if (!restore_error.empty()) {
4369 [ # # # # ]: 0 : error += restore_error + _("\nUnable to restore backup of wallet.");
4370 [ # # ]: 0 : return util::Error{error};
4371 : : }
4372 : : // Verify that the legacy wallet is not loaded after restoring from the backup.
4373 [ - + ]: 3 : assert(!ptr_wallet);
4374 : :
4375 [ + - ]: 9 : return util::Error{error};
4376 : 3 : }
4377 : 34 : return res;
4378 : 197 : }
4379 : :
4380 : 78340 : void CWallet::CacheNewScriptPubKeys(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4381 : : {
4382 [ + + ]: 561390 : for (const auto& script : spks) {
4383 : 483050 : m_cached_spks[script].push_back(spkm);
4384 : : }
4385 : 78340 : }
4386 : :
4387 : 78340 : void CWallet::TopUpCallback(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4388 : : {
4389 : : // Update scriptPubKey cache
4390 : 78340 : CacheNewScriptPubKeys(spks, spkm);
4391 : 78340 : }
4392 : :
4393 : 7 : std::set<CExtPubKey> CWallet::GetActiveHDPubKeys() const
4394 : : {
4395 : 7 : AssertLockHeld(cs_wallet);
4396 : :
4397 : 7 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4398 : :
4399 [ + - ]: 7 : std::set<CExtPubKey> active_xpubs;
4400 [ + - + + ]: 30 : for (const auto& spkm : GetActiveScriptPubKeyMans()) {
4401 [ + - ]: 23 : const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4402 [ - + ]: 23 : assert(desc_spkm);
4403 [ + - ]: 23 : LOCK(desc_spkm->cs_desc_man);
4404 [ + - ]: 23 : WalletDescriptor w_desc = desc_spkm->GetWalletDescriptor();
4405 : :
4406 [ + - ]: 23 : std::set<CPubKey> desc_pubkeys;
4407 : 23 : std::set<CExtPubKey> desc_xpubs;
4408 [ + - ]: 23 : w_desc.descriptor->GetPubKeys(desc_pubkeys, desc_xpubs);
4409 : 23 : active_xpubs.merge(std::move(desc_xpubs));
4410 [ + - ]: 46 : }
4411 : 7 : return active_xpubs;
4412 : 0 : }
4413 : :
4414 : 8 : std::optional<CKey> CWallet::GetKey(const CKeyID& keyid) const
4415 : : {
4416 : 8 : Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4417 : :
4418 [ + + ]: 9 : for (const auto& spkm : GetAllScriptPubKeyMans()) {
4419 [ + - ]: 8 : const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4420 [ - + ]: 8 : assert(desc_spkm);
4421 [ + - ]: 8 : LOCK(desc_spkm->cs_desc_man);
4422 [ + - + + ]: 8 : if (std::optional<CKey> key = desc_spkm->GetKey(keyid)) {
4423 [ + - ]: 7 : return key;
4424 [ + - ]: 1 : }
4425 : 8 : }
4426 : 1 : return std::nullopt;
4427 : : }
4428 : :
4429 : 17328 : void CWallet::WriteBestBlock() const
4430 : : {
4431 : 17328 : AssertLockHeld(cs_wallet);
4432 : :
4433 [ + + ]: 34656 : if (!m_last_block_processed.IsNull()) {
4434 : 17287 : CBlockLocator loc;
4435 [ + - ]: 17287 : chain().findBlock(m_last_block_processed, FoundBlock().locator(loc));
4436 : :
4437 [ + - ]: 17287 : if (!loc.IsNull()) {
4438 [ + - ]: 17287 : WalletBatch batch(GetDatabase());
4439 [ + - ]: 17287 : batch.WriteBestBlock(loc);
4440 : 17287 : }
4441 : 17287 : }
4442 : 17328 : }
4443 : :
4444 : 36469 : void CWallet::RefreshTXOsFromTx(const CWalletTx& wtx)
4445 : : {
4446 : 36469 : AssertLockHeld(cs_wallet);
4447 [ - + + + ]: 185080 : for (uint32_t i = 0; i < wtx.tx->vout.size(); ++i) {
4448 : 148611 : const CTxOut& txout = wtx.tx->vout.at(i);
4449 [ + + ]: 148611 : if (!IsMine(txout)) continue;
4450 : 59959 : COutPoint outpoint(wtx.GetHash(), i);
4451 [ + + ]: 59959 : if (m_txos.contains(outpoint)) {
4452 : : } else {
4453 : 45427 : m_txos.emplace(outpoint, WalletTXO{wtx, txout});
4454 : : }
4455 : : }
4456 : 36469 : }
4457 : :
4458 : 616 : void CWallet::RefreshAllTXOs()
4459 : : {
4460 : 616 : AssertLockHeld(cs_wallet);
4461 [ + + ]: 2885 : for (const auto& [_, wtx] : mapWallet) {
4462 : 2269 : RefreshTXOsFromTx(wtx);
4463 : : }
4464 : 616 : }
4465 : :
4466 : 176262 : std::optional<WalletTXO> CWallet::GetTXO(const COutPoint& outpoint) const
4467 : : {
4468 : 176262 : AssertLockHeld(cs_wallet);
4469 : 176262 : const auto& it = m_txos.find(outpoint);
4470 [ + + ]: 176262 : if (it == m_txos.end()) {
4471 : 166191 : return std::nullopt;
4472 : : }
4473 : 10071 : return it->second;
4474 : : }
4475 : : } // namespace wallet
|