Bitcoin Core Fuzz Coverage Report

Coverage Report

Created: 2026-03-24 13:57

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/root/bitcoin/src/wallet/rpc/backup.cpp
Line
Count
Source
1
// Copyright (c) 2009-present The Bitcoin Core developers
2
// Distributed under the MIT software license, see the accompanying
3
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5
#include <chain.h>
6
#include <clientversion.h>
7
#include <core_io.h>
8
#include <hash.h>
9
#include <interfaces/chain.h>
10
#include <key_io.h>
11
#include <merkleblock.h>
12
#include <node/types.h>
13
#include <rpc/util.h>
14
#include <script/descriptor.h>
15
#include <script/script.h>
16
#include <script/solver.h>
17
#include <sync.h>
18
#include <uint256.h>
19
#include <util/bip32.h>
20
#include <util/check.h>
21
#include <util/fs.h>
22
#include <util/time.h>
23
#include <util/translation.h>
24
#include <wallet/rpc/util.h>
25
#include <wallet/wallet.h>
26
27
#include <cstdint>
28
#include <fstream>
29
#include <tuple>
30
#include <string>
31
32
#include <univalue.h>
33
34
35
36
using interfaces::FoundBlock;
37
38
namespace wallet {
39
RPCHelpMan importprunedfunds()
40
0
{
41
0
    return RPCHelpMan{
42
0
        "importprunedfunds",
43
0
        "Imports funds without rescan. Corresponding address or script must previously be included in wallet. Aimed towards pruned wallets. The end-user is responsible to import additional transactions that subsequently spend the imported outputs or rescan after the point in the blockchain the transaction is included.\n",
44
0
                {
45
0
                    {"rawtransaction", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "A raw transaction in hex funding an already-existing address in wallet"},
46
0
                    {"txoutproof", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The hex output from gettxoutproof that contains the transaction"},
47
0
                },
48
0
                RPCResult{RPCResult::Type::NONE, "", ""},
49
0
                RPCExamples{""},
50
0
        [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
51
0
{
52
0
    std::shared_ptr<CWallet> const pwallet = GetWalletForJSONRPCRequest(request);
53
0
    if (!pwallet) return UniValue::VNULL;
54
55
0
    CMutableTransaction tx;
56
0
    if (!DecodeHexTx(tx, request.params[0].get_str())) {
57
0
        throw JSONRPCError(RPC_DESERIALIZATION_ERROR, "TX decode failed. Make sure the tx has at least one input.");
58
0
    }
59
60
0
    CMerkleBlock merkleBlock;
61
0
    SpanReader{ParseHexV(request.params[1], "proof")} >> merkleBlock;
62
63
    //Search partial merkle tree in proof for our transaction and index in valid block
64
0
    std::vector<Txid> vMatch;
65
0
    std::vector<unsigned int> vIndex;
66
0
    if (merkleBlock.txn.ExtractMatches(vMatch, vIndex) != merkleBlock.header.hashMerkleRoot) {
67
0
        throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Something wrong with merkleblock");
68
0
    }
69
70
0
    LOCK(pwallet->cs_wallet);
Line
Count
Source
266
0
#define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__)
Line
Count
Source
11
0
#define UNIQUE_NAME(name) PASTE2(name, __COUNTER__)
Line
Count
Source
9
0
#define PASTE2(x, y) PASTE(x, y)
Line
Count
Source
8
0
#define PASTE(x, y) x ## y
71
0
    int height;
72
0
    if (!pwallet->chain().findAncestorByHash(pwallet->GetLastBlockHash(), merkleBlock.header.GetHash(), FoundBlock().height(height))) {
73
0
        throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Block not found in chain");
74
0
    }
75
76
0
    std::vector<Txid>::const_iterator it;
77
0
    if ((it = std::find(vMatch.begin(), vMatch.end(), tx.GetHash())) == vMatch.end()) {
78
0
        throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Transaction given doesn't exist in proof");
79
0
    }
80
81
0
    unsigned int txnIndex = vIndex[it - vMatch.begin()];
82
83
0
    CTransactionRef tx_ref = MakeTransactionRef(tx);
84
0
    if (pwallet->IsMine(*tx_ref)) {
85
0
        pwallet->AddToWallet(std::move(tx_ref), TxStateConfirmed{merkleBlock.header.GetHash(), height, static_cast<int>(txnIndex)});
86
0
        return UniValue::VNULL;
87
0
    }
88
89
0
    throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "No addresses in wallet correspond to included transaction");
90
0
},
91
0
    };
92
0
