/root/bitcoin/src/wallet/wallet.cpp
Line | Count | Source |
1 | | // Copyright (c) 2009-2010 Satoshi Nakamoto |
2 | | // Copyright (c) 2009-present The Bitcoin Core developers |
3 | | // Distributed under the MIT software license, see the accompanying |
4 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
5 | | |
6 | | #include <wallet/wallet.h> |
7 | | |
8 | | #include <bitcoin-build-config.h> // IWYU pragma: keep |
9 | | #include <addresstype.h> |
10 | | #include <blockfilter.h> |
11 | | #include <chain.h> |
12 | | #include <coins.h> |
13 | | #include <common/args.h> |
14 | | #include <common/messages.h> |
15 | | #include <common/settings.h> |
16 | | #include <common/signmessage.h> |
17 | | #include <common/system.h> |
18 | | #include <consensus/amount.h> |
19 | | #include <consensus/consensus.h> |
20 | | #include <consensus/validation.h> |
21 | | #include <external_signer.h> |
22 | | #include <interfaces/chain.h> |
23 | | #include <interfaces/handler.h> |
24 | | #include <interfaces/wallet.h> |
25 | | #include <kernel/mempool_removal_reason.h> |
26 | | #include <kernel/types.h> |
27 | | #include <key.h> |
28 | | #include <key_io.h> |
29 | | #include <logging.h> |
30 | | #include <node/types.h> |
31 | | #include <outputtype.h> |
32 | | #include <policy/feerate.h> |
33 | | #include <policy/truc_policy.h> |
34 | | #include <primitives/block.h> |
35 | | #include <primitives/transaction.h> |
36 | | #include <psbt.h> |
37 | | #include <pubkey.h> |
38 | | #include <random.h> |
39 | | #include <script/descriptor.h> |
40 | | #include <script/interpreter.h> |
41 | | #include <script/script.h> |
42 | | #include <script/sign.h> |
43 | | #include <script/signingprovider.h> |
44 | | #include <script/solver.h> |
45 | | #include <serialize.h> |
46 | | #include <span.h> |
47 | | #include <streams.h> |
48 | | #include <support/allocators/secure.h> |
49 | | #include <support/allocators/zeroafterfree.h> |
50 | | #include <support/cleanse.h> |
51 | | #include <sync.h> |
52 | | #include <tinyformat.h> |
53 | | #include <uint256.h> |
54 | | #include <univalue.h> |
55 | | #include <util/check.h> |
56 | | #include <util/fs.h> |
57 | | #include <util/fs_helpers.h> |
58 | | #include <util/moneystr.h> |
59 | | #include <util/result.h> |
60 | | #include <util/string.h> |
61 | | #include <util/time.h> |
62 | | #include <util/translation.h> |
63 | | #include <wallet/coincontrol.h> |
64 | | #include <wallet/context.h> |
65 | | #include <wallet/crypter.h> |
66 | | #include <wallet/db.h> |
67 | | #include <wallet/external_signer_scriptpubkeyman.h> |
68 | | #include <wallet/scriptpubkeyman.h> |
69 | | #include <wallet/transaction.h> |
70 | | #include <wallet/types.h> |
71 | | #include <wallet/walletdb.h> |
72 | | #include <wallet/walletutil.h> |
73 | | |
74 | | #include <algorithm> |
75 | | #include <cassert> |
76 | | #include <condition_variable> |
77 | | #include <exception> |
78 | | #include <optional> |
79 | | #include <stdexcept> |
80 | | #include <thread> |
81 | | #include <tuple> |
82 | | #include <variant> |
83 | | |
84 | | struct KeyOriginInfo; |
85 | | |
86 | | using common::AmountErrMsg; |
87 | | using common::AmountHighWarn; |
88 | | using common::PSBTError; |
89 | | using interfaces::FoundBlock; |
90 | | using kernel::ChainstateRole; |
91 | | using util::ReplaceAll; |
92 | | using util::ToString; |
93 | | |
94 | | namespace wallet { |
95 | | |
96 | | bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name) |
97 | 0 | { |
98 | 0 | const auto update_function = [&wallet_name](common::SettingsValue& setting_value) { |
99 | 0 | if (!setting_value.isArray()) setting_value.setArray(); |
100 | 0 | for (const auto& value : setting_value.getValues()) { |
101 | 0 | if (value.isStr() && value.get_str() == wallet_name) return interfaces::SettingsAction::SKIP_WRITE; |
102 | 0 | } |
103 | 0 | setting_value.push_back(wallet_name); |
104 | 0 | return interfaces::SettingsAction::WRITE; |
105 | 0 | }; |
106 | 0 | return chain.updateRwSetting("wallet", update_function); |
107 | 0 | } |
108 | | |
109 | | bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name) |
110 | 0 | { |
111 | 0 | const auto update_function = [&wallet_name](common::SettingsValue& setting_value) { |
112 | 0 | if (!setting_value.isArray()) return interfaces::SettingsAction::SKIP_WRITE; |
113 | 0 | common::SettingsValue new_value(common::SettingsValue::VARR); |
114 | 0 | for (const auto& value : setting_value.getValues()) { |
115 | 0 | if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value); |
116 | 0 | } |
117 | 0 | if (new_value.size() == setting_value.size()) return interfaces::SettingsAction::SKIP_WRITE; |
118 | 0 | setting_value = std::move(new_value); |
119 | 0 | return interfaces::SettingsAction::WRITE; |
120 | 0 | }; |
121 | 0 | return chain.updateRwSetting("wallet", update_function); |
122 | 0 | } |
123 | | |
124 | | static void UpdateWalletSetting(interfaces::Chain& chain, |
125 | | const std::string& wallet_name, |
126 | | std::optional<bool> load_on_startup, |
127 | | std::vector<bilingual_str>& warnings) |
128 | 0 | { |
129 | 0 | if (!load_on_startup) return; |
130 | 0 | if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) { |
131 | 0 | warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup.")); |
132 | 0 | } else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) { |
133 | 0 | warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup.")); |
134 | 0 | } |
135 | 0 | } |
136 | | |
137 | | /** |
138 | | * Refresh mempool status so the wallet is in an internally consistent state and |
139 | | * immediately knows the transaction's status: Whether it can be considered |
140 | | * trusted and is eligible to be abandoned ... |
141 | | */ |
142 | | static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain) |
143 | 0 | { |
144 | 0 | if (chain.isInMempool(tx.GetHash())) { |
145 | 0 | tx.m_state = TxStateInMempool(); |
146 | 0 | } else if (tx.state<TxStateInMempool>()) { |
147 | 0 | tx.m_state = TxStateInactive(); |
148 | 0 | } |
149 | 0 | } |
150 | | |
151 | | bool AddWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet) |
152 | 0 | { |
153 | 0 | LOCK(context.wallets_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
154 | 0 | assert(wallet); |
155 | 0 | std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet); |
156 | 0 | if (i != context.wallets.end()) return false; |
157 | 0 | context.wallets.push_back(wallet); |
158 | 0 | wallet->ConnectScriptPubKeyManNotifiers(); |
159 | 0 | wallet->NotifyCanGetAddressesChanged(); |
160 | 0 | return true; |
161 | 0 | } |
162 | | |
163 | | bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings) |
164 | 0 | { |
165 | 0 | assert(wallet); |
166 | | |
167 | 0 | interfaces::Chain& chain = wallet->chain(); |
168 | 0 | std::string name = wallet->GetName(); |
169 | 0 | WITH_LOCK(wallet->cs_wallet, wallet->WriteBestBlock()); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
170 | | |
171 | | // Unregister with the validation interface which also drops shared pointers. |
172 | 0 | wallet->DisconnectChainNotifications(); |
173 | 0 | { |
174 | 0 | LOCK(context.wallets_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
175 | 0 | std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet); |
176 | 0 | if (i == context.wallets.end()) return false; |
177 | 0 | context.wallets.erase(i); |
178 | 0 | } |
179 | | // Notify unload so that upper layers release the shared pointer. |
180 | 0 | wallet->NotifyUnload(); |
181 | | |
182 | | // Write the wallet setting |
183 | 0 | UpdateWalletSetting(chain, name, load_on_start, warnings); |
184 | |
|
185 | 0 | return true; |
186 | 0 | } |
187 | | |
188 | | bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start) |
189 | 0 | { |
190 | 0 | std::vector<bilingual_str> warnings; |
191 | 0 | return RemoveWallet(context, wallet, load_on_start, warnings); |
192 | 0 | } |
193 | | |
194 | | std::vector<std::shared_ptr<CWallet>> GetWallets(WalletContext& context) |
195 | 0 | { |
196 | 0 | LOCK(context.wallets_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
197 | 0 | return context.wallets; |
198 | 0 | } |
199 | | |
200 | | std::shared_ptr<CWallet> GetDefaultWallet(WalletContext& context, size_t& count) |
201 | 0 | { |
202 | 0 | LOCK(context.wallets_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
203 | 0 | count = context.wallets.size(); |
204 | 0 | return count == 1 ? context.wallets[0] : nullptr; |
205 | 0 | } |
206 | | |
207 | | std::shared_ptr<CWallet> GetWallet(WalletContext& context, const std::string& name) |
208 | 0 | { |
209 | 0 | LOCK(context.wallets_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
210 | 0 | for (const std::shared_ptr<CWallet>& wallet : context.wallets) { |
211 | 0 | if (wallet->GetName() == name) return wallet; |
212 | 0 | } |
213 | 0 | return nullptr; |
214 | 0 | } |
215 | | |
216 | | std::unique_ptr<interfaces::Handler> HandleLoadWallet(WalletContext& context, LoadWalletFn load_wallet) |
217 | 0 | { |
218 | 0 | LOCK(context.wallets_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
219 | 0 | auto it = context.wallet_load_fns.emplace(context.wallet_load_fns.end(), std::move(load_wallet)); |
220 | 0 | return interfaces::MakeCleanupHandler([&context, it] { LOCK(context.wallets_mutex); context.wallet_load_fns.erase(it); });Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
221 | 0 | } |
222 | | |
223 | | void NotifyWalletLoaded(WalletContext& context, const std::shared_ptr<CWallet>& wallet) |
224 | 0 | { |
225 | 0 | LOCK(context.wallets_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
226 | 0 | for (auto& load_wallet : context.wallet_load_fns) { |
227 | 0 | load_wallet(interfaces::MakeWallet(context, wallet)); |
228 | 0 | } |
229 | 0 | } |
230 | | |
231 | | static GlobalMutex g_loading_wallet_mutex; |
232 | | static GlobalMutex g_wallet_release_mutex; |
233 | | static std::condition_variable g_wallet_release_cv; |
234 | | static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex); |
235 | | static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex); |
236 | | |
237 | | // Custom deleter for shared_ptr<CWallet>. |
238 | | static void FlushAndDeleteWallet(CWallet* wallet) |
239 | 0 | { |
240 | 0 | const std::string name = wallet->GetName(); |
241 | 0 | wallet->WalletLogPrintf("Releasing wallet %s..\n", name); |
242 | 0 | delete wallet; |
243 | | // Wallet is now released, notify WaitForDeleteWallet, if any. |
244 | 0 | { |
245 | 0 | LOCK(g_wallet_release_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
246 | 0 | if (g_unloading_wallet_set.erase(name) == 0) { |
247 | | // WaitForDeleteWallet was not called for this wallet, all done. |
248 | 0 | return; |
249 | 0 | } |
250 | 0 | } |
251 | 0 | g_wallet_release_cv.notify_all(); |
252 | 0 | } |
253 | | |
254 | | void WaitForDeleteWallet(std::shared_ptr<CWallet>&& wallet) |
255 | 0 | { |
256 | | // Mark wallet for unloading. |
257 | 0 | const std::string name = wallet->GetName(); |
258 | 0 | { |
259 | 0 | LOCK(g_wallet_release_mutex); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
260 | 0 | g_unloading_wallet_set.insert(name); |
261 | | // Do not expect to be the only one removing this wallet. |
262 | | // Multiple threads could simultaneously be waiting for deletion. |
263 | 0 | } |
264 | | |
265 | | // Time to ditch our shared_ptr and wait for FlushAndDeleteWallet call. |
266 | 0 | wallet.reset(); |
267 | 0 | { |
268 | 0 | WAIT_LOCK(g_wallet_release_mutex, lock); Line | Count | Source | 272 | 0 | #define WAIT_LOCK(cs, name) UniqueLock name(LOCK_ARGS(cs)) Line | Count | Source | 270 | 0 | #define LOCK_ARGS(cs) MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__ |
|
|
269 | 0 | while (g_unloading_wallet_set.contains(name)) { |
270 | 0 | g_wallet_release_cv.wait(lock); |
271 | 0 | } |
272 | 0 | } |
273 | 0 | } |
274 | | |
275 | | namespace { |
276 | | std::shared_ptr<CWallet> LoadWalletInternal(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings) |
277 | 0 | { |
278 | 0 | try { |
279 | 0 | std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error); |
280 | 0 | if (!database) { |
281 | 0 | error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error; |
282 | 0 | return nullptr; |
283 | 0 | } |
284 | | |
285 | 0 | context.chain->initMessage(_("Loading wallet…")); |
286 | 0 | std::shared_ptr<CWallet> wallet = CWallet::LoadExisting(context, name, std::move(database), error, warnings); |
287 | 0 | if (!wallet) { |
288 | 0 | error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error; |
289 | 0 | status = DatabaseStatus::FAILED_LOAD; |
290 | 0 | return nullptr; |
291 | 0 | } |
292 | | |
293 | 0 | NotifyWalletLoaded(context, wallet); |
294 | 0 | AddWallet(context, wallet); |
295 | 0 | wallet->postInitProcess(); |
296 | | |
297 | | // Write the wallet setting |
298 | 0 | UpdateWalletSetting(*context.chain, name, load_on_start, warnings); |
299 | |
|
300 | 0 | return wallet; |
301 | 0 | } catch (const std::runtime_error& e) { |
302 | 0 | error = Untranslated(e.what()); |
303 | 0 | status = DatabaseStatus::FAILED_LOAD; |
304 | 0 | return nullptr; |
305 | 0 | } |
306 | 0 | } |
307 | | |
308 | | class FastWalletRescanFilter |
309 | | { |
310 | | public: |
311 | 0 | FastWalletRescanFilter(const CWallet& wallet) : m_wallet(wallet) |
312 | 0 | { |
313 | | // create initial filter with scripts from all ScriptPubKeyMans |
314 | 0 | for (auto spkm : m_wallet.GetAllScriptPubKeyMans()) { |
315 | 0 | auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(spkm)}; |
316 | 0 | assert(desc_spkm != nullptr); |
317 | 0 | AddScriptPubKeys(desc_spkm); |
318 | | // save each range descriptor's end for possible future filter updates |
319 | 0 | if (desc_spkm->IsHDEnabled()) { |
320 | 0 | m_last_range_ends.emplace(desc_spkm->GetID(), desc_spkm->GetEndRange()); |
321 | 0 | } |
322 | 0 | } |
323 | 0 | } |
324 | | |
325 | | void UpdateIfNeeded() |
326 | 0 | { |
327 | | // repopulate filter with new scripts if top-up has happened since last iteration |
328 | 0 | for (const auto& [desc_spkm_id, last_range_end] : m_last_range_ends) { |
329 | 0 | auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(m_wallet.GetScriptPubKeyMan(desc_spkm_id))}; |
330 | 0 | assert(desc_spkm != nullptr); |
331 | 0 | int32_t current_range_end{desc_spkm->GetEndRange()}; |
332 | 0 | if (current_range_end > last_range_end) { |
333 | 0 | AddScriptPubKeys(desc_spkm, last_range_end); |
334 | 0 | m_last_range_ends.at(desc_spkm->GetID()) = current_range_end; |
335 | 0 | } |
336 | 0 | } |
337 | 0 | } |
338 | | |
339 | | std::optional<bool> MatchesBlock(const uint256& block_hash) const |
340 | 0 | { |
341 | 0 | return m_wallet.chain().blockFilterMatchesAny(BlockFilterType::BASIC, block_hash, m_filter_set); |
342 | 0 | } |
343 | | |
344 | | private: |
345 | | const CWallet& m_wallet; |
346 | | /** Map for keeping track of each range descriptor's last seen end range. |
347 | | * This information is used to detect whether new addresses were derived |
348 | | * (that is, if the current end range is larger than the saved end range) |
349 | | * after processing a block and hence a filter set update is needed to |
350 | | * take possible keypool top-ups into account. |
351 | | */ |
352 | | std::map<uint256, int32_t> m_last_range_ends; |
353 | | GCSFilter::ElementSet m_filter_set; |
354 | | |
355 | | void AddScriptPubKeys(const DescriptorScriptPubKeyMan* desc_spkm, int32_t last_range_end = 0) |
356 | 0 | { |
357 | 0 | for (const auto& script_pub_key : desc_spkm->GetScriptPubKeys(last_range_end)) { |
358 | 0 | m_filter_set.emplace(script_pub_key.begin(), script_pub_key.end()); |
359 | 0 | } |
360 | 0 | } |
361 | | }; |
362 | | } // namespace |
363 | | |
364 | | std::shared_ptr<CWallet> LoadWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings) |
365 | 0 | { |
366 | 0 | auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name)); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
367 | 0 | if (!result.second) { |
368 | 0 | error = Untranslated("Wallet already loading."); |
369 | 0 | status = DatabaseStatus::FAILED_LOAD; |
370 | 0 | return nullptr; |
371 | 0 | } |
372 | 0 | auto wallet = LoadWalletInternal(context, name, load_on_start, options, status, error, warnings); |
373 | 0 | WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first)); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
374 | 0 | return wallet; |
375 | 0 | } |
376 | | |
377 | | std::shared_ptr<CWallet> CreateWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings) |
378 | 0 | { |
379 | | // Wallet must have a non-empty name |
380 | 0 | if (name.empty()) { |