}
93
94
RPCHelpMan removeprunedfunds()
95
0
{
96
0
    return RPCHelpMan{
97
0
        "removeprunedfunds",
98
0
        "Deletes the specified transaction from the wallet. Meant for use with pruned wallets and as a companion to importprunedfunds. This will affect wallet balances.\n",
99
0
                {
100
0
                    {"txid", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The hex-encoded id of the transaction you are deleting"},
101
0
                },
102
0
                RPCResult{RPCResult::Type::NONE, "", ""},
103
0
                RPCExamples{
104
0
                    HelpExampleCli("removeprunedfunds", "\"a8d0c0184dde994a09ec054286f1ce581bebf46446a512166eae7628734ea0a5\"") +
105
0
            "\nAs a JSON-RPC call\n"
106
0
            + HelpExampleRpc("removeprunedfunds", "\"a8d0c0184dde994a09ec054286f1ce581bebf46446a512166eae7628734ea0a5\"")
107
0
                },
108
0
        [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
109
0
{
110
0
    std::shared_ptr<CWallet> const pwallet = GetWalletForJSONRPCRequest(request);
111
0
    if (!pwallet) return UniValue::VNULL;
112
113
0
    LOCK(pwallet->cs_wallet);
Line
Count
Source
266
0
#define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__)
Line
Count
Source
11
0
#define UNIQUE_NAME(name) PASTE2(name, __COUNTER__)
Line
Count
Source
9
0
#define PASTE2(x, y) PASTE(x, y)
Line
Count
Source
8
0
#define PASTE(x, y) x ## y
114
115
0
    Txid hash{Txid::FromUint256(ParseHashV(request.params[0], "txid"))};
116
0
    std::vector<Txid> vHash;
117
0
    vHash.push_back(hash);
118
0
    if (auto res = pwallet->RemoveTxs(vHash); !res) {
119
0
        throw JSONRPCError(RPC_WALLET_ERROR, util::ErrorString(res).original);
120
0
    }
121
122
0
    return UniValue::VNULL;
123
0
},
124
0
    };
125
0
}
126
127
static int64_t GetImportTimestamp(const UniValue& data, int64_t now)
128
0
{
129
0
    if (data.exists("timestamp")) {
130
0
        const UniValue& timestamp = data["timestamp"];
131
0
        if (timestamp.isNum()) {
132
0
            return timestamp.getInt<int64_t>();
133
0
        } else if (timestamp.isStr() && timestamp.get_str() == "now") {
134
0
            return now;
135
0
        }
136
0
        throw JSONRPCError(RPC_TYPE_ERROR, strprintf("Expected number or \"now\" timestamp value for key. got type %s", uvTypeName(timestamp.type())));
Line
Count
Source
1172
0
#define strprintf tfm::format
137
0
    }
138
0
    throw JSONRPCError(RPC_TYPE_ERROR, "Missing required timestamp field for key");
139
0
}
140
141
static UniValue ProcessDescriptorImport(CWallet& wallet, const UniValue& data, const int64_t timestamp) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet)
142
0
{
143
0
    UniValue warnings(UniValue::VARR);
144
0
    UniValue result(UniValue::VOBJ);
145
146
0
    try {
147
0
        if (!data.exists("desc")) {
148
0
            throw JSONRPCError(RPC_INVALID_PARAMETER, "Descriptor not found.");
149
0
        }
150
151
0
        const std::string& descriptor = data["desc"].get_str();
152
0
        const bool active = data.exists("active") ? data["active"].get_bool() : false;
153
0
        const std::string label{LabelFromValue(data["label"])};
154
155
        // Parse descriptor string
156
0
        FlatSigningProvider keys;
157
0
        std::string error;
158
0
        auto parsed_descs = Parse(descriptor, keys, error, /* require_checksum = */ true);
159
0
        if (parsed_descs.empty()) {
160
0
            throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, error);
161
0
        }
162
0
        std::optional<bool> internal;
163
0
        if (data.exists("internal")) {
164
0
            if (parsed_descs.size() > 1) {
165
0
                throw JSONRPCError(RPC_INVALID_ADDRESS_OR_KEY, "Cannot have multipath descriptor while also specifying \'internal\'");
166
0
            }
167
0
            internal = data["internal"].get_bool();
168
0
        }
169
170
        // Range check
171
0
        std::optional<bool> is_ranged;
172
0
        int64_t range_start = 0, range_end = 1, next_index = 0;
173
0
        if (!parsed_descs.at(0)->IsRange() && data.exists("range")) {
174
0
            throw JSONRPCError(RPC_INVALID_PARAMETER, "Range should not be specified for an un-ranged descriptor");
175
0
        } else if (parsed_descs.at(0)->IsRange()) {
176
0
            if (data.exists("range")) {
177
0
                auto range = ParseDescriptorRange(data["range"]);
178
0
                range_start = range.first;
179
0
                range_end = range.second + 1; // Specified range end is inclusive, but we need range end as exclusive
180
0
            } else {
181
0
                warnings.push_back("Range not given, using default keypool range");
182
0
                range_start = 0;
183
0
                range_end = wallet.m_keypool_size;
184
0
            }
185
0
            next_index = range_start;
186
0
            is_ranged = true;
187
188
0
            if (data.exists("next_index")) {
189
0
                next_index = data["next_index"].getInt<int64_t>();
190
                // bound checks
191
0
                if (next_index < range_start || next_index >= range_end) {
192
0
                    throw JSONRPCError(RPC_INVALID_PARAMETER, "next_index is out of range");
193
0
                }
194
0
            }
195
0
        }
196
197
        // Active descriptors must be ranged
198
0
        if (active && !parsed_descs.at(0)->IsRange()) {
199
0
            throw JSONRPCError(RPC_INVALID_PARAMETER, "Active descriptors must be ranged");
200
0
        }
201
202
        // Multipath descriptors should not have a label
203
0
        if (parsed_descs.size() > 1 && data.exists("label")) {
204
0
            throw JSONRPCError(RPC_INVALID_PARAMETER, "Multipath descriptors should not have a label");
205
0
        }
206
207
        // Ranged descriptors should not have a label
208
0
        if (is_ranged.has_value() && is_ranged.value() && data.exists("label")) {
209
0
            throw JSONRPCError(RPC_INVALID_PARAMETER, "Ranged descriptors should not have a label");
210
0
        }
211
212
0
        bool desc_internal = internal.has_value() && internal.value();
213
        // Internal addresses should not have a label either
214
0
        if (desc_internal && data.exists("label")) {
215
0
            throw JSONRPCError(RPC_INVALID_PARAMETER, "Internal addresses should not have a label");
216
0
        }
217
218
        // Combo descriptor check
219
0
        if (active && !parsed_descs.at(0)->IsSingleType()) {
220
0
            throw JSONRPCError(RPC_WALLET_ERROR, "Combo descriptors cannot be set to active");
221
0
        }
222
223
        // If the wallet disabled private keys, abort if private keys exist
224
0
        if (wallet.IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) && !keys.keys.empty()) {
225
0
            throw JSONRPCError(RPC_WALLET_ERROR, "Cannot import private keys to a wallet with private keys disabled");
226
0
        }
227
228
0
        for (size_t j = 0; j < parsed_descs.size(); ++j) {
229
0
            auto parsed_desc = std::move(parsed_descs[j]);
230
0
            if (parsed_descs.size() == 2) {
231
0
                desc_internal = j == 1;
232
0
            } else if (parsed_descs.size() > 2) {
233
0
                CHECK_NONFATAL(!desc_internal);
Line
Count
Source
110
0
    inline_check_non_fatal(condition, std::source_location::current(), #condition)
234
0
            }
235
            // Need to ExpandPrivate to check if private keys are available for all pubkeys
236
0
            FlatSigningProvider expand_keys;
237
0
            std::vector<CScript> scripts;
238
0
            if (!parsed_desc->Expand(0, keys, scripts, expand_keys)) {
239
0
                throw JSONRPCError(RPC_WALLET_ERROR, "Cannot expand descriptor. Probably because of hardened derivations without private keys provided");
240
0
            }
241
0
            parsed_desc->ExpandPrivate(0, keys, expand_keys);
242
243
0
            for (const auto& w : parsed_desc->Warnings()) {
244
0
               warnings.push_back(w);
245
0
            }
246
247
            // Check if all private keys are provided
248
0
            bool have_all_privkeys = !expand_keys.keys.empty();
249
0
            for (const auto& entry : expand_keys.origins) {
250
0
                const CKeyID& key_id = entry.first;
251
0
                CKey key;
252
0
                if (!expand_keys.GetKey(key_id, key)) {
253
0
                    have_all_privkeys = false;
254
0
                    break;
255
0
                }
256
0
            }
257
258
            // If private keys are enabled, check some things.