381 | 0 | error = Untranslated("Wallet name cannot be empty"); |
382 | 0 | status = DatabaseStatus::FAILED_NEW_UNNAMED; |
383 | 0 | return nullptr; |
384 | 0 | } |
385 | | |
386 | 0 | uint64_t wallet_creation_flags = options.create_flags; |
387 | 0 | const SecureString& passphrase = options.create_passphrase; |
388 | | |
389 | | // Only descriptor wallets can be created |
390 | 0 | Assert(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
391 | 0 | options.require_format = DatabaseFormat::SQLITE; |
392 | | |
393 | | // Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted |
394 | 0 | bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET); |
395 | | |
396 | | // Born encrypted wallets need to be created blank first. |
397 | 0 | if (!passphrase.empty()) { |
398 | 0 | wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET; |
399 | 0 | } |
400 | | |
401 | | // Private keys must be disabled for an external signer wallet |
402 | 0 | if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) { |
403 | 0 | error = Untranslated("Private keys must be disabled when using an external signer"); |
404 | 0 | status = DatabaseStatus::FAILED_CREATE; |
405 | 0 | return nullptr; |
406 | 0 | } |
407 | | |
408 | | // Do not allow a passphrase when private keys are disabled |
409 | 0 | if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) { |
410 | 0 | error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled."); |
411 | 0 | status = DatabaseStatus::FAILED_CREATE; |
412 | 0 | return nullptr; |
413 | 0 | } |
414 | | |
415 | | // Wallet::Verify will check if we're trying to create a wallet with a duplicate name. |
416 | 0 | std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error); |
417 | 0 | if (!database) { |
418 | 0 | error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error; |
419 | 0 | status = DatabaseStatus::FAILED_VERIFY; |
420 | 0 | return nullptr; |
421 | 0 | } |
422 | | |
423 | | // Make the wallet |
424 | 0 | context.chain->initMessage(_("Creating wallet…")); |
425 | 0 | std::shared_ptr<CWallet> wallet = CWallet::CreateNew(context, name, std::move(database), wallet_creation_flags, error, warnings); |
426 | 0 | if (!wallet) { |
427 | 0 | error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error; |
428 | 0 | status = DatabaseStatus::FAILED_CREATE; |
429 | 0 | return nullptr; |
430 | 0 | } |
431 | | |
432 | | // Encrypt the wallet |
433 | 0 | if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) { |
434 | 0 | if (!wallet->EncryptWallet(passphrase)) { |
435 | 0 | error = Untranslated("Error: Wallet created but failed to encrypt."); |
436 | 0 | status = DatabaseStatus::FAILED_ENCRYPT; |
437 | 0 | return nullptr; |
438 | 0 | } |
439 | 0 | if (!create_blank) { |
440 | | // Unlock the wallet |
441 | 0 | if (!wallet->Unlock(passphrase)) { |
442 | 0 | error = Untranslated("Error: Wallet was encrypted but could not be unlocked"); |
443 | 0 | status = DatabaseStatus::FAILED_ENCRYPT; |
444 | 0 | return nullptr; |
445 | 0 | } |
446 | | |
447 | | // Set a seed for the wallet |
448 | 0 | { |
449 | 0 | LOCK(wallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
450 | 0 | wallet->SetupDescriptorScriptPubKeyMans(); |
451 | 0 | } |
452 | | |
453 | | // Relock the wallet |
454 | 0 | wallet->Lock(); |
455 | 0 | } |
456 | 0 | } |
457 | | |
458 | 0 | WITH_LOCK(wallet->cs_wallet, wallet->LogStats()); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
459 | 0 | NotifyWalletLoaded(context, wallet); |
460 | 0 | AddWallet(context, wallet); |
461 | 0 | wallet->postInitProcess(); |
462 | | |
463 | | // Write the wallet settings |
464 | 0 | UpdateWalletSetting(*context.chain, name, load_on_start, warnings); |
465 | |
|
466 | 0 | status = DatabaseStatus::SUCCESS; |
467 | 0 | return wallet; |
468 | 0 | } |
469 | | |
470 | | // Re-creates wallet from the backup file by renaming and moving it into the wallet's directory. |
471 | | // If 'load_after_restore=true', the wallet object will be fully initialized and appended to the context. |
472 | | std::shared_ptr<CWallet> RestoreWallet(WalletContext& context, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings, bool load_after_restore, bool allow_unnamed) |
473 | 0 | { |
474 | | // Error if the wallet name is empty and allow_unnamed == false |
475 | | // allow_unnamed == true is only used by migration to migrate an unnamed wallet |
476 | 0 | if (!allow_unnamed && wallet_name.empty()) { |
477 | 0 | error = Untranslated("Wallet name cannot be empty"); |
478 | 0 | status = DatabaseStatus::FAILED_NEW_UNNAMED; |
479 | 0 | return nullptr; |
480 | 0 | } |
481 | | |
482 | 0 | DatabaseOptions options; |
483 | 0 | ReadDatabaseArgs(*context.args, options); |
484 | 0 | options.require_existing = true; |
485 | |
|
486 | 0 | const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name)); |
487 | 0 | auto wallet_file = wallet_path / "wallet.dat"; |
488 | 0 | std::shared_ptr<CWallet> wallet; |
489 | 0 | bool wallet_file_copied = false; |
490 | 0 | bool created_parent_dir = false; |
491 | |
|
492 | 0 | try { |
493 | 0 | if (!fs::exists(backup_file)) { |
494 | 0 | error = Untranslated("Backup file does not exist"); |
495 | 0 | status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE; |
496 | 0 | return nullptr; |
497 | 0 | } |
498 | | |
499 | | // Wallet directories are allowed to exist, but must not contain a .dat file. |
500 | | // Any existing wallet database is treated as a hard failure to prevent overwriting. |
501 | 0 | if (fs::exists(wallet_path)) { |
502 | | // If this is a file, it is the db and we don't want to overwrite it. |
503 | 0 | if (!fs::is_directory(wallet_path)) { |
504 | 0 | error = Untranslated(strprintf("Failed to restore wallet. Database file exists '%s'.", fs::PathToString(wallet_path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
505 | 0 | status = DatabaseStatus::FAILED_ALREADY_EXISTS; |
506 | 0 | return nullptr; |
507 | 0 | } |
508 | | |
509 | | // Check we are not going to overwrite an existing db file |
510 | 0 | if (fs::exists(wallet_file)) { |
511 | 0 | error = Untranslated(strprintf("Failed to restore wallet. Database file exists in '%s'.", fs::PathToString(wallet_file)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
512 | 0 | status = DatabaseStatus::FAILED_ALREADY_EXISTS; |
513 | 0 | return nullptr; |
514 | 0 | } |
515 | 0 | } else { |
516 | | // The directory doesn't exist, create it |
517 | 0 | if (!TryCreateDirectories(wallet_path)) { |
518 | 0 | error = Untranslated(strprintf("Failed to restore database path '%s'.", fs::PathToString(wallet_path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
519 | 0 | status = DatabaseStatus::FAILED_ALREADY_EXISTS; |
520 | 0 | return nullptr; |
521 | 0 | } |
522 | 0 | created_parent_dir = true; |
523 | 0 | } |
524 | | |
525 | 0 | fs::copy_file(backup_file, wallet_file, fs::copy_options::none); |
526 | 0 | wallet_file_copied = true; |
527 | |
|
528 | 0 | if (load_after_restore) { |
529 | 0 | wallet = LoadWallet(context, wallet_name, load_on_start, options, status, error, warnings); |
530 | 0 | } |
531 | 0 | } catch (const std::exception& e) { |
532 | 0 | assert(!wallet); |
533 | 0 | if (!error.empty()) error += Untranslated("\n"); |
534 | 0 | error += Untranslated(strprintf("Unexpected exception: %s", e.what()));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
535 | 0 | } |
536 | | |
537 | | // Remove created wallet path only when loading fails |
538 | 0 | if (load_after_restore && !wallet) { |
539 | 0 | if (wallet_file_copied) fs::remove(wallet_file); |
540 | | // Clean up the parent directory if we created it during restoration. |
541 | | // As we have created it, it must be empty after deleting the wallet file. |
542 | 0 | if (created_parent_dir) { |
543 | 0 | Assume(fs::is_empty(wallet_path)); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
544 | 0 | fs::remove(wallet_path); |
545 | 0 | } |
546 | 0 | } |
547 | |
|
548 | 0 | return wallet; |
549 | 0 | } |
550 | | |
551 | | /** @defgroup mapWallet |
552 | | * |
553 | | * @{ |
554 | | */ |
555 | | |
556 | | const CWalletTx* CWallet::GetWalletTx(const Txid& hash) const |
557 | 0 | { |
558 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
559 | 0 | const auto it = mapWallet.find(hash); |
560 | 0 | if (it == mapWallet.end()) |
561 | 0 | return nullptr; |
562 | 0 | return &(it->second); |
563 | 0 | } |
564 | | |
565 | | void CWallet::UpgradeDescriptorCache() |
566 | 0 | { |
567 | 0 | if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) { |
568 | 0 | return; |
569 | 0 | } |
570 | | |
571 | 0 | for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) { |
572 | 0 | DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm); |
573 | 0 | desc_spkm->UpgradeDescriptorCache(); |
574 | 0 | } |
575 | 0 | SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED); |
576 | 0 | } |
577 | | |
578 | | /* Given a wallet passphrase string and an unencrypted master key, determine the proper key |
579 | | * derivation parameters (should take at least 100ms) and encrypt the master key. */ |
580 | | static bool EncryptMasterKey(const SecureString& wallet_passphrase, const CKeyingMaterial& plain_master_key, CMasterKey& master_key) |
581 | 0 | { |
582 | 0 | constexpr MillisecondsDouble target_time{100}; |
583 | 0 | CCrypter crypter; |
584 | | |
585 | | // Get the weighted average of iterations we can do in 100ms over 2 runs. |
586 | 0 | for (int i = 0; i < 2; i++){ |
587 | 0 | auto start_time{NodeClock::now()}; |
588 | 0 | crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod); |
589 | 0 | auto elapsed_time{NodeClock::now() - start_time}; |
590 | |
|
591 | 0 | if (elapsed_time <= 0s) { |
592 | | // We are probably in a test with a mocked clock. |
593 | 0 | master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS; |
594 | 0 | break; |
595 | 0 | } |
596 | | |
597 | | // target_iterations : elapsed_iterations :: target_time : elapsed_time |
598 | 0 | unsigned int target_iterations = master_key.nDeriveIterations * target_time / elapsed_time; |
599 | | // Get the weighted average with previous runs. |
600 | 0 | master_key.nDeriveIterations = (i * master_key.nDeriveIterations + target_iterations) / (i + 1); |
601 | 0 | } |
602 | |
|
603 | 0 | if (master_key.nDeriveIterations < CMasterKey::DEFAULT_DERIVE_ITERATIONS) { |
604 | 0 | master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS; |
605 | 0 | } |
606 | |
|
607 | 0 | if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) { |
608 | 0 | return false; |
609 | 0 | } |
610 | 0 | if (!crypter.Encrypt(plain_master_key, master_key.vchCryptedKey)) { |
611 | 0 | return false; |
612 | 0 | } |
613 | | |
614 | 0 | return true; |
615 | 0 | } |
616 | | |
617 | | static bool DecryptMasterKey(const SecureString& wallet_passphrase, const CMasterKey& master_key, CKeyingMaterial& plain_master_key) |
618 | 0 | { |
619 | 0 | CCrypter crypter; |
620 | 0 | if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) { |
621 | 0 | return false; |
622 | 0 | } |
623 | 0 | if (!crypter.Decrypt(master_key.vchCryptedKey, plain_master_key)) { |
624 | 0 | return false; |
625 | 0 | } |
626 | | |
627 | 0 | return true; |
628 | 0 | } |
629 | | |
630 | | bool CWallet::Unlock(const SecureString& strWalletPassphrase) |
631 | 0 | { |
632 | 0 | CKeyingMaterial plain_master_key; |
633 | |
|
634 | 0 | { |
635 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
636 | 0 | for (const auto& [_, master_key] : mapMasterKeys) |
637 | 0 | { |
638 | 0 | if (!DecryptMasterKey(strWalletPassphrase, master_key, plain_master_key)) { |
639 | 0 | continue; // try another master key |
640 | 0 | } |
641 | 0 | if (Unlock(plain_master_key)) { |
642 | | // Now that we've unlocked, upgrade the descriptor cache |
643 | 0 | UpgradeDescriptorCache(); |
644 | 0 | return true; |
645 | 0 | } |
646 | 0 | } |
647 | 0 | } |
648 | 0 | return false; |
649 | 0 | } |
650 | | |
651 | | bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase) |
652 | 0 | { |
653 | 0 | bool fWasLocked = IsLocked(); |
654 | |
|
655 | 0 | { |
656 | 0 | LOCK2(m_relock_mutex, cs_wallet); Line | Count | Source | 268 | 0 | UniqueLock criticalblock1(MaybeCheckNotHeld(cs1), #cs1, __FILE__, __LINE__); \ | 269 | 0 | UniqueLock criticalblock2(MaybeCheckNotHeld(cs2), #cs2, __FILE__, __LINE__) |
|
657 | 0 | Lock(); |
658 | |
|
659 | 0 | CKeyingMaterial plain_master_key; |
660 | 0 | for (auto& [master_key_id, master_key] : mapMasterKeys) |
661 | 0 | { |
662 | 0 | if (!DecryptMasterKey(strOldWalletPassphrase, master_key, plain_master_key)) { |
663 | 0 | return false; |
664 | 0 | } |
665 | 0 | if (Unlock(plain_master_key)) |
666 | 0 | { |
667 | 0 | if (!EncryptMasterKey(strNewWalletPassphrase, plain_master_key, master_key)) { |
668 | 0 | return false; |
669 | 0 | } |
670 | 0 | WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", master_key.nDeriveIterations); |
671 | |
|
672 | 0 | WalletBatch(GetDatabase()).WriteMasterKey(master_key_id, master_key); |
673 | 0 | if (fWasLocked) |
674 | 0 | Lock(); |
675 | 0 | return true; |
676 | 0 | } |
677 | 0 | } |
678 | 0 | } |
679 | | |
680 | 0 | return false; |
681 | 0 | } |
682 | | |
683 | | void CWallet::SetLastBlockProcessedInMem(int block_height, uint256 block_hash) |
684 | 0 | { |
685 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
686 | |
|
687 | 0 | m_last_block_processed = block_hash; |
688 | 0 | m_last_block_processed_height = block_height; |
689 | 0 | } |
690 | | |
691 | | void CWallet::SetLastBlockProcessed(int block_height, uint256 block_hash) |
692 | 0 | { |
693 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
694 | |
|
695 | 0 | SetLastBlockProcessedInMem(block_height, block_hash); |
696 | 0 | WriteBestBlock(); |
697 | 0 | } |
698 | | |
699 | | std::set<Txid> CWallet::GetConflicts(const Txid& txid) const |
700 | 0 | { |
701 | 0 | std::set<Txid> result; |
702 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
703 | |
|
704 | 0 | const auto it = mapWallet.find(txid); |
705 | 0 | if (it == mapWallet.end()) |
706 | 0 | return result; |
707 | 0 | const CWalletTx& wtx = it->second; |
708 | |
|
709 | 0 | std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range; |
710 | |
|
711 | 0 | for (const CTxIn& txin : wtx.tx->vin) |
712 | 0 | { |
713 | 0 | if (mapTxSpends.count(txin.prevout) <= 1) |
714 | 0 | continue; // No conflict if zero or one spends |
715 | 0 | range = mapTxSpends.equal_range(txin.prevout); |
716 | 0 | for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) |
717 | 0 | result.insert(_it->second); |
718 | 0 | } |
719 | 0 | return result; |
720 | 0 | } |
721 | | |
722 | | bool CWallet::HasWalletSpend(const CTransactionRef& tx) const |
723 | 0 | { |
724 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
725 | 0 | const Txid& txid = tx->GetHash(); |
726 | 0 | for (unsigned int i = 0; i < tx->vout.size(); ++i) { |
727 | 0 | if (IsSpent(COutPoint(txid, i))) { |
728 | 0 | return true; |
729 | 0 | } |
730 | 0 | } |
731 | 0 | return false; |
732 | 0 | } |
733 | | |
734 | | void CWallet::Close() |
735 | 0 | { |
736 | 0 | GetDatabase().Close(); |
737 | 0 | } |
738 | | |
739 | | void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range) |
740 | 0 | { |
741 | | // We want all the wallet transactions in range to have the same metadata as |
742 | | // the oldest (smallest nOrderPos). |
743 | | // So: find smallest nOrderPos: |
744 | |
|
745 | 0 | int nMinOrderPos = std::numeric_limits<int>::max(); |
746 | 0 | const CWalletTx* copyFrom = nullptr; |
747 | 0 | for (TxSpends::iterator it = range.first; it != range.second; ++it) { |
748 | 0 | const CWalletTx* wtx = &mapWallet.at(it->second); |
749 | 0 | if (wtx->nOrderPos < nMinOrderPos) { |
750 | 0 | nMinOrderPos = wtx->nOrderPos; |
751 | 0 | copyFrom = wtx; |
752 | 0 | } |
753 | 0 | } |
754 | |
|
755 | 0 | if (!copyFrom) { |
756 | 0 | return; |
757 | 0 | } |
758 | | |
759 | | // Now copy data from copyFrom to rest: |
760 | 0 | for (TxSpends::iterator it = range.first; it != range.second; ++it) |
761 | 0 | { |
762 | 0 | const Txid& hash = it->second; |
763 | 0 | CWalletTx* copyTo = &mapWallet.at(hash); |
764 | 0 | if (copyFrom == copyTo) continue; |
765 | 0 | assert(copyFrom && "Oldest wallet transaction in range assumed to have been found."); |
766 | 0 | if (!copyFrom->IsEquivalentTo(*copyTo)) continue; |
767 | 0 | copyTo->mapValue = copyFrom->mapValue; |
768 | 0 | copyTo->vOrderForm = copyFrom->vOrderForm; |
769 | | // nTimeReceived not copied on purpose |
770 | 0 | copyTo->nTimeSmart = copyFrom->nTimeSmart; |
771 | | // nOrderPos not copied on purpose |
772 | | // cached members not copied on purpose |
773 | 0 | } |
774 | 0 | } |
775 | | |
776 | | /** |