259
0
            if (!wallet.IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
260
0
               if (keys.keys.empty()) {
261
0
                    throw JSONRPCError(RPC_WALLET_ERROR, "Cannot import descriptor without private keys to a wallet with private keys enabled");
262
0
               }
263
0
               if (!have_all_privkeys) {
264
0
                   warnings.push_back("Not all private keys provided. Some wallet functionality may return unexpected errors");
265
0
               }
266
0
            }
267
268
0
            WalletDescriptor w_desc(std::move(parsed_desc), timestamp, range_start, range_end, next_index);
269
270
            // Add descriptor to the wallet
271
0
            auto spk_manager_res = wallet.AddWalletDescriptor(w_desc, keys, label, desc_internal);
272
273
0
            if (!spk_manager_res) {
274
0
                throw JSONRPCError(RPC_WALLET_ERROR, strprintf("Could not add descriptor '%s': %s", descriptor, util::ErrorString(spk_manager_res).original));
Line
Count
Source
1172
0
#define strprintf tfm::format
275
0
            }
276
277
0
            auto& spk_manager = spk_manager_res.value().get();
278
279
            // Set descriptor as active if necessary
280
0
            if (active) {
281
0
                if (!w_desc.descriptor->GetOutputType()) {
282
0
                    warnings.push_back("Unknown output type, cannot set descriptor to active.");
283
0
                } else {
284
0
                    wallet.AddActiveScriptPubKeyMan(spk_manager.GetID(), *w_desc.descriptor->GetOutputType(), desc_internal);
285
0
                }
286
0
            } else {
287
0
                if (w_desc.descriptor->GetOutputType()) {
288
0
                    wallet.DeactivateScriptPubKeyMan(spk_manager.GetID(), *w_desc.descriptor->GetOutputType(), desc_internal);
289
0
                }
290
0
            }
291
0
        }
292
293
0
        result.pushKV("success", UniValue(true));
294
0
    } catch (const UniValue& e) {
295
0
        result.pushKV("success", UniValue(false));
296
0
        result.pushKV("error", e);
297
0
    }
298
0
    PushWarnings(warnings, result);
299
0
    return result;
300
0
}
301
302
RPCHelpMan importdescriptors()
303
0
{
304
0
    return RPCHelpMan{
305
0
        "importdescriptors",
306
0
        "Import descriptors. This will trigger a rescan of the blockchain based on the earliest timestamp of all descriptors being imported. Requires a new wallet backup.\n"
307
0
        "When importing descriptors with multipath key expressions, if the multipath specifier contains exactly two elements, the descriptor produced from the second element will be imported as an internal descriptor.\n"
308
0
            "\nNote: This call can take over an hour to complete if using an early timestamp; during that time, other rpc calls\n"
309
0
            "may report that the imported keys, addresses or scripts exist but related transactions are still missing.\n"
310
0
            "The rescan is significantly faster if block filters are available (using startup option \"-blockfilterindex=1\").\n",
311
0
                {
312
0
                    {"requests", RPCArg::Type::ARR, RPCArg::Optional::NO, "Data to be imported",
313
0
                        {
314
0
                            {"", RPCArg::Type::OBJ, RPCArg::Optional::OMITTED, "",
315
0
                                {
316
0
                                    {"desc", RPCArg::Type::STR, RPCArg::Optional::NO, "Descriptor to import."},
317
0
                                    {"active", RPCArg::Type::BOOL, RPCArg::Default{false}, "Set this descriptor to be the active descriptor for the corresponding output type/externality"},
318
0
                                    {"range", RPCArg::Type::RANGE, RPCArg::Optional::OMITTED, "If a ranged descriptor is used, this specifies the end or the range (in the form [begin,end]) to import"},
319
0
                                    {"next_index", RPCArg::Type::NUM, RPCArg::Optional::OMITTED, "If a ranged descriptor is set to active, this specifies the next index to generate addresses from"},
320
0
                                    {"timestamp", RPCArg::Type::NUM, RPCArg::Optional::NO, "Time from which to start rescanning the blockchain for this descriptor, in " + UNIX_EPOCH_TIME + "\n"
321
0
                                        "Use the string \"now\" to substitute the current synced blockchain time.\n"
322
0
                                        "\"now\" can be specified to bypass scanning, for outputs which are known to never have been used, and\n"
323
0
                                        "0 can be specified to scan the entire blockchain. Blocks up to 2 hours before the earliest timestamp\n"
324
0
                                        "of all descriptors being imported will be scanned as well as the mempool.",
325
0
                                        RPCArgOptions{.type_str={"timestamp | \"now\"", "integer / string"}}
326
0
                                    },
327
0
                                    {"internal", RPCArg::Type::BOOL, RPCArg::Default{false}, "Whether matching outputs should be treated as not incoming payments (e.g. change)"},
328
0
                                    {"label", RPCArg::Type::STR, RPCArg::Default{""}, "Label to assign to the address, only allowed with internal=false. Disabled for ranged descriptors"},
329
0
                                },
330
0
                            },
331
0
                        },
332
0
                        RPCArgOptions{.oneline_description="requests"}},
333
0
                },
334
0