777 | | * Outpoint is spent if any non-conflicted transaction |
778 | | * spends it: |
779 | | */ |
780 | | bool CWallet::IsSpent(const COutPoint& outpoint) const |
781 | 0 | { |
782 | 0 | std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range; |
783 | 0 | range = mapTxSpends.equal_range(outpoint); |
784 | |
|
785 | 0 | for (TxSpends::const_iterator it = range.first; it != range.second; ++it) { |
786 | 0 | const Txid& txid = it->second; |
787 | 0 | const auto mit = mapWallet.find(txid); |
788 | 0 | if (mit != mapWallet.end()) { |
789 | 0 | const auto& wtx = mit->second; |
790 | 0 | if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted()) |
791 | 0 | return true; // Spent |
792 | 0 | } |
793 | 0 | } |
794 | 0 | return false; |
795 | 0 | } |
796 | | |
797 | | void CWallet::AddToSpends(const COutPoint& outpoint, const Txid& txid) |
798 | 0 | { |
799 | 0 | mapTxSpends.insert(std::make_pair(outpoint, txid)); |
800 | |
|
801 | 0 | UnlockCoin(outpoint); |
802 | |
|
803 | 0 | std::pair<TxSpends::iterator, TxSpends::iterator> range; |
804 | 0 | range = mapTxSpends.equal_range(outpoint); |
805 | 0 | SyncMetaData(range); |
806 | 0 | } |
807 | | |
808 | | |
809 | | void CWallet::AddToSpends(const CWalletTx& wtx) |
810 | 0 | { |
811 | 0 | if (wtx.IsCoinBase()) // Coinbases don't spend anything! |
812 | 0 | return; |
813 | | |
814 | 0 | for (const CTxIn& txin : wtx.tx->vin) |
815 | 0 | AddToSpends(txin.prevout, wtx.GetHash()); |
816 | 0 | } |
817 | | |
818 | | bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase) |
819 | 0 | { |
820 | | // Only descriptor wallets can be encrypted |
821 | 0 | Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
822 | |
|
823 | 0 | if (HasEncryptionKeys()) |
824 | 0 | return false; |
825 | | |
826 | 0 | CKeyingMaterial plain_master_key; |
827 | |
|
828 | 0 | plain_master_key.resize(WALLET_CRYPTO_KEY_SIZE); |
829 | 0 | GetStrongRandBytes(plain_master_key); |
830 | |
|
831 | 0 | CMasterKey master_key; |
832 | |
|
833 | 0 | master_key.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE); |
834 | 0 | GetStrongRandBytes(master_key.vchSalt); |
835 | |
|
836 | 0 | if (!EncryptMasterKey(strWalletPassphrase, plain_master_key, master_key)) { |
837 | 0 | return false; |
838 | 0 | } |
839 | 0 | WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", master_key.nDeriveIterations); |
840 | |
|
841 | 0 | { |
842 | 0 | LOCK2(m_relock_mutex, cs_wallet); Line | Count | Source | 268 | 0 | UniqueLock criticalblock1(MaybeCheckNotHeld(cs1), #cs1, __FILE__, __LINE__); \ | 269 | 0 | UniqueLock criticalblock2(MaybeCheckNotHeld(cs2), #cs2, __FILE__, __LINE__) |
|
843 | 0 | mapMasterKeys[++nMasterKeyMaxID] = master_key; |
844 | 0 | WalletBatch* encrypted_batch = new WalletBatch(GetDatabase()); |
845 | 0 | if (!encrypted_batch->TxnBegin()) { |
846 | 0 | delete encrypted_batch; |
847 | 0 | encrypted_batch = nullptr; |
848 | 0 | return false; |
849 | 0 | } |
850 | 0 | encrypted_batch->WriteMasterKey(nMasterKeyMaxID, master_key); |
851 | |
|
852 | 0 | for (const auto& spk_man_pair : m_spk_managers) { |
853 | 0 | auto spk_man = spk_man_pair.second.get(); |
854 | 0 | if (!spk_man->Encrypt(plain_master_key, encrypted_batch)) { |
855 | 0 | encrypted_batch->TxnAbort(); |
856 | 0 | delete encrypted_batch; |
857 | 0 | encrypted_batch = nullptr; |
858 | | // We now probably have half of our keys encrypted in memory, and half not... |
859 | | // die and let the user reload the unencrypted wallet. |
860 | 0 | assert(false); |
861 | 0 | } |
862 | 0 | } |
863 | | |
864 | 0 | if (!encrypted_batch->TxnCommit()) { |
865 | 0 | delete encrypted_batch; |
866 | 0 | encrypted_batch = nullptr; |
867 | | // We now have keys encrypted in memory, but not on disk... |
868 | | // die to avoid confusion and let the user reload the unencrypted wallet. |
869 | 0 | assert(false); |
870 | 0 | } |
871 | | |
872 | 0 | delete encrypted_batch; |
873 | 0 | encrypted_batch = nullptr; |
874 | |
|
875 | 0 | Lock(); |
876 | 0 | Unlock(strWalletPassphrase); |
877 | | |
878 | | // Make new descriptors with a new seed |
879 | 0 | if (!IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) { |
880 | 0 | SetupDescriptorScriptPubKeyMans(); |
881 | 0 | } |
882 | 0 | Lock(); |
883 | | |
884 | | // Need to completely rewrite the wallet file; if we don't, the database might keep |
885 | | // bits of the unencrypted private key in slack space in the database file. |
886 | 0 | GetDatabase().Rewrite(); |
887 | 0 | } |
888 | 0 | NotifyStatusChanged(this); |
889 | |
|
890 | 0 | return true; |
891 | 0 | } |
892 | | |
893 | | DBErrors CWallet::ReorderTransactions() |
894 | 0 | { |
895 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
896 | 0 | WalletBatch batch(GetDatabase()); |
897 | | |
898 | | // Old wallets didn't have any defined order for transactions |
899 | | // Probably a bad idea to change the output of this |
900 | | |
901 | | // First: get all CWalletTx into a sorted-by-time multimap. |
902 | 0 | typedef std::multimap<int64_t, CWalletTx*> TxItems; |
903 | 0 | TxItems txByTime; |
904 | |
|
905 | 0 | for (auto& entry : mapWallet) |
906 | 0 | { |
907 | 0 | CWalletTx* wtx = &entry.second; |
908 | 0 | txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx)); |
909 | 0 | } |
910 | |
|
911 | 0 | nOrderPosNext = 0; |
912 | 0 | std::vector<int64_t> nOrderPosOffsets; |
913 | 0 | for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it) |
914 | 0 | { |
915 | 0 | CWalletTx *const pwtx = (*it).second; |
916 | 0 | int64_t& nOrderPos = pwtx->nOrderPos; |
917 | |
|
918 | 0 | if (nOrderPos == -1) |
919 | 0 | { |
920 | 0 | nOrderPos = nOrderPosNext++; |
921 | 0 | nOrderPosOffsets.push_back(nOrderPos); |
922 | |
|
923 | 0 | if (!batch.WriteTx(*pwtx)) |
924 | 0 | return DBErrors::LOAD_FAIL; |
925 | 0 | } |
926 | 0 | else |
927 | 0 | { |
928 | 0 | int64_t nOrderPosOff = 0; |
929 | 0 | for (const int64_t& nOffsetStart : nOrderPosOffsets) |
930 | 0 | { |
931 | 0 | if (nOrderPos >= nOffsetStart) |
932 | 0 | ++nOrderPosOff; |
933 | 0 | } |
934 | 0 | nOrderPos += nOrderPosOff; |
935 | 0 | nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1); |
936 | |
|
937 | 0 | if (!nOrderPosOff) |
938 | 0 | continue; |
939 | | |
940 | | // Since we're changing the order, write it back |
941 | 0 | if (!batch.WriteTx(*pwtx)) |
942 | 0 | return DBErrors::LOAD_FAIL; |
943 | 0 | } |
944 | 0 | } |
945 | 0 | batch.WriteOrderPosNext(nOrderPosNext); |
946 | |
|
947 | 0 | return DBErrors::LOAD_OK; |
948 | 0 | } |
949 | | |
950 | | int64_t CWallet::IncOrderPosNext(WalletBatch* batch) |
951 | 0 | { |
952 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
953 | 0 | int64_t nRet = nOrderPosNext++; |
954 | 0 | if (batch) { |
955 | 0 | batch->WriteOrderPosNext(nOrderPosNext); |
956 | 0 | } else { |
957 | 0 | WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext); |
958 | 0 | } |
959 | 0 | return nRet; |
960 | 0 | } |
961 | | |
962 | | void CWallet::MarkDirty() |
963 | 0 | { |
964 | 0 | { |
965 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
966 | 0 | for (auto& [_, wtx] : mapWallet) |
967 | 0 | wtx.MarkDirty(); |
968 | 0 | } |
969 | 0 | } |
970 | | |
971 | | bool CWallet::MarkReplaced(const Txid& originalHash, const Txid& newHash) |
972 | 0 | { |
973 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
974 | |
|
975 | 0 | auto mi = mapWallet.find(originalHash); |
976 | | |
977 | | // There is a bug if MarkReplaced is not called on an existing wallet transaction. |
978 | 0 | assert(mi != mapWallet.end()); |
979 | | |
980 | 0 | CWalletTx& wtx = (*mi).second; |
981 | | |
982 | | // Ensure for now that we're not overwriting data |
983 | 0 | assert(!wtx.mapValue.contains("replaced_by_txid")); |
984 | | |
985 | 0 | wtx.mapValue["replaced_by_txid"] = newHash.ToString(); |
986 | | |
987 | | // Refresh mempool status without waiting for transactionRemovedFromMempool or transactionAddedToMempool |
988 | 0 | RefreshMempoolStatus(wtx, chain()); |
989 | |
|
990 | 0 | WalletBatch batch(GetDatabase()); |
991 | |
|
992 | 0 | bool success = true; |
993 | 0 | if (!batch.WriteTx(wtx)) { |
994 | 0 | WalletLogPrintf("%s: Updating batch tx %s failed\n", __func__, wtx.GetHash().ToString()); |
995 | 0 | success = false; |
996 | 0 | } |
997 | |
|
998 | 0 | NotifyTransactionChanged(originalHash, CT_UPDATED); |
999 | |
|
1000 | 0 | return success; |
1001 | 0 | } |
1002 | | |
1003 | | void CWallet::SetSpentKeyState(WalletBatch& batch, const Txid& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations) |
1004 | 0 | { |
1005 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1006 | 0 | const CWalletTx* srctx = GetWalletTx(hash); |
1007 | 0 | if (!srctx) return; |
1008 | | |
1009 | 0 | CTxDestination dst; |
1010 | 0 | if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) { |
1011 | 0 | if (IsMine(dst)) { |
1012 | 0 | if (used != IsAddressPreviouslySpent(dst)) { |
1013 | 0 | if (used) { |
1014 | 0 | tx_destinations.insert(dst); |
1015 | 0 | } |
1016 | 0 | SetAddressPreviouslySpent(batch, dst, used); |
1017 | 0 | } |
1018 | 0 | } |
1019 | 0 | } |
1020 | 0 | } |
1021 | | |
1022 | | bool CWallet::IsSpentKey(const CScript& scriptPubKey) const |
1023 | 0 | { |
1024 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1025 | 0 | CTxDestination dest; |
1026 | 0 | if (!ExtractDestination(scriptPubKey, dest)) { |
1027 | 0 | return false; |
1028 | 0 | } |
1029 | 0 | if (IsAddressPreviouslySpent(dest)) { |
1030 | 0 | return true; |
1031 | 0 | } |
1032 | 0 | return false; |
1033 | 0 | } |
1034 | | |
1035 | | CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const TxState& state, const UpdateWalletTxFn& update_wtx, bool rescanning_old_block) |
1036 | 0 | { |
1037 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1038 | |
|
1039 | 0 | WalletBatch batch(GetDatabase()); |
1040 | |
|
1041 | 0 | Txid hash = tx->GetHash(); |
1042 | |
|
1043 | 0 | if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) { |
1044 | | // Mark used destinations |
1045 | 0 | std::set<CTxDestination> tx_destinations; |
1046 | |
|
1047 | 0 | for (const CTxIn& txin : tx->vin) { |
1048 | 0 | const COutPoint& op = txin.prevout; |
1049 | 0 | SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations); |
1050 | 0 | } |
1051 | |
|
1052 | 0 | MarkDestinationsDirty(tx_destinations); |
1053 | 0 | } |
1054 | | |
1055 | | // Inserts only if not already there, returns tx inserted or tx found |
1056 | 0 | auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(tx, state)); |
1057 | 0 | CWalletTx& wtx = (*ret.first).second; |
1058 | 0 | bool fInsertedNew = ret.second; |
1059 | 0 | bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew); |
1060 | 0 | if (fInsertedNew) { |
1061 | 0 | wtx.nTimeReceived = GetTime(); |
1062 | 0 | wtx.nOrderPos = IncOrderPosNext(&batch); |
1063 | 0 | wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx)); |
1064 | 0 | wtx.nTimeSmart = ComputeTimeSmart(wtx, rescanning_old_block); |
1065 | 0 | AddToSpends(wtx); |
1066 | | |
1067 | | // Update birth time when tx time is older than it. |
1068 | 0 | MaybeUpdateBirthTime(wtx.GetTxTime()); |
1069 | 0 | } |
1070 | |
|
1071 | 0 | if (!fInsertedNew) |
1072 | 0 | { |
1073 | 0 | if (state.index() != wtx.m_state.index()) { |
1074 | 0 | wtx.m_state = state; |
1075 | 0 | fUpdated = true; |
1076 | 0 | } else { |
1077 | 0 | assert(TxStateSerializedIndex(wtx.m_state) == TxStateSerializedIndex(state)); |
1078 | 0 | assert(TxStateSerializedBlockHash(wtx.m_state) == TxStateSerializedBlockHash(state)); |
1079 | 0 | } |
1080 | | // If we have a witness-stripped version of this transaction, and we |
1081 | | // see a new version with a witness, then we must be upgrading a pre-segwit |
1082 | | // wallet. Store the new version of the transaction with the witness, |
1083 | | // as the stripped-version must be invalid. |
1084 | | // TODO: Store all versions of the transaction, instead of just one. |
1085 | 0 | if (tx->HasWitness() && !wtx.tx->HasWitness()) { |
1086 | 0 | wtx.SetTx(tx); |
1087 | 0 | fUpdated = true; |
1088 | 0 | } |
1089 | 0 | } |
1090 | | |
1091 | | // Mark inactive coinbase transactions and their descendants as abandoned |
1092 | 0 | if (wtx.IsCoinBase() && wtx.isInactive()) { |
1093 | 0 | std::vector<CWalletTx*> txs{&wtx}; |
1094 | |
|
1095 | 0 | TxStateInactive inactive_state = TxStateInactive{/*abandoned=*/true}; |
1096 | |
|
1097 | 0 | while (!txs.empty()) { |
1098 | 0 | CWalletTx* desc_tx = txs.back(); |
1099 | 0 | txs.pop_back(); |
1100 | 0 | desc_tx->m_state = inactive_state; |
1101 | | // Break caches since we have changed the state |
1102 | 0 | desc_tx->MarkDirty(); |
1103 | 0 | batch.WriteTx(*desc_tx); |
1104 | 0 | MarkInputsDirty(desc_tx->tx); |
1105 | 0 | for (unsigned int i = 0; i < desc_tx->tx->vout.size(); ++i) { |
1106 | 0 | COutPoint outpoint(desc_tx->GetHash(), i); |
1107 | 0 | std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(outpoint); |
1108 | 0 | for (TxSpends::const_iterator it = range.first; it != range.second; ++it) { |
1109 | 0 | const auto wit = mapWallet.find(it->second); |
1110 | 0 | if (wit != mapWallet.end()) { |
1111 | 0 | txs.push_back(&wit->second); |
1112 | 0 | } |
1113 | 0 | } |
1114 | 0 | } |
1115 | 0 | } |
1116 | 0 | } |
1117 | | |
1118 | | //// debug print |
1119 | 0 | std::string status{"no-change"}; |
1120 | 0 | if (fInsertedNew || fUpdated) { |
1121 | 0 | status = fInsertedNew ? (fUpdated ? "new, update" : "new") : "update"; |
1122 | 0 | } |
1123 | 0 | WalletLogPrintf("AddToWallet %s %s %s", hash.ToString(), status, TxStateString(state)); |
1124 | | |
1125 | | // Write to disk |
1126 | 0 | if (fInsertedNew || fUpdated) |
1127 | 0 | if (!batch.WriteTx(wtx)) |
1128 | 0 | return nullptr; |
1129 | | |
1130 | | // Break debit/credit balance caches: |
1131 | 0 | wtx.MarkDirty(); |
1132 | | |
1133 | | // Cache the outputs that belong to the wallet |
1134 | 0 | RefreshTXOsFromTx(wtx); |
1135 | | |
1136 | | // Notify UI of new or updated transaction |
1137 | 0 | NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED); |
1138 | |
|
1139 | 0 | #if HAVE_SYSTEM |
1140 | | // notify an external script when a wallet transaction comes in or is updated |
1141 | 0 | std::string strCmd = m_notify_tx_changed_script; |
1142 | |
|
1143 | 0 | if (!strCmd.empty()) |
1144 | 0 | { |
1145 | 0 | ReplaceAll(strCmd, "%s", hash.GetHex()); |
1146 | 0 | if (auto* conf = wtx.state<TxStateConfirmed>()) |
1147 | 0 | { |
1148 | 0 | ReplaceAll(strCmd, "%b", conf->confirmed_block_hash.GetHex()); |
1149 | 0 | ReplaceAll(strCmd, "%h", ToString(conf->confirmed_block_height)); |
1150 | 0 | } else { |
1151 | 0 | ReplaceAll(strCmd, "%b", "unconfirmed"); |
1152 | 0 | ReplaceAll(strCmd, "%h", "-1"); |
1153 | 0 | } |
1154 | 0 | #ifndef WIN32 |
1155 | | // Substituting the wallet name isn't currently supported on windows |
1156 | | // because windows shell escaping has not been implemented yet: |
1157 | | // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875 |
1158 | | // A few ways it could be implemented in the future are described in: |
1159 | | // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094 |
1160 | 0 | ReplaceAll(strCmd, "%w", ShellEscape(GetName())); |
1161 | 0 | #endif |
1162 | 0 | std::thread t(runCommand, strCmd); |
1163 | 0 | t.detach(); // thread runs free |
1164 | 0 | } |
1165 | 0 | #endif |
1166 | |
|
1167 | 0 | return &wtx; |
1168 | 0 | } |
1169 | | |
1170 | | bool CWallet::LoadToWallet(const Txid& hash, const UpdateWalletTxFn& fill_wtx) |
1171 | 0 | { |
1172 | 0 | const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(nullptr, TxStateInactive{})); |
1173 | 0 | CWalletTx& wtx = ins.first->second; |
1174 | 0 | if (!fill_wtx(wtx, ins.second)) { |
1175 | 0 | return false; |
1176 | 0 | } |
1177 | | // If wallet doesn't have a chain (e.g when using bitcoin-wallet tool), |
1178 | | // don't bother to update txn. |
1179 | 0 | if (HaveChain()) { |
1180 | 0 | wtx.updateState(chain()); |
1181 | 0 | } |
1182 | 0 | if (/* insertion took place */ ins.second) { |
1183 | 0 | wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx)); |
1184 | 0 | } |
1185 | 0 | AddToSpends(wtx); |
1186 | 0 | for (const CTxIn& txin : wtx.tx->vin) { |
1187 | 0 | auto it = mapWallet.find(txin.prevout.hash); |
1188 | 0 | if (it != mapWallet.end()) { |
1189 | 0 | CWalletTx& prevtx = it->second; |
1190 | 0 | if (auto* prev = prevtx.state<TxStateBlockConflicted>()) { |
1191 | 0 | MarkConflicted(prev->conflicting_block_hash, prev->conflicting_block_height, wtx.GetHash()); |
1192 | 0 | } |
1193 | 0 | } |
1194 | 0 | } |
1195 | | |
1196 | | // Update birth time when tx time is older than it. |
1197 | 0 | MaybeUpdateBirthTime(wtx.GetTxTime()); |