                RPCResult{
335
0
                    RPCResult::Type::ARR, "", "Response is an array with the same size as the input that has the execution result",
336
0
                    {
337
0
                        {RPCResult::Type::OBJ, "", "",
338
0
                        {
339
0
                            {RPCResult::Type::BOOL, "success", ""},
340
0
                            {RPCResult::Type::ARR, "warnings", /*optional=*/true, "",
341
0
                            {
342
0
                                {RPCResult::Type::STR, "", ""},
343
0
                            }},
344
0
                            {RPCResult::Type::OBJ, "error", /*optional=*/true, "",
345
0
                            {
346
0
                                {RPCResult::Type::ELISION, "", "JSONRPC error"},
347
0
                            }},
348
0
                        }},
349
0
                    }
350
0
                },
351
0
                RPCExamples{
352
0
                    HelpExampleCli("importdescriptors", "'[{ \"desc\": \"<my descriptor>\", \"timestamp\":1455191478, \"internal\": true }, "
353
0
                                          "{ \"desc\": \"<my descriptor 2>\", \"label\": \"example 2\", \"timestamp\": 1455191480 }]'") +
354
0
                    HelpExampleCli("importdescriptors", "'[{ \"desc\": \"<my descriptor>\", \"timestamp\":1455191478, \"active\": true, \"range\": [0,100], \"label\": \"<my bech32 wallet>\" }]'")
355
0
                },
356
0
        [&](const RPCHelpMan& self, const JSONRPCRequest& main_request) -> UniValue
357
0
{
358
0
    std::shared_ptr<CWallet> const pwallet = GetWalletForJSONRPCRequest(main_request);
359
0
    if (!pwallet) return UniValue::VNULL;
360
0
    CWallet& wallet{*pwallet};
361
362
    // Make sure the results are valid at least up to the most recent block
363
    // the user could have gotten from another RPC command prior to now
364
0
    wallet.BlockUntilSyncedToCurrentChain();
365
366
0
    WalletRescanReserver reserver(*pwallet);
367
0
    if (!reserver.reserve(/*with_passphrase=*/true)) {
368
0
        throw JSONRPCError(RPC_WALLET_ERROR, "Wallet is currently rescanning. Abort existing rescan or wait.");
369
0
    }
370
371
    // Ensure that the wallet is not locked for the remainder of this RPC, as
372
    // the passphrase is used to top up the keypool.
373
0
    LOCK(pwallet->m_relock_mutex);
Line
Count
Source
266
0
#define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__)
Line
Count
Source
11
0
#define UNIQUE_NAME(name) PASTE2(name, __COUNTER__)
Line
Count
Source
9
0
#define PASTE2(x, y) PASTE(x, y)
Line
Count
Source
8
0
#define PASTE(x, y) x ## y
374
375
0
    const UniValue& requests = main_request.params[0];
376
0
    const int64_t minimum_timestamp = 1;
377
0
    int64_t now = 0;
378
0
    int64_t lowest_timestamp = 0;
379
0
    bool rescan = false;
380
0
    UniValue response(UniValue::VARR);
381
0
    {
382
0
        LOCK(pwallet->cs_wallet);
Line
Count
Source
266
0
#define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__)
Line
Count
Source
11
0
#define UNIQUE_NAME(name) PASTE2(name, __COUNTER__)
Line
Count
Source
9
0
#define PASTE2(x, y) PASTE(x, y)
Line
Count
Source
8
0
#define PASTE(x, y) x ## y
383
0
        EnsureWalletIsUnlocked(*pwallet);
384
385
0
        CHECK_NONFATAL(pwallet->chain().findBlock(pwallet->GetLastBlockHash(), FoundBlock().time(lowest_timestamp).mtpTime(now)));
Line
Count
Source
110
0
    inline_check_non_fatal(condition, std::source_location::current(), #condition)
386
387
        // Get all timestamps and extract the lowest timestamp
388
0
        for (const UniValue& request : requests.getValues()) {
389
            // This throws an error if "timestamp" doesn't exist
390
0
            const int64_t timestamp = std::max(GetImportTimestamp(request, now), minimum_timestamp);
391
0
            const UniValue result = ProcessDescriptorImport(*pwallet, request, timestamp);
392
0
            response.push_back(result);
393
394
0
            if (lowest_timestamp > timestamp ) {
395
0
                lowest_timestamp = timestamp;
396
0
            }
397
398
            // If we know the chain tip, and at least one request was successful then allow rescan
399
0
            if (!rescan && result["success"].get_bool()) {
400
0
                rescan = true;
401
0
            }
402
0
        }
403
0
        pwallet->ConnectScriptPubKeyManNotifiers();
404
0
        pwallet->RefreshAllTXOs();
405
0
    }
406
407
    // Rescan the blockchain using the lowest timestamp
408
0
    if (rescan) {
409
0
        int64_t scanned_time = pwallet->RescanFromTime(lowest_timestamp, reserver, /*update=*/true);
410
0
        pwallet->ResubmitWalletTransactions(node::TxBroadcast::MEMPOOL_NO_BROADCAST, /*force=*/true);
411
412
0
        if (pwallet->IsAbortingRescan()) {
413
0
            throw JSONRPCError(RPC_MISC_ERROR, "Rescan aborted by user.");
414
0
        }
415
416
0
        if (scanned_time > lowest_timestamp) {
417
0
            std::vector<UniValue> results = response.getValues();
418
0
            response.clear();
419
0
            response.setArray();
420
421
            // Compose the response
422
0
            for (unsigned int i = 0; i < requests.size(); ++i) {
423
0
                const UniValue& request = requests.getValues().at(i);
424
425
                // If the descriptor timestamp is within the successfully scanned
426
                // range, or if the import result already has an error set, let
427
                // the result stand unmodified. Otherwise replace the result
428
                // with an error message.