1198 | | |
1199 | | // Make sure the tx outputs are known by the wallet |
1200 | 0 | RefreshTXOsFromTx(wtx); |
1201 | 0 | return true; |
1202 | 0 | } |
1203 | | |
1204 | | bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, const SyncTxState& state, bool fUpdate, bool rescanning_old_block) |
1205 | 0 | { |
1206 | 0 | const CTransaction& tx = *ptx; |
1207 | 0 | { |
1208 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1209 | |
|
1210 | 0 | if (auto* conf = std::get_if<TxStateConfirmed>(&state)) { |
1211 | 0 | for (const CTxIn& txin : tx.vin) { |
1212 | 0 | std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout); |
1213 | 0 | while (range.first != range.second) { |
1214 | 0 | if (range.first->second != tx.GetHash()) { |
1215 | 0 | WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), conf->confirmed_block_hash.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n); |
1216 | 0 | MarkConflicted(conf->confirmed_block_hash, conf->confirmed_block_height, range.first->second); |
1217 | 0 | } |
1218 | 0 | range.first++; |
1219 | 0 | } |
1220 | 0 | } |
1221 | 0 | } |
1222 | |
|
1223 | 0 | bool fExisted = mapWallet.contains(tx.GetHash()); |
1224 | 0 | if (fExisted && !fUpdate) return false; |
1225 | 0 | if (fExisted || IsMine(tx) || IsFromMe(tx)) |
1226 | 0 | { |
1227 | | /* Check if any keys in the wallet keypool that were supposed to be unused |
1228 | | * have appeared in a new transaction. If so, remove those keys from the keypool. |
1229 | | * This can happen when restoring an old wallet backup that does not contain |
1230 | | * the mostly recently created transactions from newer versions of the wallet. |
1231 | | */ |
1232 | | |
1233 | | // loop though all outputs |
1234 | 0 | for (const CTxOut& txout: tx.vout) { |
1235 | 0 | for (const auto& spk_man : GetScriptPubKeyMans(txout.scriptPubKey)) { |
1236 | 0 | for (auto &dest : spk_man->MarkUnusedAddresses(txout.scriptPubKey)) { |
1237 | | // If internal flag is not defined try to infer it from the ScriptPubKeyMan |
1238 | 0 | if (!dest.internal.has_value()) { |
1239 | 0 | dest.internal = IsInternalScriptPubKeyMan(spk_man); |
1240 | 0 | } |
1241 | | |
1242 | | // skip if can't determine whether it's a receiving address or not |
1243 | 0 | if (!dest.internal.has_value()) continue; |
1244 | | |
1245 | | // If this is a receiving address and it's not in the address book yet |
1246 | | // (e.g. it wasn't generated on this node or we're restoring from backup) |
1247 | | // add it to the address book for proper transaction accounting |
1248 | 0 | if (!*dest.internal && !FindAddressBookEntry(dest.dest, /* allow_change= */ false)) { |
1249 | 0 | SetAddressBook(dest.dest, "", AddressPurpose::RECEIVE); |
1250 | 0 | } |
1251 | 0 | } |
1252 | 0 | } |
1253 | 0 | } |
1254 | | |
1255 | | // Block disconnection override an abandoned tx as unconfirmed |
1256 | | // which means user may have to call abandontransaction again |
1257 | 0 | TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);Unexecuted instantiation: wallet.cpp:std::variant<wallet::TxStateConfirmed, wallet::TxStateInMempool, wallet::TxStateBlockConflicted, wallet::TxStateInactive, wallet::TxStateUnrecognized> wallet::CWallet::AddToWalletIfInvolvingMe(std::shared_ptr<CTransaction const> const&, std::variant<wallet::TxStateConfirmed, wallet::TxStateInMempool, wallet::TxStateInactive> const&, bool, bool)::$_0::operator()<wallet::TxStateConfirmed const&>(wallet::TxStateConfirmed const&) const Unexecuted instantiation: wallet.cpp:std::variant<wallet::TxStateConfirmed, wallet::TxStateInMempool, wallet::TxStateBlockConflicted, wallet::TxStateInactive, wallet::TxStateUnrecognized> wallet::CWallet::AddToWalletIfInvolvingMe(std::shared_ptr<CTransaction const> const&, std::variant<wallet::TxStateConfirmed, wallet::TxStateInMempool, wallet::TxStateInactive> const&, bool, bool)::$_0::operator()<wallet::TxStateInMempool const&>(wallet::TxStateInMempool const&) const Unexecuted instantiation: wallet.cpp:std::variant<wallet::TxStateConfirmed, wallet::TxStateInMempool, wallet::TxStateBlockConflicted, wallet::TxStateInactive, wallet::TxStateUnrecognized> wallet::CWallet::AddToWalletIfInvolvingMe(std::shared_ptr<CTransaction const> const&, std::variant<wallet::TxStateConfirmed, wallet::TxStateInMempool, wallet::TxStateInactive> const&, bool, bool)::$_0::operator()<wallet::TxStateInactive const&>(wallet::TxStateInactive const&) const |
1258 | 0 | CWalletTx* wtx = AddToWallet(MakeTransactionRef(tx), tx_state, /*update_wtx=*/nullptr, rescanning_old_block); |
1259 | 0 | if (!wtx) { |
1260 | | // Can only be nullptr if there was a db write error (missing db, read-only db or a db engine internal writing error). |
1261 | | // As we only store arriving transaction in this process, and we don't want an inconsistent state, let's throw an error. |
1262 | 0 | throw std::runtime_error("DB error adding transaction to wallet, write failed"); |
1263 | 0 | } |
1264 | 0 | return true; |
1265 | 0 | } |
1266 | 0 | } |
1267 | 0 | return false; |
1268 | 0 | } |
1269 | | |
1270 | | bool CWallet::TransactionCanBeAbandoned(const Txid& hashTx) const |
1271 | 0 | { |
1272 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1273 | 0 | const CWalletTx* wtx = GetWalletTx(hashTx); |
1274 | 0 | return wtx && !wtx->isAbandoned() && GetTxDepthInMainChain(*wtx) == 0 && !wtx->InMempool(); |
1275 | 0 | } |
1276 | | |
1277 | | void CWallet::UpdateTrucSiblingConflicts(const CWalletTx& parent_wtx, const Txid& child_txid, bool add_conflict) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) |
1278 | 0 | { |
1279 | | // Find all other txs in our wallet that spend utxos from this parent |
1280 | | // so that we can mark them as mempool-conflicted by this new tx. |
1281 | 0 | for (long unsigned int i = 0; i < parent_wtx.tx->vout.size(); i++) { |
1282 | 0 | for (auto range = mapTxSpends.equal_range(COutPoint(parent_wtx.tx->GetHash(), i)); range.first != range.second; range.first++) { |
1283 | 0 | const Txid& sibling_txid = range.first->second; |
1284 | | // Skip the child_tx itself |
1285 | 0 | if (sibling_txid == child_txid) continue; |
1286 | 0 | RecursiveUpdateTxState(/*batch=*/nullptr, sibling_txid, [&child_txid, add_conflict](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) { |
1287 | 0 | return add_conflict ? (wtx.mempool_conflicts.insert(child_txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED) |
1288 | 0 | : (wtx.mempool_conflicts.erase(child_txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED); |
1289 | 0 | }); |
1290 | 0 | } |
1291 | 0 | } |
1292 | 0 | } |
1293 | | |
1294 | | void CWallet::MarkInputsDirty(const CTransactionRef& tx) |
1295 | 0 | { |
1296 | 0 | for (const CTxIn& txin : tx->vin) { |
1297 | 0 | auto it = mapWallet.find(txin.prevout.hash); |
1298 | 0 | if (it != mapWallet.end()) { |
1299 | 0 | it->second.MarkDirty(); |
1300 | 0 | } |
1301 | 0 | } |
1302 | 0 | } |
1303 | | |
1304 | | bool CWallet::AbandonTransaction(const Txid& hashTx) |
1305 | 0 | { |
1306 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1307 | 0 | auto it = mapWallet.find(hashTx); |
1308 | 0 | assert(it != mapWallet.end()); |
1309 | 0 | return AbandonTransaction(it->second); |
1310 | 0 | } |
1311 | | |
1312 | | bool CWallet::AbandonTransaction(CWalletTx& tx) |
1313 | 0 | { |
1314 | | // Can't mark abandoned if confirmed or in mempool |
1315 | 0 | if (GetTxDepthInMainChain(tx) != 0 || tx.InMempool()) { |
1316 | 0 | return false; |
1317 | 0 | } |
1318 | | |
1319 | 0 | auto try_updating_state = [](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) { |
1320 | | // If the orig tx was not in block/mempool, none of its spends can be. |
1321 | 0 | assert(!wtx.isConfirmed()); |
1322 | 0 | assert(!wtx.InMempool()); |
1323 | | // If already conflicted or abandoned, no need to set abandoned |
1324 | 0 | if (!wtx.isBlockConflicted() && !wtx.isAbandoned()) { |
1325 | 0 | wtx.m_state = TxStateInactive{/*abandoned=*/true}; |
1326 | 0 | return TxUpdate::NOTIFY_CHANGED; |
1327 | 0 | } |
1328 | 0 | return TxUpdate::UNCHANGED; |
1329 | 0 | }; |
1330 | | |
1331 | | // Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too. |
1332 | | // States are not permanent, so these transactions can become unabandoned if they are re-added to the |
1333 | | // mempool, or confirmed in a block, or conflicted. |
1334 | | // Note: If the reorged coinbase is re-added to the main chain, the descendants that have not had their |
1335 | | // states change will remain abandoned and will require manual broadcast if the user wants them. |
1336 | |
|
1337 | 0 | RecursiveUpdateTxState(tx.GetHash(), try_updating_state); |
1338 | |
|
1339 | 0 | return true; |
1340 | 0 | } |
1341 | | |
1342 | | void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const Txid& hashTx) |
1343 | 0 | { |
1344 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1345 | | |
1346 | | // If number of conflict confirms cannot be determined, this means |
1347 | | // that the block is still unknown or not yet part of the main chain, |
1348 | | // for example when loading the wallet during a reindex. Do nothing in that |
1349 | | // case. |
1350 | 0 | if (m_last_block_processed_height < 0 || conflicting_height < 0) { |
1351 | 0 | return; |
1352 | 0 | } |
1353 | 0 | int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1; |
1354 | 0 | if (conflictconfirms >= 0) |
1355 | 0 | return; |
1356 | | |
1357 | 0 | auto try_updating_state = [&](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) { |
1358 | 0 | if (conflictconfirms < GetTxDepthInMainChain(wtx)) { |
1359 | | // Block is 'more conflicted' than current confirm; update. |
1360 | | // Mark transaction as conflicted with this block. |
1361 | 0 | wtx.m_state = TxStateBlockConflicted{hashBlock, conflicting_height}; |
1362 | 0 | return TxUpdate::CHANGED; |
1363 | 0 | } |
1364 | 0 | return TxUpdate::UNCHANGED; |
1365 | 0 | }; |
1366 | | |
1367 | | // Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too. |
1368 | 0 | RecursiveUpdateTxState(hashTx, try_updating_state); |
1369 | |
|
1370 | 0 | } |
1371 | | |
1372 | 0 | void CWallet::RecursiveUpdateTxState(const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) { |
1373 | 0 | WalletBatch batch(GetDatabase()); |
1374 | 0 | RecursiveUpdateTxState(&batch, tx_hash, try_updating_state); |
1375 | 0 | } |
1376 | | |
1377 | 0 | void CWallet::RecursiveUpdateTxState(WalletBatch* batch, const Txid& tx_hash, const TryUpdatingStateFn& try_updating_state) { |
1378 | 0 | std::set<Txid> todo; |
1379 | 0 | std::set<Txid> done; |
1380 | |
|
1381 | 0 | todo.insert(tx_hash); |
1382 | |
|
1383 | 0 | while (!todo.empty()) { |
1384 | 0 | Txid now = *todo.begin(); |
1385 | 0 | todo.erase(now); |
1386 | 0 | done.insert(now); |
1387 | 0 | auto it = mapWallet.find(now); |
1388 | 0 | assert(it != mapWallet.end()); |
1389 | 0 | CWalletTx& wtx = it->second; |
1390 | |
|
1391 | 0 | TxUpdate update_state = try_updating_state(wtx); |
1392 | 0 | if (update_state != TxUpdate::UNCHANGED) { |
1393 | 0 | wtx.MarkDirty(); |
1394 | 0 | if (batch) batch->WriteTx(wtx); |
1395 | | // Iterate over all its outputs, and update those tx states as well (if applicable) |
1396 | 0 | for (unsigned int i = 0; i < wtx.tx->vout.size(); ++i) { |
1397 | 0 | std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(COutPoint(now, i)); |
1398 | 0 | for (TxSpends::const_iterator iter = range.first; iter != range.second; ++iter) { |
1399 | 0 | if (!done.contains(iter->second)) { |
1400 | 0 | todo.insert(iter->second); |
1401 | 0 | } |
1402 | 0 | } |
1403 | 0 | } |
1404 | |
|
1405 | 0 | if (update_state == TxUpdate::NOTIFY_CHANGED) { |
1406 | 0 | NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED); |
1407 | 0 | } |
1408 | | |
1409 | | // If a transaction changes its tx state, that usually changes the balance |
1410 | | // available of the outputs it spends. So force those to be recomputed |
1411 | 0 | MarkInputsDirty(wtx.tx); |
1412 | 0 | } |
1413 | 0 | } |
1414 | 0 | } |
1415 | | |
1416 | | bool CWallet::SyncTransaction(const CTransactionRef& ptx, const SyncTxState& state, bool update_tx, bool rescanning_old_block) |
1417 | 0 | { |
1418 | 0 | if (!AddToWalletIfInvolvingMe(ptx, state, update_tx, rescanning_old_block)) |
1419 | 0 | return false; // Not one of ours |
1420 | | |
1421 | | // If a transaction changes 'conflicted' state, that changes the balance |
1422 | | // available of the outputs it spends. So force those to be |
1423 | | // recomputed, also: |
1424 | 0 | MarkInputsDirty(ptx); |
1425 | 0 | return true; |
1426 | 0 | } |
1427 | | |
1428 | 0 | void CWallet::transactionAddedToMempool(const CTransactionRef& tx) { |
1429 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1430 | 0 | SyncTransaction(tx, TxStateInMempool{}); |
1431 | |
|
1432 | 0 | auto it = mapWallet.find(tx->GetHash()); |
1433 | 0 | if (it != mapWallet.end()) { |
1434 | 0 | RefreshMempoolStatus(it->second, chain()); |
1435 | 0 | } |
1436 | |
|
1437 | 0 | const Txid& txid = tx->GetHash(); |
1438 | |
|
1439 | 0 | for (const CTxIn& tx_in : tx->vin) { |
1440 | | // For each wallet transaction spending this prevout.. |
1441 | 0 | for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) { |
1442 | 0 | const Txid& spent_id = range.first->second; |
1443 | | // Skip the recently added tx |
1444 | 0 | if (spent_id == txid) continue; |
1445 | 0 | RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) { |
1446 | 0 | return wtx.mempool_conflicts.insert(txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED; |
1447 | 0 | }); |
1448 | 0 | } |
1449 | |
|
1450 | 0 | } |
1451 | |
|
1452 | 0 | if (tx->version == TRUC_VERSION) { |
1453 | | // Unconfirmed TRUC transactions are only allowed a 1-parent-1-child topology. |
1454 | | // For any unconfirmed v3 parents (there should be a maximum of 1 except in reorgs), |
1455 | | // record this child so the wallet doesn't try to spend any other outputs |
1456 | 0 | for (const CTxIn& tx_in : tx->vin) { |
1457 | 0 | auto parent_it = mapWallet.find(tx_in.prevout.hash); |
1458 | 0 | if (parent_it != mapWallet.end()) { |
1459 | 0 | CWalletTx& parent_wtx = parent_it->second; |
1460 | 0 | if (parent_wtx.isUnconfirmed()) { |
1461 | 0 | parent_wtx.truc_child_in_mempool = tx->GetHash(); |
1462 | | // Even though these siblings do not spend the same utxos, they can't |
1463 | | // be present in the mempool at the same time because of TRUC policy rules |
1464 | 0 | UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/true); |
1465 | 0 | } |
1466 | 0 | } |
1467 | 0 | } |
1468 | 0 | } |
1469 | 0 | } |
1470 | | |
1471 | 0 | void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason) { |
1472 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1473 | 0 | auto it = mapWallet.find(tx->GetHash()); |
1474 | 0 | if (it != mapWallet.end()) { |
1475 | 0 | RefreshMempoolStatus(it->second, chain()); |
1476 | 0 | } |
1477 | | // Handle transactions that were removed from the mempool because they |
1478 | | // conflict with transactions in a newly connected block. |
1479 | 0 | if (reason == MemPoolRemovalReason::CONFLICT) { |
1480 | | // Trigger external -walletnotify notifications for these transactions. |
1481 | | // Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons: |
1482 | | // |
1483 | | // 1. The transactionRemovedFromMempool callback does not currently |
1484 | | // provide the conflicting block's hash and height, and for backwards |
1485 | | // compatibility reasons it may not be not safe to store conflicted |
1486 | | // wallet transactions with a null block hash. See |
1487 | | // https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993. |
1488 | | // 2. For most of these transactions, the wallet's internal conflict |
1489 | | // detection in the blockConnected handler will subsequently call |
1490 | | // MarkConflicted and update them with CONFLICTED status anyway. This |
1491 | | // applies to any wallet transaction that has inputs spent in the |
1492 | | // block, or that has ancestors in the wallet with inputs spent by |
1493 | | // the block. |
1494 | | // 3. Longstanding behavior since the sync implementation in |
1495 | | // https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync |
1496 | | // implementation before that was to mark these transactions |
1497 | | // unconfirmed rather than conflicted. |
1498 | | // |
1499 | | // Nothing described above should be seen as an unchangeable requirement |
1500 | | // when improving this code in the future. The wallet's heuristics for |
1501 | | // distinguishing between conflicted and unconfirmed transactions are |
1502 | | // imperfect, and could be improved in general, see |