429
0
                if (scanned_time <= GetImportTimestamp(request, now) || results.at(i).exists("error")) {
430
0
                    response.push_back(results.at(i));
431
0
                } else {
432
0
                    std::string error_msg{strprintf("Rescan failed for descriptor with timestamp %d. There "
Line
Count
Source
1172
0
#define strprintf tfm::format
433
0
                            "was an error reading a block from time %d, which is after or within %d seconds "
434
0
                            "of key creation, and could contain transactions pertaining to the desc. As a "
435
0
                            "result, transactions and coins using this desc may not appear in the wallet.",
436
0
                            GetImportTimestamp(request, now), scanned_time - TIMESTAMP_WINDOW - 1, TIMESTAMP_WINDOW)};
437
0
                    if (pwallet->chain().havePruned()) {
438
0
                        error_msg += strprintf(" This error could be caused by pruning or data corruption "
Line
Count
Source
1172
0
#define strprintf tfm::format
439
0
                                "(see bitcoind log for details) and could be dealt with by downloading and "
440
0
                                "rescanning the relevant blocks (see -reindex option and rescanblockchain RPC).");
441
0
                    } else if (pwallet->chain().hasAssumedValidChain()) {
442
0
                        error_msg += strprintf(" This error is likely caused by an in-progress assumeutxo "
Line
Count
Source
1172
0
#define strprintf tfm::format
443
0
                                "background sync. Check logs or getchainstates RPC for assumeutxo background "
444
0
                                "sync progress and try again later.");
445
0
                    } else {
446
0
                        error_msg += strprintf(" This error could potentially caused by data corruption. If "
Line
Count
Source
1172
0
#define strprintf tfm::format
447
0
                                "the issue persists you may want to reindex (see -reindex option).");
448
0
                    }
449
450
0
                    UniValue result = UniValue(UniValue::VOBJ);
451
0
                    result.pushKV("success", UniValue(false));
452
0
                    result.pushKV("error", JSONRPCError(RPC_MISC_ERROR, error_msg));
453
0
                    response.push_back(std::move(result));
454
0
                }
455
0
            }
456
0
        }
457
0
    }
458
459
0
    return response;
460
0
},
461
0
    };
462
0
}
463
464
RPCHelpMan listdescriptors()
465
0
{
466
0
    return RPCHelpMan{
467
0
        "listdescriptors",
468
0
        "List all descriptors present in a wallet.\n",
469
0
        {
470
0
            {"private", RPCArg::Type::BOOL, RPCArg::Default{false}, "Show private descriptors."}
471
0
        },
472
0
        RPCResult{RPCResult::Type::OBJ, "", "", {
473
0
            {RPCResult::Type::STR, "wallet_name", "Name of wallet this operation was performed on"},
474
0
            {RPCResult::Type::ARR, "descriptors", "Array of descriptor objects (sorted by descriptor string representation)",
475
0
            {
476
0
                {RPCResult::Type::OBJ, "", "", {
477
0
                    {RPCResult::Type::STR, "desc", "Descriptor string representation"},
478
0
                    {RPCResult::Type::NUM, "timestamp", "The creation time of the descriptor"},
479
0
                    {RPCResult::Type::BOOL, "active", "Whether this descriptor is currently used to generate new addresses"},
480
0
                    {RPCResult::Type::BOOL, "internal", /*optional=*/true, "True if this descriptor is used to generate change addresses. False if this descriptor is used to generate receiving addresses; defined only for active descriptors"},
481
0
                    {RPCResult::Type::ARR_FIXED, "range", /*optional=*/true, "Defined only for ranged descriptors", {
482
0
                        {RPCResult::Type::NUM, "", "Range start inclusive"},
483
0
                        {RPCResult::Type::NUM, "", "Range end inclusive"},
484
0
                    }},
485
0
                    {RPCResult::Type::NUM, "next", /*optional=*/true, "Same as next_index field. Kept for compatibility reason."},
486
0
                    {RPCResult::Type::NUM, "next_index", /*optional=*/true, "The next index to generate addresses from; defined only for ranged descriptors"},
487
0
                }},
488
0
            }}
489
0
        }},
490
0
        RPCExamples{
491
0
            HelpExampleCli("listdescriptors", "") + HelpExampleRpc("listdescriptors", "")
492
0
            + HelpExampleCli("listdescriptors", "true") + HelpExampleRpc("listdescriptors", "true")
493
0
        },
494
0
        [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
495
0
{
496
0
    const std::shared_ptr<const CWallet> wallet = GetWalletForJSONRPCRequest(request);
497
0
    if (!wallet) return UniValue::VNULL;
498
499
0
    const bool priv = !request.params[0].isNull() && request.params[0].get_bool();
500
0
    if (wallet->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) && priv) {
501
0
        throw JSONRPCError(RPC_WALLET_ERROR, "Can't get private descriptor string for watch-only wallets");
502
0
    }
503
0
    if (priv) {
504
0
        EnsureWalletIsUnlocked(*wallet);
505
0
    }
506
507
0
    LOCK(wallet->cs_wallet);
Line
Count
Source
266
0
#define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__)
Line
Count
Source
11
0
#define UNIQUE_NAME(name) PASTE2(name, __COUNTER__)
Line
Count
Source
9
0
#define PASTE2(x, y) PASTE(x, y)
Line
Count
Source
8
0
#define PASTE(x, y) x ## y
508
509
0
    const auto active_spk_mans = wallet->GetActiveScriptPubKeyMans();
510
511
0
    struct WalletDescInfo {
512
0
        std::string descriptor;
513
0
        uint64_t creation_time;
514
0
        bool active;
515
0
        std::optional<bool> internal;
516
0
        std::optional<std::pair<int64_t,int64_t>> range;
517
0
        int64_t next_index;
518
0
    };
519
520
0
    std::vector<WalletDescInfo> wallet_descriptors;
521
0
    for (const auto& spk_man : wallet->GetAllScriptPubKeyMans()) {
522
0
        const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man);
523
0
        if (!desc_spk_man) {
524
0
            throw JSONRPCError(RPC_WALLET_ERROR, "Unexpected ScriptPubKey manager type.");
525
0
        }
526
0
        LOCK(desc_spk_man->cs_desc_man);
Line
Count
Source
266
0
#define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__)
Line
Count
Source
11
0
#define UNIQUE_NAME(name) PASTE2(name, __COUNTER__)
Line
Count
Source
9
0
#define PASTE2(x, y) PASTE(x, y)
Line
Count
Source
8
0
#define PASTE(x, y) x ## y
527
0
        const auto& wallet_descriptor = desc_spk_man->GetWalletDescriptor();
528
0
        std::string descriptor;
529
0
        CHECK_NONFATAL(desc_spk_man->GetDescriptorString(descriptor, priv));
Line
Count
Source
110
0
    inline_check_non_fatal(condition, std::source_location::current(), #condition)
530
0
        const bool is_range = wallet_descriptor.descriptor->IsRange();
531
0
        wallet_descriptors.push_back({
532
0
            descriptor,
533
0
            wallet_descriptor.creation_time,
534
0
            active_spk_mans.contains(desc_spk_man),
535
0
            wallet->IsInternalScriptPubKeyMan(desc_spk_man),
536
0
            is_range ? std::optional(std::make_pair(wallet_descriptor.range_start, wallet_descriptor.range_end)) : std::nullopt,
537
0
            wallet_descriptor.next_index
538
0
        });
539
0
    }
540
541
0
    std::sort(wallet_descriptors.begin(), wallet_descriptors.end(), [](const auto& a, const auto& b) {
542
0
        return a.descriptor < b.descriptor;
543
0
    });
544
545
0
    UniValue descriptors(UniValue::VARR);
546
0
    for (const WalletDescInfo& info : wallet_descriptors) {
547
0
        UniValue spk(UniValue::VOBJ);
548
0
        spk.pushKV("desc", info.descriptor);
549
0
        spk.pushKV("timestamp", info.creation_time);
550
0
        spk.pushKV("active", info.active);
551
0
        if (info.internal.has_value()) {
552
0
            spk.pushKV("internal", info.internal.value());
553
0
        }
554
0
        if (info.range.has_value()) {
555
0
            UniValue range(UniValue::VARR);
556
0
            range.push_back(info.range->first);
557
0
            range.push_back(info.range->second - 1);
558
0
            spk.pushKV("range", std::move(range));
559
0
            spk.pushKV("next", info.next_index);
560
0
            spk.pushKV("next_index", info.next_index);
561
0
        }
562
0
        descriptors.push_back(std::move(spk));
563
0
    }
564
565
0
    UniValue response(UniValue::VOBJ);
566
0
    response.pushKV("wallet_name", wallet->GetName());
567
0
    response.pushKV("descriptors", std::move(descriptors));
568
569
0
    return response;
570
0
},
571
0
    };
572
0
}
573
574
RPCHelpMan backupwallet()
575
0
{
576
0
    return RPCHelpMan{
577
0
        "backupwallet",
578
0