1503 | | // https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking |
1504 | 0 | SyncTransaction(tx, TxStateInactive{}); |
1505 | 0 | } |
1506 | |
|
1507 | 0 | const Txid& txid = tx->GetHash(); |
1508 | |
|
1509 | 0 | for (const CTxIn& tx_in : tx->vin) { |
1510 | | // Iterate over all wallet transactions spending txin.prev |
1511 | | // and recursively mark them as no longer conflicting with |
1512 | | // txid |
1513 | 0 | for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) { |
1514 | 0 | const Txid& spent_id = range.first->second; |
1515 | |
|
1516 | 0 | RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) { |
1517 | 0 | return wtx.mempool_conflicts.erase(txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED; |
1518 | 0 | }); |
1519 | 0 | } |
1520 | 0 | } |
1521 | |
|
1522 | 0 | if (tx->version == TRUC_VERSION) { |
1523 | | // If this tx has a parent, unset its truc_child_in_mempool to make it possible |
1524 | | // to spend from the parent again. If this tx was replaced by another |
1525 | | // child of the same parent, transactionAddedToMempool |
1526 | | // will update truc_child_in_mempool |
1527 | 0 | for (const CTxIn& tx_in : tx->vin) { |
1528 | 0 | auto parent_it = mapWallet.find(tx_in.prevout.hash); |
1529 | 0 | if (parent_it != mapWallet.end()) { |
1530 | 0 | CWalletTx& parent_wtx = parent_it->second; |
1531 | 0 | if (parent_wtx.truc_child_in_mempool == tx->GetHash()) { |
1532 | 0 | parent_wtx.truc_child_in_mempool = std::nullopt; |
1533 | 0 | UpdateTrucSiblingConflicts(parent_wtx, txid, /*add_conflict=*/false); |
1534 | 0 | } |
1535 | 0 | } |
1536 | 0 | } |
1537 | 0 | } |
1538 | 0 | } |
1539 | | |
1540 | | void CWallet::blockConnected(const ChainstateRole& role, const interfaces::BlockInfo& block) |
1541 | 0 | { |
1542 | 0 | if (role.historical) { |
1543 | 0 | return; |
1544 | 0 | } |
1545 | 0 | assert(block.data); |
1546 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1547 | | |
1548 | | // Update the best block in memory first. This will set the best block's height, which is |
1549 | | // needed by MarkConflicted. |
1550 | 0 | SetLastBlockProcessedInMem(block.height, block.hash); |
1551 | | |
1552 | | // No need to scan block if it was created before the wallet birthday. |
1553 | | // Uses chain max time and twice the grace period to adjust time for block time variability. |
1554 | 0 | if (block.chain_time_max < m_birth_time.load() - (TIMESTAMP_WINDOW * 2)) return; |
1555 | | |
1556 | | // Scan block |
1557 | 0 | bool wallet_updated = false; |
1558 | 0 | for (size_t index = 0; index < block.data->vtx.size(); index++) { |
1559 | 0 | wallet_updated |= SyncTransaction(block.data->vtx[index], TxStateConfirmed{block.hash, block.height, static_cast<int>(index)}); |
1560 | 0 | transactionRemovedFromMempool(block.data->vtx[index], MemPoolRemovalReason::BLOCK); |
1561 | 0 | } |
1562 | | |
1563 | | // Update on disk if this block resulted in us updating a tx, or periodically every 144 blocks (~1 day) |
1564 | 0 | if (wallet_updated || block.height % 144 == 0) { |
1565 | 0 | WriteBestBlock(); |
1566 | 0 | } |
1567 | 0 | } |
1568 | | |
1569 | | void CWallet::blockDisconnected(const interfaces::BlockInfo& block) |
1570 | 0 | { |
1571 | 0 | assert(block.data); |
1572 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1573 | | |
1574 | | // At block disconnection, this will change an abandoned transaction to |
1575 | | // be unconfirmed, whether or not the transaction is added back to the mempool. |
1576 | | // User may have to call abandontransaction again. It may be addressed in the |
1577 | | // future with a stickier abandoned state or even removing abandontransaction call. |
1578 | 0 | int disconnect_height = block.height; |
1579 | |
|
1580 | 0 | for (size_t index = 0; index < block.data->vtx.size(); index++) { |
1581 | 0 | const CTransactionRef& ptx = block.data->vtx[index]; |
1582 | | // Coinbase transactions are not only inactive but also abandoned, |
1583 | | // meaning they should never be relayed standalone via the p2p protocol. |
1584 | 0 | SyncTransaction(ptx, TxStateInactive{/*abandoned=*/index == 0}); |
1585 | |
|
1586 | 0 | for (const CTxIn& tx_in : ptx->vin) { |
1587 | | // No other wallet transactions conflicted with this transaction |
1588 | 0 | if (!mapTxSpends.contains(tx_in.prevout)) continue; |
1589 | | |
1590 | 0 | std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(tx_in.prevout); |
1591 | | |
1592 | | // For all of the spends that conflict with this transaction |
1593 | 0 | for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) { |
1594 | 0 | CWalletTx& wtx = mapWallet.find(_it->second)->second; |
1595 | |
|
1596 | 0 | if (!wtx.isBlockConflicted()) continue; |
1597 | | |
1598 | 0 | auto try_updating_state = [&](CWalletTx& tx) { |
1599 | 0 | if (!tx.isBlockConflicted()) return TxUpdate::UNCHANGED; |
1600 | 0 | if (tx.state<TxStateBlockConflicted>()->conflicting_block_height >= disconnect_height) { |
1601 | 0 | tx.m_state = TxStateInactive{}; |
1602 | 0 | return TxUpdate::CHANGED; |
1603 | 0 | } |
1604 | 0 | return TxUpdate::UNCHANGED; |
1605 | 0 | }; |
1606 | |
|
1607 | 0 | RecursiveUpdateTxState(wtx.tx->GetHash(), try_updating_state); |
1608 | 0 | } |
1609 | 0 | } |
1610 | 0 | } |
1611 | | |
1612 | | // Update the best block |
1613 | 0 | SetLastBlockProcessed(block.height - 1, *Assert(block.prev_hash)); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
1614 | 0 | } |
1615 | | |
1616 | | void CWallet::updatedBlockTip() |
1617 | 0 | { |
1618 | 0 | m_best_block_time = GetTime(); |
1619 | 0 | } |
1620 | | |
1621 | 0 | void CWallet::BlockUntilSyncedToCurrentChain() const { |
1622 | 0 | AssertLockNotHeld(cs_wallet); Line | Count | Source | 147 | 0 | #define AssertLockNotHeld(cs) AssertLockNotHeldInline(#cs, __FILE__, __LINE__, &cs) |
|
1623 | | // Skip the queue-draining stuff if we know we're caught up with |
1624 | | // chain().Tip(), otherwise put a callback in the validation interface queue and wait |
1625 | | // for the queue to drain enough to execute it (indicating we are caught up |
1626 | | // at least with the time we entered this function). |
1627 | 0 | uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
1628 | 0 | chain().waitForNotificationsIfTipChanged(last_block_hash); |
1629 | 0 | } |
1630 | | |
1631 | | // Note that this function doesn't distinguish between a 0-valued input, |
1632 | | // and a not-"is mine" input. |
1633 | | CAmount CWallet::GetDebit(const CTxIn &txin) const |
1634 | 0 | { |
1635 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1636 | 0 | auto txo = GetTXO(txin.prevout); |
1637 | 0 | if (txo) { |
1638 | 0 | return txo->GetTxOut().nValue; |
1639 | 0 | } |
1640 | 0 | return 0; |
1641 | 0 | } |
1642 | | |
1643 | | bool CWallet::IsMine(const CTxOut& txout) const |
1644 | 0 | { |
1645 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1646 | 0 | return IsMine(txout.scriptPubKey); |
1647 | 0 | } |
1648 | | |
1649 | | bool CWallet::IsMine(const CTxDestination& dest) const |
1650 | 0 | { |
1651 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1652 | 0 | return IsMine(GetScriptForDestination(dest)); |
1653 | 0 | } |
1654 | | |
1655 | | bool CWallet::IsMine(const CScript& script) const |
1656 | 0 | { |
1657 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1658 | | |
1659 | | // Search the cache so that IsMine is called only on the relevant SPKMs instead of on everything in m_spk_managers |
1660 | 0 | const auto& it = m_cached_spks.find(script); |
1661 | 0 | if (it != m_cached_spks.end()) { |
1662 | 0 | bool res = false; |
1663 | 0 | for (const auto& spkm : it->second) { |
1664 | 0 | res = res || spkm->IsMine(script); |
1665 | 0 | } |
1666 | 0 | Assume(res); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
1667 | 0 | return res; |
1668 | 0 | } |
1669 | | |
1670 | 0 | return false; |
1671 | 0 | } |
1672 | | |
1673 | | bool CWallet::IsMine(const CTransaction& tx) const |
1674 | 0 | { |
1675 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1676 | 0 | for (const CTxOut& txout : tx.vout) |
1677 | 0 | if (IsMine(txout)) |
1678 | 0 | return true; |
1679 | 0 | return false; |
1680 | 0 | } |
1681 | | |
1682 | | bool CWallet::IsMine(const COutPoint& outpoint) const |
1683 | 0 | { |
1684 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1685 | 0 | auto wtx = GetWalletTx(outpoint.hash); |
1686 | 0 | if (!wtx) { |
1687 | 0 | return false; |
1688 | 0 | } |
1689 | 0 | if (outpoint.n >= wtx->tx->vout.size()) { |
1690 | 0 | return false; |
1691 | 0 | } |
1692 | 0 | return IsMine(wtx->tx->vout[outpoint.n]); |
1693 | 0 | } |
1694 | | |
1695 | | bool CWallet::IsFromMe(const CTransaction& tx) const |
1696 | 0 | { |
1697 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1698 | 0 | for (const CTxIn& txin : tx.vin) { |
1699 | 0 | if (GetTXO(txin.prevout)) return true; |
1700 | 0 | } |
1701 | 0 | return false; |
1702 | 0 | } |
1703 | | |
1704 | | CAmount CWallet::GetDebit(const CTransaction& tx) const |
1705 | 0 | { |
1706 | 0 | CAmount nDebit = 0; |
1707 | 0 | for (const CTxIn& txin : tx.vin) |
1708 | 0 | { |
1709 | 0 | nDebit += GetDebit(txin); |
1710 | 0 | if (!MoneyRange(nDebit)) |
1711 | 0 | throw std::runtime_error(std::string(__func__) + ": value out of range"); |
1712 | 0 | } |
1713 | 0 | return nDebit; |
1714 | 0 | } |
1715 | | |
1716 | | bool CWallet::IsHDEnabled() const |
1717 | 0 | { |
1718 | | // All Active ScriptPubKeyMans must be HD for this to be true |
1719 | 0 | bool result = false; |
1720 | 0 | for (const auto& spk_man : GetActiveScriptPubKeyMans()) { |
1721 | 0 | if (!spk_man->IsHDEnabled()) return false; |
1722 | 0 | result = true; |
1723 | 0 | } |
1724 | 0 | return result; |
1725 | 0 | } |
1726 | | |
1727 | | bool CWallet::CanGetAddresses(bool internal) const |
1728 | 0 | { |
1729 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1730 | 0 | if (m_spk_managers.empty()) return false; |
1731 | 0 | for (OutputType t : OUTPUT_TYPES) { |
1732 | 0 | auto spk_man = GetScriptPubKeyMan(t, internal); |
1733 | 0 | if (spk_man && spk_man->CanGetAddresses(internal)) { |
1734 | 0 | return true; |
1735 | 0 | } |
1736 | 0 | } |
1737 | 0 | return false; |
1738 | 0 | } |
1739 | | |
1740 | | void CWallet::SetWalletFlag(uint64_t flags) |
1741 | 0 | { |
1742 | 0 | WalletBatch batch(GetDatabase()); |
1743 | 0 | return SetWalletFlagWithDB(batch, flags); |
1744 | 0 | } |
1745 | | |
1746 | | void CWallet::SetWalletFlagWithDB(WalletBatch& batch, uint64_t flags) |
1747 | 0 | { |
1748 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1749 | 0 | m_wallet_flags |= flags; |
1750 | 0 | if (!batch.WriteWalletFlags(m_wallet_flags)) |
1751 | 0 | throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed"); |
1752 | 0 | } |
1753 | | |
1754 | | void CWallet::UnsetWalletFlag(uint64_t flag) |
1755 | 0 | { |
1756 | 0 | WalletBatch batch(GetDatabase()); |
1757 | 0 | UnsetWalletFlagWithDB(batch, flag); |
1758 | 0 | } |
1759 | | |
1760 | | void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag) |
1761 | 0 | { |
1762 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1763 | 0 | m_wallet_flags &= ~flag; |
1764 | 0 | if (!batch.WriteWalletFlags(m_wallet_flags)) |
1765 | 0 | throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed"); |
1766 | 0 | } |
1767 | | |
1768 | | void CWallet::UnsetBlankWalletFlag(WalletBatch& batch) |
1769 | 0 | { |
1770 | 0 | UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET); |
1771 | 0 | } |
1772 | | |
1773 | | bool CWallet::IsWalletFlagSet(uint64_t flag) const |
1774 | 0 | { |
1775 | 0 | return (m_wallet_flags & flag); |
1776 | 0 | } |
1777 | | |
1778 | | bool CWallet::LoadWalletFlags(uint64_t flags) |
1779 | 0 | { |
1780 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1781 | 0 | if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) { |
1782 | | // contains unknown non-tolerable wallet flags |
1783 | 0 | return false; |
1784 | 0 | } |
1785 | 0 | m_wallet_flags = flags; |
1786 | |
|
1787 | 0 | return true; |
1788 | 0 | } |
1789 | | |
1790 | | void CWallet::InitWalletFlags(uint64_t flags) |
1791 | 0 | { |
1792 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1793 | | |
1794 | | // We should never be writing unknown non-tolerable wallet flags |
1795 | 0 | assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32)); |
1796 | | // This should only be used once, when creating a new wallet - so current flags are expected to be blank |
1797 | 0 | assert(m_wallet_flags == 0); |
1798 | | |
1799 | 0 | if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) { |
1800 | 0 | throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed"); |
1801 | 0 | } |
1802 | | |
1803 | 0 | if (!LoadWalletFlags(flags)) assert(false); |
1804 | 0 | } |
1805 | | |
1806 | | uint64_t CWallet::GetWalletFlags() const |
1807 | 0 | { |
1808 | 0 | return m_wallet_flags; |
1809 | 0 | } |
1810 | | |
1811 | | void CWallet::MaybeUpdateBirthTime(int64_t time) |
1812 | 0 | { |
1813 | 0 | int64_t birthtime = m_birth_time.load(); |
1814 | 0 | if (time < birthtime) { |
1815 | 0 | m_birth_time = time; |
1816 | 0 | } |
1817 | 0 | } |
1818 | | |
1819 | | /** |
1820 | | * Scan active chain for relevant transactions after importing keys. This should |
1821 | | * be called whenever new keys are added to the wallet, with the oldest key |
1822 | | * creation time. |
1823 | | * |
1824 | | * @return Earliest timestamp that could be successfully scanned from. Timestamp |
1825 | | * returned will be higher than startTime if relevant blocks could not be read. |
1826 | | */ |
1827 | | int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update) |
1828 | 0 | { |
1829 | | // Find starting block. May be null if nCreateTime is greater than the |
1830 | | // highest blockchain timestamp, in which case there is nothing that needs |
1831 | | // to be scanned. |
1832 | 0 | int start_height = 0; |
1833 | 0 | uint256 start_block; |
1834 | 0 | bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height)); |
1835 | 0 | WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
1836 | |
|
1837 | 0 | if (start) { |
1838 | | // TODO: this should take into account failure by ScanResult::USER_ABORT |
1839 | 0 | ScanResult result = ScanForWalletTransactions(start_block, start_height, /*max_height=*/{}, reserver, /*fUpdate=*/update, /*save_progress=*/false); |
1840 | 0 | if (result.status == ScanResult::FAILURE) { |
1841 | 0 | int64_t time_max; |
1842 | 0 | CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max))); Line | Count | Source | 110 | 0 | inline_check_non_fatal(condition, std::source_location::current(), #condition) |
|
1843 | 0 | return time_max + TIMESTAMP_WINDOW + 1; |
1844 | 0 | } |
1845 | 0 | } |
1846 | 0 | return startTime; |
1847 | 0 | } |
1848 | | |
1849 | | /** |
1850 | | * Scan the block chain (starting in start_block) for transactions |
1851 | | * from or to us. If fUpdate is true, found transactions that already |
1852 | | * exist in the wallet will be updated. If max_height is not set, the |
1853 | | * mempool will be scanned as well. |
1854 | | * |
1855 | | * @param[in] start_block Scan starting block. If block is not on the active |
1856 | | * chain, the scan will return SUCCESS immediately. |
1857 | | * @param[in] start_height Height of start_block |
1858 | | * @param[in] max_height Optional max scanning height. If unset there is |
1859 | | * no maximum and scanning can continue to the tip |
1860 | | * |
1861 | | * @return ScanResult returning scan information and indicating success or |
1862 | | * failure. Return status will be set to SUCCESS if scan was |
1863 | | * successful. FAILURE if a complete rescan was not possible (due to |
1864 | | * pruning or corruption). USER_ABORT if the rescan was aborted before |
1865 | | * it could complete. |
1866 | | * |
1867 | | * @pre Caller needs to make sure start_block (and the optional stop_block) are on |
1868 | | * the main chain after to the addition of any new keys you want to detect |
1869 | | * transactions for. |
1870 | | */ |
1871 | | CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate, const bool save_progress) |
1872 | 0 | { |
1873 | 0 | constexpr auto INTERVAL_TIME{60s}; |
1874 | 0 | auto current_time{reserver.now()}; |
1875 | 0 | auto start_time{reserver.now()}; |
1876 | |
|
1877 | 0 | assert(reserver.isReserved()); |
1878 | | |
1879 | 0 | uint256 block_hash = start_block; |
1880 | 0 | ScanResult result; |
1881 | |
|
1882 | 0 | std::unique_ptr<FastWalletRescanFilter> fast_rescan_filter; |
1883 | 0 | if (chain().hasBlockFilterIndex(BlockFilterType::BASIC)) fast_rescan_filter = std::make_unique<FastWalletRescanFilter>(*this); |
1884 | |
|
1885 | 0 | WalletLogPrintf("Rescan started from block %s... (%s)\n", start_block.ToString(), |
1886 | 0 | fast_rescan_filter ? "fast variant using block filters" : "slow variant inspecting all blocks"); |
1887 | |
|
1888 | 0 | fAbortRescan = false; |
1889 | 0 | ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 0); // show rescan progress in GUI as dialog or on splashscreen, if rescan required on startup (e.g. due to corruption)Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1890 | 0 | uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash()); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
1891 | 0 | uint256 end_hash = tip_hash; |
1892 | 0 | if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash)); |
1893 | 0 | double progress_begin = chain().guessVerificationProgress(block_hash); |
1894 | 0 | double progress_end = chain().guessVerificationProgress(end_hash); |
1895 | 0 | double progress_current = progress_begin; |
1896 | 0 | int block_height = start_height; |
1897 | 0 | while (!fAbortRescan && !chain().shutdownRequested()) { |
1898 | 0 | if (progress_end - progress_begin > 0.0) { |
1899 | 0 | m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin); |
1900 | 0 | } else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal) |
1901 | 0 | m_scanning_progress = 0; |
1902 | 0 | } |
1903 | 0 | if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) { |
1904 | 0 | ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1905 | 0 | } |
1906 | |
|
1907 | 0 | bool next_interval = reserver.now() >= current_time + INTERVAL_TIME; |
1908 | 0 | if (next_interval) { |
1909 | 0 | current_time = reserver.now(); |
1910 | 0 | WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current); |
1911 | 0 | } |
1912 | |
|
1913 | 0 | bool fetch_block{true}; |
1914 | 0 | if (fast_rescan_filter) { |
1915 | 0 | fast_rescan_filter->UpdateIfNeeded(); |
1916 | 0 | auto matches_block{fast_rescan_filter->MatchesBlock(block_hash)}; |
1917 | 0 | if (matches_block.has_value()) { |
1918 | 0 | if (*matches_block) { |
1919 | 0 | LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (filter matched)\n", block_height, block_hash.ToString()); Line | Count | Source | 115 | 0 | #define LogDebug(category, ...) detail_LogIfCategoryAndLevelEnabled(category, BCLog::Level::Debug, __VA_ARGS__) Line | Count | Source | 106 | 0 | do { \ | 107 | 0 | if (util::log::ShouldLog((category), (level))) { \ | 108 | 0 | bool rate_limit{level >= BCLog::Level::Info}; \ | 109 | 0 | Assume(!rate_limit); /*Only called with the levels below*/ \ Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
| 110 | 0 | LogPrintLevel_(category, level, rate_limit, __VA_ARGS__); \ Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
| 111 | 0 | } \ | 112 | 0 | } while (0) |
|
|
1920 | 0 | } else { |
1921 | 0 | result.last_scanned_block = block_hash; |
1922 | 0 | result.last_scanned_height = block_height; |
1923 | 0 | fetch_block = false; |
1924 | 0 | } |
1925 | 0 | } else { |
1926 | 0 | LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (WARNING: block filter not found!)\n", block_height, block_hash.ToString()); Line | Count | Source | 115 | 0 | #define LogDebug(category, ...) detail_LogIfCategoryAndLevelEnabled(category, BCLog::Level::Debug, __VA_ARGS__) Line | Count | Source | 106 | 0 | do { \ | 107 | 0 | if (util::log::ShouldLog((category), (level))) { \ | 108 | 0 | bool rate_limit{level >= BCLog::Level::Info}; \ | 109 | 0 | Assume(!rate_limit); /*Only called with the levels below*/ \ Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
| 110 | 0 | LogPrintLevel_(category, level, rate_limit, __VA_ARGS__); \ Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
| 111 | 0 | } \ | 112 | 0 | } while (0) |
|
|
1927 | 0 | } |
1928 | 0 | } |
1929 | | |
1930 | | // Find next block separately from reading data above, because reading |
1931 | | // is slow and there might be a reorg while it is read. |
1932 | 0 | bool block_still_active = false; |
1933 | 0 | bool next_block = false; |
1934 | 0 | uint256 next_block_hash; |
1935 | 0 | chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash))); |
1936 | |
|
1937 | 0 | if (fetch_block) { |
1938 | | // Read block data and locator if needed (the locator is usually null unless we need to save progress) |
1939 | 0 | CBlock block; |
1940 | 0 | CBlockLocator loc; |
1941 | | // Find block |
1942 | 0 | FoundBlock found_block{FoundBlock().data(block)}; |
1943 | 0 | if (save_progress && next_interval) found_block.locator(loc); |
1944 | 0 | chain().findBlock(block_hash, found_block); |
1945 | |
|
1946 | 0 | if (!block.IsNull()) { |
1947 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1948 | 0 | if (!block_still_active) { |
1949 | | // Abort scan if current block is no longer active, to prevent |
1950 | | // marking transactions as coming from the wrong block. |
1951 | 0 | result.last_failed_block = block_hash; |
1952 | 0 | result.status = ScanResult::FAILURE; |
1953 | 0 | break; |
1954 | 0 | } |
1955 | 0 | for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) { |
1956 | 0 | SyncTransaction(block.vtx[posInBlock], TxStateConfirmed{block_hash, block_height, static_cast<int>(posInBlock)}, fUpdate, /*rescanning_old_block=*/true); |
1957 | 0 | } |
1958 | | // scan succeeded, record block as most recent successfully scanned |
1959 | 0 | result.last_scanned_block = block_hash; |
1960 | 0 | result.last_scanned_height = block_height; |
1961 | |
|
1962 | 0 | if (!loc.IsNull()) { |
1963 | 0 | WalletLogPrintf("Saving scan progress %d.\n", block_height); |
1964 | 0 | WalletBatch batch(GetDatabase()); |
1965 | 0 | batch.WriteBestBlock(loc); |
1966 | 0 | } |
1967 | 0 | } else { |
1968 | | // could not scan block, keep scanning but record this block as the most recent failure |
1969 | 0 | result.last_failed_block = block_hash; |
1970 | 0 | result.status = ScanResult::FAILURE; |
1971 | 0 | } |
1972 | 0 | } |
1973 | 0 | if (max_height && block_height >= *max_height) { |
1974 | 0 | break; |
1975 | 0 | } |
1976 | | // If rescanning was triggered with cs_wallet permanently locked (AttachChain), additional blocks that were connected during the rescan |
1977 | | // aren't processed here but will be processed with the pending blockConnected notifications after the lock is released. |
1978 | | // If rescanning without a permanent cs_wallet lock, additional blocks that were added during the rescan will be re-processed if |
1979 | | // the notification was processed and the last block height was updated. |
1980 | 0 | if (block_height >= WITH_LOCK(cs_wallet, return GetLastBlockHeight())) {Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
1981 | 0 | break; |
1982 | 0 | } |
1983 | | |
1984 | 0 | { |
1985 | 0 | if (!next_block) { |
1986 | | // break successfully when rescan has reached the tip, or |
1987 | | // previous block is no longer on the chain due to a reorg |
1988 | 0 | break; |
1989 | 0 | } |
1990 | | |
1991 | | // increment block and verification progress |
1992 | 0 | block_hash = next_block_hash; |
1993 | 0 | ++block_height; |
1994 | 0 | progress_current = chain().guessVerificationProgress(block_hash); |
1995 | | |
1996 | | // handle updated tip hash |
1997 | 0 | const uint256 prev_tip_hash = tip_hash; |
1998 | 0 | tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash()); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
1999 | 0 | if (!max_height && prev_tip_hash != tip_hash) { |
2000 | | // in case the tip has changed, update progress max |
2001 | 0 | progress_end = chain().guessVerificationProgress(tip_hash); |
2002 | 0 | } |
2003 | 0 | } |
2004 | 0 | } |
2005 | 0 | if (!max_height) { |
2006 | 0 | WalletLogPrintf("Scanning current mempool transactions.\n"); |
2007 | 0 | WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this)); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
2008 | 0 | } |
2009 | 0 | ShowProgress(strprintf("[%s] %s", DisplayName(), _("Rescanning…")), 100); // hide progress dialog in GUILine | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2010 | 0 | if (block_height && fAbortRescan) { |
2011 | 0 | WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current); |
2012 | 0 | result.status = ScanResult::USER_ABORT; |
2013 | 0 | } else if (block_height && chain().shutdownRequested()) { |
2014 | 0 | WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current); |
2015 | 0 | result.status = ScanResult::USER_ABORT; |
2016 | 0 | } else { |
2017 | 0 | WalletLogPrintf("Rescan completed in %15dms\n", Ticks<std::chrono::milliseconds>(reserver.now() - start_time)); |
2018 | 0 | } |
2019 | 0 | return result; |
2020 | 0 | } |
2021 | | |
2022 | | bool CWallet::SubmitTxMemoryPoolAndRelay(CWalletTx& wtx, |
2023 | | std::string& err_string, |
2024 | | node::TxBroadcast broadcast_method) const |
2025 | 0 | { |
2026 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2027 | | |
2028 | | // Can't relay if wallet is not broadcasting |
2029 | 0 | if (!GetBroadcastTransactions()) return false; |
2030 | | // Don't relay abandoned transactions |
2031 | 0 | if (wtx.isAbandoned()) return false; |
2032 | | // Don't try to submit coinbase transactions. These would fail anyway but would |
2033 | | // cause log spam. |
2034 | 0 | if (wtx.IsCoinBase()) return false; |
2035 | | // Don't try to submit conflicted or confirmed transactions. |
2036 | 0 | if (GetTxDepthInMainChain(wtx) != 0) return false; |
2037 | | |
2038 | 0 | const char* what{""}; |
2039 | 0 | switch (broadcast_method) { |
2040 | 0 | case node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL: |
2041 | 0 | what = "to mempool and for broadcast to peers"; |
2042 | 0 | break; |
2043 | 0 | case node::TxBroadcast::MEMPOOL_NO_BROADCAST: |
2044 | 0 | what = "to mempool without broadcast"; |
2045 | 0 | break; |
2046 | 0 | case node::TxBroadcast::NO_MEMPOOL_PRIVATE_BROADCAST: |
2047 | 0 | what = "for private broadcast without adding to the mempool"; |
2048 | 0 | break; |
2049 | 0 | } |
2050 | 0 | WalletLogPrintf("Submitting wtx %s %s\n", wtx.GetHash().ToString(), what); |
2051 | | // We must set TxStateInMempool here. Even though it will also be set later by the |
2052 | | // entered-mempool callback, if we did not there would be a race where a |
2053 | | // user could call sendmoney in a loop and hit spurious out of funds errors |
2054 | | // because we think that this newly generated transaction's change is |
2055 | | // unavailable as we're not yet aware that it is in the mempool. |
2056 | | // |
2057 | | // If broadcast fails for any reason, trying to set wtx.m_state here would be incorrect. |
2058 | | // If transaction was previously in the mempool, it should be updated when |
2059 | | // TransactionRemovedFromMempool fires. |
2060 | 0 | bool ret = chain().broadcastTransaction(wtx.tx, m_default_max_tx_fee, broadcast_method, err_string); |
2061 | 0 | if (ret) wtx.m_state = TxStateInMempool{}; |
2062 | 0 | return ret; |
2063 | 0 | } |
2064 | | |
2065 | | std::set<Txid> CWallet::GetTxConflicts(const CWalletTx& wtx) const |
2066 | 0 | { |
2067 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2068 | |
|
2069 | 0 | const Txid myHash{wtx.GetHash()}; |
2070 | 0 | std::set<Txid> result{GetConflicts(myHash)}; |
2071 | 0 | result.erase(myHash); |
2072 | 0 | return result; |
2073 | 0 | } |
2074 | | |
2075 | | bool CWallet::ShouldResend() const |
2076 | 0 | { |
2077 | | // Don't attempt to resubmit if the wallet is configured to not broadcast |
2078 | 0 | if (!fBroadcastTransactions) return false; |
2079 | | |
2080 | | // During reindex, importing and IBD, old wallet transactions become |
2081 | | // unconfirmed. Don't resend them as that would spam other nodes. |
2082 | | // We only allow forcing mempool submission when not relaying to avoid this spam. |
2083 | 0 | if (!chain().isReadyToBroadcast()) return false; |
2084 | | |
2085 | | // Do this infrequently and randomly to avoid giving away |
2086 | | // that these are our transactions. |
2087 | 0 | if (NodeClock::now() < m_next_resend) return false; |
2088 | | |
2089 | 0 | return true; |
2090 | 0 | } |
2091 | | |
2092 | 0 | NodeClock::time_point CWallet::GetDefaultNextResend() { return FastRandomContext{}.rand_uniform_delay(NodeClock::now() + 12h, 24h); } |
2093 | | |
2094 | | // Resubmit transactions from the wallet to the mempool, optionally asking the |
2095 | | // mempool to relay them. On startup, we will do this for all unconfirmed |
2096 | | // transactions but will not ask the mempool to relay them. We do this on startup |
2097 | | // to ensure that our own mempool is aware of our transactions. There |
2098 | | // is a privacy side effect here as not broadcasting on startup also means that we won't |
2099 | | // inform the world of our wallet's state, particularly if the wallet (or node) is not |
2100 | | // yet synced. |
2101 | | // |
2102 | | // Otherwise this function is called periodically in order to relay our unconfirmed txs. |
2103 | | // We do this on a random timer to slightly obfuscate which transactions |
2104 | | // come from our wallet. |
2105 | | // |
2106 | | // TODO: Ideally, we'd only resend transactions that we think should have been |
2107 | | // mined in the most recent block. Any transaction that wasn't in the top |
2108 | | // blockweight of transactions in the mempool shouldn't have been mined, |
2109 | | // and so is probably just sitting in the mempool waiting to be confirmed. |
2110 | | // Rebroadcasting does nothing to speed up confirmation and only damages |
2111 | | // privacy. |
2112 | | // |
2113 | | // The `force` option results in all unconfirmed transactions being submitted to |
2114 | | // the mempool. This does not necessarily result in those transactions being relayed, |
2115 | | // that depends on the `broadcast_method` option. Periodic rebroadcast uses the pattern |
2116 | | // broadcast_method=TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL force=false, while loading into |
2117 | | // the mempool (on start, or after import) uses |
2118 | | // broadcast_method=TxBroadcast::MEMPOOL_NO_BROADCAST force=true. |
2119 | | void CWallet::ResubmitWalletTransactions(node::TxBroadcast broadcast_method, bool force) |
2120 | 0 | { |
2121 | | // Don't attempt to resubmit if the wallet is configured to not broadcast, |
2122 | | // even if forcing. |
2123 | 0 | if (!fBroadcastTransactions) return; |
2124 | | |
2125 | 0 | int submitted_tx_count = 0; |
2126 | |
|
2127 | 0 | { // cs_wallet scope |
2128 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2129 | | |
2130 | | // First filter for the transactions we want to rebroadcast. |
2131 | | // We use a set with WalletTxOrderComparator so that rebroadcasting occurs in insertion order |
2132 | 0 | std::set<CWalletTx*, WalletTxOrderComparator> to_submit; |
2133 | 0 | for (auto& [txid, wtx] : mapWallet) { |
2134 | | // Only rebroadcast unconfirmed txs |
2135 | 0 | if (!wtx.isUnconfirmed()) continue; |
2136 | | |
2137 | | // Attempt to rebroadcast all txes more than 5 minutes older than |
2138 | | // the last block, or all txs if forcing. |
2139 | 0 | if (!force && wtx.nTimeReceived > m_best_block_time - 5 * 60) continue; |
2140 | 0 | to_submit.insert(&wtx); |
2141 | 0 | } |
2142 | | // Now try submitting the transactions to the memory pool and (optionally) relay them. |
2143 | 0 | for (auto wtx : to_submit) { |
2144 | 0 | std::string unused_err_string; |
2145 | 0 | if (SubmitTxMemoryPoolAndRelay(*wtx, unused_err_string, broadcast_method)) ++submitted_tx_count; |
2146 | 0 | } |
2147 | 0 | } // cs_wallet |
2148 | |
|
2149 | 0 | if (submitted_tx_count > 0) { |
2150 | 0 | WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count); |
2151 | 0 | } |
2152 | 0 | } |
2153 | | |
2154 | | /** @} */ // end of mapWallet |
2155 | | |
2156 | | void MaybeResendWalletTxs(WalletContext& context) |
2157 | 0 | { |
2158 | 0 | for (const std::shared_ptr<CWallet>& pwallet : GetWallets(context)) { |
2159 | 0 | if (!pwallet->ShouldResend()) continue; |
2160 | 0 | pwallet->ResubmitWalletTransactions(node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL, /*force=*/false); |
2161 | 0 | pwallet->SetNextResend(); |
2162 | 0 | } |
2163 | 0 | } |
2164 | | |
2165 | | |
2166 | | bool CWallet::SignTransaction(CMutableTransaction& tx) const |
2167 | 0 | { |
2168 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2169 | | |
2170 | | // Build coins map |
2171 | 0 | std::map<COutPoint, Coin> coins; |
2172 | 0 | for (auto& input : tx.vin) { |
2173 | 0 | const auto mi = mapWallet.find(input.prevout.hash); |
2174 | 0 | if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) { |
2175 | 0 | return false; |
2176 | 0 | } |