        "Safely copies the current wallet file to the specified destination, which can either be a directory or a path with a filename.\n",
579
0
                {
580
0
                    {"destination", RPCArg::Type::STR, RPCArg::Optional::NO, "The destination directory or file"},
581
0
                },
582
0
                RPCResult{RPCResult::Type::NONE, "", ""},
583
0
                RPCExamples{
584
0
                    HelpExampleCli("backupwallet", "\"backup.dat\"")
585
0
            + HelpExampleRpc("backupwallet", "\"backup.dat\"")
586
0
                },
587
0
        [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
588
0
{
589
0
    const std::shared_ptr<const CWallet> pwallet = GetWalletForJSONRPCRequest(request);
590
0
    if (!pwallet) return UniValue::VNULL;
591
592
    // Make sure the results are valid at least up to the most recent block
593
    // the user could have gotten from another RPC command prior to now
594
0
    pwallet->BlockUntilSyncedToCurrentChain();
595
596
0
    LOCK(pwallet->cs_wallet);
Line
Count
Source
266
0
#define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__)
Line
Count
Source
11
0
#define UNIQUE_NAME(name) PASTE2(name, __COUNTER__)
Line
Count
Source
9
0
#define PASTE2(x, y) PASTE(x, y)
Line
Count
Source
8
0
#define PASTE(x, y) x ## y
597
598
0
    std::string strDest = request.params[0].get_str();
599
0
    if (!pwallet->BackupWallet(strDest)) {
600
0
        throw JSONRPCError(RPC_WALLET_ERROR, "Error: Wallet backup failed!");
601
0
    }
602
603
0
    return UniValue::VNULL;
604
0
},
605
0
    };
606
0
}
607
608
609
RPCHelpMan restorewallet()
610
0
{
611
0
    return RPCHelpMan{
612
0
        "restorewallet",
613
0
        "Restores and loads a wallet from backup.\n"
614
0
        "\nThe rescan is significantly faster if block filters are available"
615
0
        "\n(using startup option \"-blockfilterindex=1\").\n",
616
0
        {
617
0
            {"wallet_name", RPCArg::Type::STR, RPCArg::Optional::NO, "The name that will be applied to the restored wallet"},
618
0
            {"backup_file", RPCArg::Type::STR, RPCArg::Optional::NO, "The backup file that will be used to restore the wallet."},
619
0
            {"load_on_startup", RPCArg::Type::BOOL, RPCArg::Optional::OMITTED, "Save wallet name to persistent settings and load on startup. True to add wallet to startup list, false to remove, null to leave unchanged."},
620
0
        },
621
0
        RPCResult{
622
0
            RPCResult::Type::OBJ, "", "",
623
0
            {
624
0
                {RPCResult::Type::STR, "name", "The wallet name if restored successfully."},
625
0
                {RPCResult::Type::ARR, "warnings", /*optional=*/true, "Warning messages, if any, related to restoring and loading the wallet.",
626
0
                {
627
0
                    {RPCResult::Type::STR, "", ""},
628
0
                }},
629
0
            }
630
0
        },
631
0
        RPCExamples{
632
0
            HelpExampleCli("restorewallet", "\"testwallet\" \"home\\backups\\backup-file.bak\"")
633
0
            + HelpExampleRpc("restorewallet", "\"testwallet\" \"home\\backups\\backup-file.bak\"")
634
0
            + HelpExampleCliNamed("restorewallet", {{"wallet_name", "testwallet"}, {"backup_file", "home\\backups\\backup-file.bak\""}, {"load_on_startup", true}})
635
0
            + HelpExampleRpcNamed("restorewallet", {{"wallet_name", "testwallet"}, {"backup_file", "home\\backups\\backup-file.bak\""}, {"load_on_startup", true}})
636
0
        },
637
0
        [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
638
0
{
639
640
0
    WalletContext& context = EnsureWalletContext(request.context);
641
642
0
    auto backup_file = fs::u8path(request.params[1].get_str());
643
644
0
    std::string wallet_name = request.params[0].get_str();
645
646
0
    std::optional<bool> load_on_start = request.params[2].isNull() ? std::nullopt : std::optional<bool>(request.params[2].get_bool());
647
648
0
    DatabaseStatus status;
649
0
    bilingual_str error;
650
0
    std::vector<bilingual_str> warnings;
651
652
0
    const std::shared_ptr<CWallet> wallet = RestoreWallet(context, backup_file, wallet_name, load_on_start, status, error, warnings);
653
654
0
    HandleWalletError(wallet, status, error);
655
656
0
    UniValue obj(UniValue::VOBJ);
657
0
    obj.pushKV("name", wallet->GetName());
658
0
    PushWarnings(warnings, obj);
659
660
0
    return obj;
661
662
0
},
663
0
    };
664
0
}
665
} // namespace wallet