2177 | 0 | const CWalletTx& wtx = mi->second; |
2178 | 0 | int prev_height = wtx.state<TxStateConfirmed>() ? wtx.state<TxStateConfirmed>()->confirmed_block_height : 0; |
2179 | 0 | coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], prev_height, wtx.IsCoinBase()); |
2180 | 0 | } |
2181 | 0 | std::map<int, bilingual_str> input_errors; |
2182 | 0 | return SignTransaction(tx, coins, SIGHASH_DEFAULT, input_errors); |
2183 | 0 | } |
2184 | | |
2185 | | bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const |
2186 | 0 | { |
2187 | | // Try to sign with all ScriptPubKeyMans |
2188 | 0 | for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) { |
2189 | | // spk_man->SignTransaction will return true if the transaction is complete, |
2190 | | // so we can exit early and return true if that happens |
2191 | 0 | if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) { |
2192 | 0 | return true; |
2193 | 0 | } |
2194 | 0 | } |
2195 | | |
2196 | | // At this point, one input was not fully signed otherwise we would have exited already |
2197 | 0 | return false; |
2198 | 0 | } |
2199 | | |
2200 | | std::optional<PSBTError> CWallet::FillPSBT(PartiallySignedTransaction& psbtx, bool& complete, std::optional<int> sighash_type, bool sign, bool bip32derivs, size_t * n_signed, bool finalize) const |
2201 | 0 | { |
2202 | 0 | if (n_signed) { |
2203 | 0 | *n_signed = 0; |
2204 | 0 | } |
2205 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2206 | | // Get all of the previous transactions |
2207 | 0 | for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) { |
2208 | 0 | const CTxIn& txin = psbtx.tx->vin[i]; |
2209 | 0 | PSBTInput& input = psbtx.inputs.at(i); |
2210 | |
|
2211 | 0 | if (PSBTInputSigned(input)) { |
2212 | 0 | continue; |
2213 | 0 | } |
2214 | | |
2215 | | // If we have no utxo, grab it from the wallet. |
2216 | 0 | if (!input.non_witness_utxo) { |
2217 | 0 | const Txid& txhash = txin.prevout.hash; |
2218 | 0 | const auto it = mapWallet.find(txhash); |
2219 | 0 | if (it != mapWallet.end()) { |
2220 | 0 | const CWalletTx& wtx = it->second; |
2221 | | // We only need the non_witness_utxo, which is a superset of the witness_utxo. |
2222 | | // The signing code will switch to the smaller witness_utxo if this is ok. |
2223 | 0 | input.non_witness_utxo = wtx.tx; |
2224 | 0 | } |
2225 | 0 | } |
2226 | 0 | } |
2227 | |
|
2228 | 0 | const PrecomputedTransactionData txdata = PrecomputePSBTData(psbtx); |
2229 | | |
2230 | | // Fill in information from ScriptPubKeyMans |
2231 | 0 | for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) { |
2232 | 0 | int n_signed_this_spkm = 0; |
2233 | 0 | const auto error{spk_man->FillPSBT(psbtx, txdata, sighash_type, sign, bip32derivs, &n_signed_this_spkm, finalize)}; |
2234 | 0 | if (error) { |
2235 | 0 | return error; |
2236 | 0 | } |
2237 | | |
2238 | 0 | if (n_signed) { |
2239 | 0 | (*n_signed) += n_signed_this_spkm; |
2240 | 0 | } |
2241 | 0 | } |
2242 | | |
2243 | 0 | RemoveUnnecessaryTransactions(psbtx); |
2244 | | |
2245 | | // Complete if every input is now signed |
2246 | 0 | complete = true; |
2247 | 0 | for (size_t i = 0; i < psbtx.inputs.size(); ++i) { |
2248 | 0 | complete &= PSBTInputSignedAndVerified(psbtx, i, &txdata); |
2249 | 0 | } |
2250 | |
|
2251 | 0 | return {}; |
2252 | 0 | } |
2253 | | |
2254 | | SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const |
2255 | 0 | { |
2256 | 0 | SignatureData sigdata; |
2257 | 0 | CScript script_pub_key = GetScriptForDestination(pkhash); |
2258 | 0 | for (const auto& spk_man_pair : m_spk_managers) { |
2259 | 0 | if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) { |
2260 | 0 | LOCK(cs_wallet); // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2261 | 0 | return spk_man_pair.second->SignMessage(message, pkhash, str_sig); |
2262 | 0 | } |
2263 | 0 | } |
2264 | 0 | return SigningResult::PRIVATE_KEY_NOT_AVAILABLE; |
2265 | 0 | } |
2266 | | |
2267 | | OutputType CWallet::TransactionChangeType(const std::optional<OutputType>& change_type, const std::vector<CRecipient>& vecSend) const |
2268 | 0 | { |
2269 | | // If -changetype is specified, always use that change type. |
2270 | 0 | if (change_type) { |
2271 | 0 | return *change_type; |
2272 | 0 | } |
2273 | | |
2274 | | // if m_default_address_type is legacy, use legacy address as change. |
2275 | 0 | if (m_default_address_type == OutputType::LEGACY) { |
2276 | 0 | return OutputType::LEGACY; |
2277 | 0 | } |
2278 | | |
2279 | 0 | bool any_tr{false}; |
2280 | 0 | bool any_wpkh{false}; |
2281 | 0 | bool any_sh{false}; |
2282 | 0 | bool any_pkh{false}; |
2283 | |
|
2284 | 0 | for (const auto& recipient : vecSend) { |
2285 | 0 | if (std::get_if<WitnessV1Taproot>(&recipient.dest)) { |
2286 | 0 | any_tr = true; |
2287 | 0 | } else if (std::get_if<WitnessV0KeyHash>(&recipient.dest)) { |
2288 | 0 | any_wpkh = true; |
2289 | 0 | } else if (std::get_if<ScriptHash>(&recipient.dest)) { |
2290 | 0 | any_sh = true; |
2291 | 0 | } else if (std::get_if<PKHash>(&recipient.dest)) { |
2292 | 0 | any_pkh = true; |
2293 | 0 | } |
2294 | 0 | } |
2295 | |
|
2296 | 0 | const bool has_bech32m_spkman(GetScriptPubKeyMan(OutputType::BECH32M, /*internal=*/true)); |
2297 | 0 | if (has_bech32m_spkman && any_tr) { |
2298 | | // Currently tr is the only type supported by the BECH32M spkman |
2299 | 0 | return OutputType::BECH32M; |
2300 | 0 | } |
2301 | 0 | const bool has_bech32_spkman(GetScriptPubKeyMan(OutputType::BECH32, /*internal=*/true)); |
2302 | 0 | if (has_bech32_spkman && any_wpkh) { |
2303 | | // Currently wpkh is the only type supported by the BECH32 spkman |
2304 | 0 | return OutputType::BECH32; |
2305 | 0 | } |
2306 | 0 | const bool has_p2sh_segwit_spkman(GetScriptPubKeyMan(OutputType::P2SH_SEGWIT, /*internal=*/true)); |
2307 | 0 | if (has_p2sh_segwit_spkman && any_sh) { |
2308 | | // Currently sh_wpkh is the only type supported by the P2SH_SEGWIT spkman |
2309 | | // As of 2021 about 80% of all SH are wrapping WPKH, so use that |
2310 | 0 | return OutputType::P2SH_SEGWIT; |
2311 | 0 | } |
2312 | 0 | const bool has_legacy_spkman(GetScriptPubKeyMan(OutputType::LEGACY, /*internal=*/true)); |
2313 | 0 | if (has_legacy_spkman && any_pkh) { |
2314 | | // Currently pkh is the only type supported by the LEGACY spkman |
2315 | 0 | return OutputType::LEGACY; |
2316 | 0 | } |
2317 | | |
2318 | 0 | if (has_bech32m_spkman) { |
2319 | 0 | return OutputType::BECH32M; |
2320 | 0 | } |
2321 | 0 | if (has_bech32_spkman) { |
2322 | 0 | return OutputType::BECH32; |
2323 | 0 | } |
2324 | | // else use m_default_address_type for change |
2325 | 0 | return m_default_address_type; |
2326 | 0 | } |
2327 | | |
2328 | | void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm) |
2329 | 0 | { |
2330 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2331 | 0 | WalletLogPrintf("CommitTransaction:\n%s\n", util::RemoveSuffixView(tx->ToString(), "\n")); |
2332 | | |
2333 | | // Add tx to wallet, because if it has change it's also ours, |
2334 | | // otherwise just for transaction history. |
2335 | 0 | CWalletTx* wtx = AddToWallet(tx, TxStateInactive{}, [&](CWalletTx& wtx, bool new_tx) { |
2336 | 0 | CHECK_NONFATAL(wtx.mapValue.empty()); Line | Count | Source | 110 | 0 | inline_check_non_fatal(condition, std::source_location::current(), #condition) |
|
2337 | 0 | CHECK_NONFATAL(wtx.vOrderForm.empty()); Line | Count | Source | 110 | 0 | inline_check_non_fatal(condition, std::source_location::current(), #condition) |
|
2338 | 0 | wtx.mapValue = std::move(mapValue); |
2339 | 0 | wtx.vOrderForm = std::move(orderForm); |
2340 | 0 | return true; |
2341 | 0 | }); |
2342 | | |
2343 | | // wtx can only be null if the db write failed. |
2344 | 0 | if (!wtx) { |
2345 | 0 | throw std::runtime_error(std::string(__func__) + ": Wallet db error, transaction commit failed"); |
2346 | 0 | } |
2347 | | |
2348 | | // Notify that old coins are spent |
2349 | 0 | for (const CTxIn& txin : tx->vin) { |
2350 | 0 | CWalletTx &coin = mapWallet.at(txin.prevout.hash); |
2351 | 0 | coin.MarkDirty(); |
2352 | 0 | NotifyTransactionChanged(coin.GetHash(), CT_UPDATED); |
2353 | 0 | } |
2354 | |
|
2355 | 0 | if (!fBroadcastTransactions) { |
2356 | | // Don't submit tx to the mempool |
2357 | 0 | return; |
2358 | 0 | } |
2359 | | |
2360 | 0 | std::string err_string; |
2361 | 0 | if (!SubmitTxMemoryPoolAndRelay(*wtx, err_string, node::TxBroadcast::MEMPOOL_AND_BROADCAST_TO_ALL)) { |
2362 | 0 | WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string); |
2363 | | // TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure. |
2364 | 0 | } |
2365 | 0 | } |
2366 | | |
2367 | | DBErrors CWallet::PopulateWalletFromDB(bilingual_str& error, std::vector<bilingual_str>& warnings) |
2368 | 0 | { |
2369 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2370 | |
|
2371 | 0 | Assert(m_spk_managers.empty()); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
2372 | 0 | Assert(m_wallet_flags == 0); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
2373 | 0 | DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this); |
2374 | |
|
2375 | 0 | if (m_spk_managers.empty()) { |
2376 | 0 | assert(m_external_spk_managers.empty()); |
2377 | 0 | assert(m_internal_spk_managers.empty()); |
2378 | 0 | } |
2379 | | |
2380 | 0 | const auto wallet_file = m_database->Filename(); |
2381 | 0 | switch (nLoadWalletRet) { |
2382 | 0 | case DBErrors::LOAD_OK: |
2383 | 0 | break; |
2384 | 0 | case DBErrors::NONCRITICAL_ERROR: |
2385 | 0 | warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2386 | 0 | " or address metadata may be missing or incorrect."), |
2387 | 0 | wallet_file)); |
2388 | 0 | break; |
2389 | 0 | case DBErrors::NEED_RESCAN: |
2390 | 0 | warnings.push_back(strprintf(_("Error reading %s! Transaction data may be missing or incorrect."Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2391 | 0 | " Rescanning wallet."), wallet_file)); |
2392 | 0 | break; |
2393 | 0 | case DBErrors::CORRUPT: |
2394 | 0 | error = strprintf(_("Error loading %s: Wallet corrupted"), wallet_file);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2395 | 0 | break; |
2396 | 0 | case DBErrors::TOO_NEW: |
2397 | 0 | error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), wallet_file, CLIENT_NAME);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
| error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), wallet_file, CLIENT_NAME);Line | Count | Source | 98 | 0 | #define CLIENT_NAME "Bitcoin Core" |
|
2398 | 0 | break; |
2399 | 0 | case DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED: |
2400 | 0 | error = strprintf(_("Error loading %s: External signer wallet being loaded without external signer support compiled"), wallet_file);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2401 | 0 | break; |
2402 | 0 | case DBErrors::UNKNOWN_DESCRIPTOR: |
2403 | 0 | error = strprintf(_("Unrecognized descriptor found. Loading wallet %s\n\n"Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2404 | 0 | "The wallet might have been created on a newer version.\n" |
2405 | 0 | "Please try running the latest software version.\n"), wallet_file); |
2406 | 0 | break; |
2407 | 0 | case DBErrors::UNEXPECTED_LEGACY_ENTRY: |
2408 | 0 | error = strprintf(_("Unexpected legacy entry in descriptor wallet found. Loading wallet %s\n\n"Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2409 | 0 | "The wallet might have been tampered with or created with malicious intent.\n"), wallet_file); |
2410 | 0 | break; |
2411 | 0 | case DBErrors::LEGACY_WALLET: |
2412 | 0 | error = strprintf(_("Error loading %s: Wallet is a legacy wallet. Please migrate to a descriptor wallet using the migration tool (migratewallet RPC)."), wallet_file);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2413 | 0 | break; |
2414 | 0 | case DBErrors::LOAD_FAIL: |
2415 | 0 | error = strprintf(_("Error loading %s"), wallet_file);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2416 | 0 | break; |
2417 | 0 | } // no default case, so the compiler can warn about missing cases |
2418 | 0 | return nLoadWalletRet; |
2419 | 0 | } |
2420 | | |
2421 | | util::Result<void> CWallet::RemoveTxs(std::vector<Txid>& txs_to_remove) |
2422 | 0 | { |
2423 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2424 | 0 | bilingual_str str_err; // future: make RunWithinTxn return a util::Result |
2425 | 0 | bool was_txn_committed = RunWithinTxn(GetDatabase(), /*process_desc=*/"remove transactions", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) { |
2426 | 0 | util::Result<void> result{RemoveTxs(batch, txs_to_remove)}; |
2427 | 0 | if (!result) str_err = util::ErrorString(result); |
2428 | 0 | return result.has_value(); |
2429 | 0 | }); |
2430 | 0 | if (!str_err.empty()) return util::Error{str_err}; |
2431 | 0 | if (!was_txn_committed) return util::Error{_("Error starting/committing db txn for wallet transactions removal process")}; |
2432 | 0 | return {}; // all good |
2433 | 0 | } |
2434 | | |
2435 | | util::Result<void> CWallet::RemoveTxs(WalletBatch& batch, std::vector<Txid>& txs_to_remove) |
2436 | 0 | { |
2437 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2438 | 0 | if (!batch.HasActiveTxn()) return util::Error{strprintf(_("The transactions removal process can only be executed within a db txn"))};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2439 | | |
2440 | | // Check for transaction existence and remove entries from disk |
2441 | 0 | std::vector<decltype(mapWallet)::const_iterator> erased_txs; |
2442 | 0 | bilingual_str str_err; |
2443 | 0 | for (const Txid& hash : txs_to_remove) { |
2444 | 0 | auto it_wtx = mapWallet.find(hash); |
2445 | 0 | if (it_wtx == mapWallet.end()) { |
2446 | 0 | return util::Error{strprintf(_("Transaction %s does not belong to this wallet"), hash.GetHex())};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2447 | 0 | } |
2448 | 0 | if (!batch.EraseTx(hash)) { |
2449 | 0 | return util::Error{strprintf(_("Failure removing transaction: %s"), hash.GetHex())};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2450 | 0 | } |
2451 | 0 | erased_txs.emplace_back(it_wtx); |
2452 | 0 | } |
2453 | | |
2454 | | // Register callback to update the memory state only when the db txn is actually dumped to disk |
2455 | 0 | batch.RegisterTxnListener({.on_commit=[&, erased_txs]() EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) { |
2456 | | // Update the in-memory state and notify upper layers about the removals |
2457 | 0 | for (const auto& it : erased_txs) { |
2458 | 0 | const Txid hash{it->first}; |
2459 | 0 | wtxOrdered.erase(it->second.m_it_wtxOrdered); |
2460 | 0 | for (const auto& txin : it->second.tx->vin) { |
2461 | 0 | auto range = mapTxSpends.equal_range(txin.prevout); |
2462 | 0 | for (auto iter = range.first; iter != range.second; ++iter) { |
2463 | 0 | if (iter->second == hash) { |
2464 | 0 | mapTxSpends.erase(iter); |
2465 | 0 | break; |
2466 | 0 | } |
2467 | 0 | } |
2468 | 0 | } |
2469 | 0 | for (unsigned int i = 0; i < it->second.tx->vout.size(); ++i) { |
2470 | 0 | m_txos.erase(COutPoint(hash, i)); |
2471 | 0 | } |
2472 | 0 | mapWallet.erase(it); |
2473 | 0 | NotifyTransactionChanged(hash, CT_DELETED); |
2474 | 0 | } |
2475 | |
|
2476 | 0 | MarkDirty(); |
2477 | 0 | }, .on_abort={}}); |
2478 | |
|
2479 | 0 | return {}; |
2480 | 0 | } |
2481 | | |
2482 | | bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& new_purpose) |
2483 | 0 | { |
2484 | 0 | bool fUpdated = false; |
2485 | 0 | bool is_mine; |
2486 | 0 | std::optional<AddressPurpose> purpose; |
2487 | 0 | { |
2488 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2489 | 0 | std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address); |
2490 | 0 | fUpdated = mi != m_address_book.end() && !mi->second.IsChange(); |
2491 | |
|
2492 | 0 | CAddressBookData& record = mi != m_address_book.end() ? mi->second : m_address_book[address]; |
2493 | 0 | record.SetLabel(strName); |
2494 | 0 | is_mine = IsMine(address); |
2495 | 0 | if (new_purpose) { /* update purpose only if requested */ |
2496 | 0 | record.purpose = new_purpose; |
2497 | 0 | } |
2498 | 0 | purpose = record.purpose; |
2499 | 0 | } |
2500 | |
|
2501 | 0 | const std::string& encoded_dest = EncodeDestination(address); |
2502 | 0 | if (new_purpose && !batch.WritePurpose(encoded_dest, PurposeToString(*new_purpose))) { |
2503 | 0 | WalletLogPrintf("Error: fail to write address book 'purpose' entry\n"); |
2504 | 0 | return false; |
2505 | 0 | } |
2506 | 0 | if (!batch.WriteName(encoded_dest, strName)) { |
2507 | 0 | WalletLogPrintf("Error: fail to write address book 'name' entry\n"); |
2508 | 0 | return false; |
2509 | 0 | } |
2510 | | |
2511 | | // In very old wallets, address purpose may not be recorded so we derive it from IsMine |
2512 | 0 | NotifyAddressBookChanged(address, strName, is_mine, |
2513 | 0 | purpose.value_or(is_mine ? AddressPurpose::RECEIVE : AddressPurpose::SEND), |
2514 | 0 | (fUpdated ? CT_UPDATED : CT_NEW)); |
2515 | 0 | return true; |
2516 | 0 | } |
2517 | | |
2518 | | bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& purpose) |
2519 | 0 | { |
2520 | 0 | WalletBatch batch(GetDatabase()); |
2521 | 0 | return SetAddressBookWithDB(batch, address, strName, purpose); |
2522 | 0 | } |
2523 | | |
2524 | | bool CWallet::DelAddressBook(const CTxDestination& address) |
2525 | 0 | { |
2526 | 0 | return RunWithinTxn(GetDatabase(), /*process_desc=*/"address book entry removal", [&](WalletBatch& batch){ |
2527 | 0 | return DelAddressBookWithDB(batch, address); |
2528 | 0 | }); |
2529 | 0 | } |
2530 | | |
2531 | | bool CWallet::DelAddressBookWithDB(WalletBatch& batch, const CTxDestination& address) |
2532 | 0 | { |
2533 | 0 | const std::string& dest = EncodeDestination(address); |
2534 | 0 | { |
2535 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2536 | | // If we want to delete receiving addresses, we should avoid calling EraseAddressData because it will delete the previously_spent value. Could instead just erase the label so it becomes a change address, and keep the data. |
2537 | | // NOTE: This isn't a problem for sending addresses because they don't have any data that needs to be kept. |
2538 | | // When adding new address data, it should be considered here whether to retain or delete it. |
2539 | 0 | if (IsMine(address)) { |
2540 | 0 | WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, CLIENT_BUGREPORT);Line | Count | Source | 95 | 0 | #define CLIENT_BUGREPORT "https://github.com/bitcoin/bitcoin/issues" |
|
2541 | 0 | return false; |
2542 | 0 | } |
2543 | | // Delete data rows associated with this address |
2544 | 0 | if (!batch.EraseAddressData(address)) { |
2545 | 0 | WalletLogPrintf("Error: cannot erase address book entry data\n"); |
2546 | 0 | return false; |
2547 | 0 | } |
2548 | | |
2549 | | // Delete purpose entry |
2550 | 0 | if (!batch.ErasePurpose(dest)) { |
2551 | 0 | WalletLogPrintf("Error: cannot erase address book entry purpose\n"); |
2552 | 0 | return false; |
2553 | 0 | } |
2554 | | |
2555 | | // Delete name entry |
2556 | 0 | if (!batch.EraseName(dest)) { |
2557 | 0 | WalletLogPrintf("Error: cannot erase address book entry name\n"); |
2558 | 0 | return false; |
2559 | 0 | } |
2560 | | |
2561 | | // finally, remove it from the map |
2562 | 0 | m_address_book.erase(address); |
2563 | 0 | } |
2564 | | |
2565 | | // All good, signal changes |
2566 | 0 | NotifyAddressBookChanged(address, "", /*is_mine=*/false, AddressPurpose::SEND, CT_DELETED); |
2567 | 0 | return true; |
2568 | 0 | } |
2569 | | |
2570 | | size_t CWallet::KeypoolCountExternalKeys() const |
2571 | 0 | { |
2572 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2573 | |
|
2574 | 0 | unsigned int count = 0; |
2575 | 0 | for (auto spk_man : m_external_spk_managers) { |
2576 | 0 | count += spk_man.second->GetKeyPoolSize(); |
2577 | 0 | } |
2578 | |
|
2579 | 0 | return count; |
2580 | 0 | } |
2581 | | |
2582 | | unsigned int CWallet::GetKeyPoolSize() const |
2583 | 0 | { |
2584 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2585 | |
|
2586 | 0 | unsigned int count = 0; |
2587 | 0 | for (auto spk_man : GetActiveScriptPubKeyMans()) { |
2588 | 0 | count += spk_man->GetKeyPoolSize(); |
2589 | 0 | } |
2590 | 0 | return count; |
2591 | 0 | } |
2592 | | |
2593 | | bool CWallet::TopUpKeyPool(unsigned int kpSize) |
2594 | 0 | { |
2595 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2596 | 0 | bool res = true; |
2597 | 0 | for (auto spk_man : GetActiveScriptPubKeyMans()) { |
2598 | 0 | res &= spk_man->TopUp(kpSize); |
2599 | 0 | } |
2600 | 0 | return res; |
2601 | 0 | } |
2602 | | |
2603 | | util::Result<CTxDestination> CWallet::GetNewDestination(const OutputType type, const std::string& label) |
2604 | 0 | { |
2605 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2606 | 0 | auto spk_man = GetScriptPubKeyMan(type, /*internal=*/false); |
2607 | 0 | if (!spk_man) { |
2608 | 0 | return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2609 | 0 | } |
2610 | | |
2611 | 0 | auto op_dest = spk_man->GetNewDestination(type); |
2612 | 0 | if (op_dest) { |
2613 | 0 | SetAddressBook(*op_dest, label, AddressPurpose::RECEIVE); |
2614 | 0 | } |
2615 | |
|
2616 | 0 | return op_dest; |
2617 | 0 | } |
2618 | | |
2619 | | util::Result<CTxDestination> CWallet::GetNewChangeDestination(const OutputType type) |
2620 | 0 | { |
2621 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
2622 | |
|
2623 | 0 | ReserveDestination reservedest(this, type); |
2624 | 0 | auto op_dest = reservedest.GetReservedDestination(true); |
2625 | 0 | if (op_dest) reservedest.KeepDestination(); |
2626 | |
|
2627 | 0 | return op_dest; |
2628 | 0 | } |
2629 | | |
2630 | 0 | void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) { |
2631 | 0 | for (auto& entry : mapWallet) { |
2632 | 0 | CWalletTx& wtx = entry.second; |
2633 | 0 | if (wtx.m_is_cache_empty) continue; |
2634 | 0 | for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) { |
2635 | 0 | CTxDestination dst; |
2636 | 0 | if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.contains(dst)) { |
2637 | 0 | wtx.MarkDirty(); |
2638 | 0 | break; |
2639 | 0 | } |
2640 | 0 | } |
2641 | 0 | } |
2642 | 0 | } |
2643 | | |
2644 | | void CWallet::ForEachAddrBookEntry(const ListAddrBookFunc& func) const |
2645 | 0 | { |
2646 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2647 | 0 | for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book) { |
2648 | 0 | const auto& entry = item.second; |
2649 | 0 | func(item.first, entry.GetLabel(), entry.IsChange(), entry.purpose); |
2650 | 0 | } |
2651 | 0 | } |
2652 | | |
2653 | | std::vector<CTxDestination> CWallet::ListAddrBookAddresses(const std::optional<AddrBookFilter>& _filter) const |
2654 | 0 | { |
2655 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2656 | 0 | std::vector<CTxDestination> result; |
2657 | 0 | AddrBookFilter filter = _filter ? *_filter : AddrBookFilter(); |
2658 | 0 | ForEachAddrBookEntry([&result, &filter](const CTxDestination& dest, const std::string& label, bool is_change, const std::optional<AddressPurpose>& purpose) { |
2659 | | // Filter by change |
2660 | 0 | if (filter.ignore_change && is_change) return; |
2661 | | // Filter by label |
2662 | 0 | if (filter.m_op_label && *filter.m_op_label != label) return; |
2663 | | // All good |
2664 | 0 | result.emplace_back(dest); |
2665 | 0 | }); |
2666 | 0 | return result; |
2667 | 0 | } |
2668 | | |
2669 | | std::set<std::string> CWallet::ListAddrBookLabels(const std::optional<AddressPurpose> purpose) const |
2670 | 0 | { |
2671 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2672 | 0 | std::set<std::string> label_set; |
2673 | 0 | ForEachAddrBookEntry([&](const CTxDestination& _dest, const std::string& _label, |
2674 | 0 | bool _is_change, const std::optional<AddressPurpose>& _purpose) { |
2675 | 0 | if (_is_change) return; |
2676 | 0 | if (!purpose || purpose == _purpose) { |
2677 | 0 | label_set.insert(_label); |
2678 | 0 | } |
2679 | 0 | }); |
2680 | 0 | return label_set; |
2681 | 0 | } |
2682 | | |
2683 | | util::Result<CTxDestination> ReserveDestination::GetReservedDestination(bool internal) |
2684 | 0 | { |
2685 | 0 | m_spk_man = pwallet->GetScriptPubKeyMan(type, internal); |
2686 | 0 | if (!m_spk_man) { |
2687 | 0 | return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2688 | 0 | } |
2689 | | |
2690 | 0 | if (nIndex == -1) { |
2691 | 0 | int64_t index; |
2692 | 0 | auto op_address = m_spk_man->GetReservedDestination(type, internal, index); |
2693 | 0 | if (!op_address) return op_address; |
2694 | 0 | nIndex = index; |
2695 | 0 | address = *op_address; |
2696 | 0 | } |
2697 | 0 | return address; |
2698 | 0 | } |
2699 | | |
2700 | | void ReserveDestination::KeepDestination() |
2701 | 0 | { |
2702 | 0 | if (nIndex != -1) { |
2703 | 0 | m_spk_man->KeepDestination(nIndex, type); |
2704 | 0 | } |
2705 | 0 | nIndex = -1; |
2706 | 0 | address = CNoDestination(); |
2707 | 0 | } |
2708 | | |
2709 | | void ReserveDestination::ReturnDestination() |
2710 | 0 | { |
2711 | 0 | if (nIndex != -1) { |
2712 | 0 | m_spk_man->ReturnDestination(nIndex, fInternal, address); |
2713 | 0 | } |
2714 | 0 | nIndex = -1; |
2715 | 0 | address = CNoDestination(); |
2716 | 0 | } |
2717 | | |
2718 | | util::Result<void> CWallet::DisplayAddress(const CTxDestination& dest) |
2719 | 0 | { |
2720 | 0 | CScript scriptPubKey = GetScriptForDestination(dest); |
2721 | 0 | for (const auto& spk_man : GetScriptPubKeyMans(scriptPubKey)) { |
2722 | 0 | auto signer_spk_man = dynamic_cast<ExternalSignerScriptPubKeyMan *>(spk_man); |
2723 | 0 | if (signer_spk_man == nullptr) { |
2724 | 0 | continue; |
2725 | 0 | } |
2726 | 0 | auto signer{ExternalSignerScriptPubKeyMan::GetExternalSigner()}; |
2727 | 0 | if (!signer) throw std::runtime_error(util::ErrorString(signer).original); |
2728 | 0 | return signer_spk_man->DisplayAddress(dest, *signer); |
2729 | 0 | } |
2730 | 0 | return util::Error{_("There is no ScriptPubKeyManager for this address")}; |
2731 | 0 | } |
2732 | | |
2733 | | void CWallet::LoadLockedCoin(const COutPoint& coin, bool persistent) |
2734 | 0 | { |
2735 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2736 | 0 | m_locked_coins.emplace(coin, persistent); |
2737 | 0 | } |
2738 | | |
2739 | | bool CWallet::LockCoin(const COutPoint& output, bool persist) |
2740 | 0 | { |
2741 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2742 | 0 | LoadLockedCoin(output, persist); |
2743 | 0 | if (persist) { |
2744 | 0 | WalletBatch batch(GetDatabase()); |
2745 | 0 | return batch.WriteLockedUTXO(output); |
2746 | 0 | } |
2747 | 0 | return true; |
2748 | 0 | } |
2749 | | |
2750 | | bool CWallet::UnlockCoin(const COutPoint& output) |
2751 | 0 | { |
2752 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2753 | 0 | auto locked_coin_it = m_locked_coins.find(output); |
2754 | 0 | if (locked_coin_it != m_locked_coins.end()) { |
2755 | 0 | bool persisted = locked_coin_it->second; |
2756 | 0 | m_locked_coins.erase(locked_coin_it); |
2757 | 0 | if (persisted) { |
2758 | 0 | WalletBatch batch(GetDatabase()); |
2759 | 0 | return batch.EraseLockedUTXO(output); |
2760 | 0 | } |
2761 | 0 | } |
2762 | 0 | return true; |
2763 | 0 | } |
2764 | | |
2765 | | bool CWallet::UnlockAllCoins() |
2766 | 0 | { |
2767 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2768 | 0 | bool success = true; |
2769 | 0 | WalletBatch batch(GetDatabase()); |
2770 | 0 | for (const auto& [coin, persistent] : m_locked_coins) { |
2771 | 0 | if (persistent) success = success && batch.EraseLockedUTXO(coin); |
2772 | 0 | } |
2773 | 0 | m_locked_coins.clear(); |
2774 | 0 | return success; |
2775 | 0 | } |
2776 | | |
2777 | | bool CWallet::IsLockedCoin(const COutPoint& output) const |
2778 | 0 | { |
2779 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2780 | 0 | return m_locked_coins.contains(output); |
2781 | 0 | } |
2782 | | |
2783 | | void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const |
2784 | 0 | { |
2785 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
2786 | 0 | for (const auto& [coin, _] : m_locked_coins) { |
2787 | 0 | vOutpts.push_back(coin); |
2788 | 0 | } |
2789 | 0 | } |
2790 | | |
2791 | | /** |
2792 | | * Compute smart timestamp for a transaction being added to the wallet. |
2793 | | * |
2794 | | * Logic: |
2795 | | * - If sending a transaction, assign its timestamp to the current time. |
2796 | | * - If receiving a transaction outside a block, assign its timestamp to the |
2797 | | * current time. |
2798 | | * - If receiving a transaction during a rescanning process, assign all its |
2799 | | * (not already known) transactions' timestamps to the block time. |
2800 | | * - If receiving a block with a future timestamp, assign all its (not already |
2801 | | * known) transactions' timestamps to the current time. |
2802 | | * - If receiving a block with a past timestamp, before the most recent known |
2803 | | * transaction (that we care about), assign all its (not already known) |
2804 | | * transactions' timestamps to the same timestamp as that most-recent-known |
2805 | | * transaction. |
2806 | | * - If receiving a block with a past timestamp, but after the most recent known |
2807 | | * transaction, assign all its (not already known) transactions' timestamps to |
2808 | | * the block time. |
2809 | | * |
2810 | | * For more information see CWalletTx::nTimeSmart, |
2811 | | * https://bitcointalk.org/?topic=54527, or |
2812 | | * https://github.com/bitcoin/bitcoin/pull/1393. |
2813 | | */ |
2814 | | unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const |
2815 | 0 | { |
2816 | 0 | std::optional<uint256> block_hash; |
2817 | 0 | if (auto* conf = wtx.state<TxStateConfirmed>()) { |
2818 | 0 | block_hash = conf->confirmed_block_hash; |
2819 | 0 | } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) { |
2820 | 0 | block_hash = conf->conflicting_block_hash; |
2821 | 0 | } |
2822 | |
|
2823 | 0 | unsigned int nTimeSmart = wtx.nTimeReceived; |
2824 | 0 | if (block_hash) { |
2825 | 0 | int64_t blocktime; |
2826 | 0 | int64_t block_max_time; |
2827 | 0 | if (chain().findBlock(*block_hash, FoundBlock().time(blocktime).maxTime(block_max_time))) { |
2828 | 0 | if (rescanning_old_block) { |
2829 | 0 | nTimeSmart = block_max_time; |
2830 | 0 | } else { |
2831 | 0 | int64_t latestNow = wtx.nTimeReceived; |
2832 | 0 | int64_t latestEntry = 0; |
2833 | | |
2834 | | // Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future |
2835 | 0 | int64_t latestTolerated = latestNow + 300; |
2836 | 0 | const TxItems& txOrdered = wtxOrdered; |
2837 | 0 | for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) { |
2838 | 0 | CWalletTx* const pwtx = it->second; |
2839 | 0 | if (pwtx == &wtx) { |
2840 | 0 | continue; |
2841 | 0 | } |
2842 | 0 | int64_t nSmartTime; |
2843 | 0 | nSmartTime = pwtx->nTimeSmart; |
2844 | 0 | if (!nSmartTime) { |
2845 | 0 | nSmartTime = pwtx->nTimeReceived; |
2846 | 0 | } |
2847 | 0 | if (nSmartTime <= latestTolerated) { |
2848 | 0 | latestEntry = nSmartTime; |
2849 | 0 | if (nSmartTime > latestNow) { |
2850 | 0 | latestNow = nSmartTime; |
2851 | 0 | } |
2852 | 0 | break; |
2853 | 0 | } |
2854 | 0 | } |
2855 | |
|
2856 | 0 | nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow)); |
2857 | 0 | } |
2858 | 0 | } else { |
2859 | 0 | WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), block_hash->ToString()); |
2860 | 0 | } |
2861 | 0 | } |
2862 | 0 | return nTimeSmart; |
2863 | 0 | } |
2864 | | |
2865 | | bool CWallet::SetAddressPreviouslySpent(WalletBatch& batch, const CTxDestination& dest, bool used) |
2866 | 0 | { |
2867 | 0 | if (std::get_if<CNoDestination>(&dest)) |
2868 | 0 | return false; |
2869 | | |
2870 | 0 | if (!used) { |
2871 | 0 | if (auto* data{common::FindKey(m_address_book, dest)}) data->previously_spent = false; |
2872 | 0 | return batch.WriteAddressPreviouslySpent(dest, false); |
2873 | 0 | } |
2874 | | |
2875 | 0 | LoadAddressPreviouslySpent(dest); |
2876 | 0 | return batch.WriteAddressPreviouslySpent(dest, true); |
2877 | 0 | } |
2878 | | |
2879 | | void CWallet::LoadAddressPreviouslySpent(const CTxDestination& dest) |
2880 | 0 | { |
2881 | 0 | m_address_book[dest].previously_spent = true; |
2882 | 0 | } |
2883 | | |
2884 | | void CWallet::LoadAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& request) |
2885 | 0 | { |
2886 | 0 | m_address_book[dest].receive_requests[id] = request; |
2887 | 0 | } |
2888 | | |
2889 | | bool CWallet::IsAddressPreviouslySpent(const CTxDestination& dest) const |
2890 | 0 | { |
2891 | 0 | if (auto* data{common::FindKey(m_address_book, dest)}) return data->previously_spent; |
2892 | 0 | return false; |
2893 | 0 | } |
2894 | | |
2895 | | std::vector<std::string> CWallet::GetAddressReceiveRequests() const |
2896 | 0 | { |
2897 | 0 | std::vector<std::string> values; |
2898 | 0 | for (const auto& [dest, entry] : m_address_book) { |
2899 | 0 | for (const auto& [id, request] : entry.receive_requests) { |
2900 | 0 | values.emplace_back(request); |
2901 | 0 | } |
2902 | 0 | } |
2903 | 0 | return values; |
2904 | 0 | } |
2905 | | |
2906 | | bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value) |
2907 | 0 | { |
2908 | 0 | if (!batch.WriteAddressReceiveRequest(dest, id, value)) return false; |
2909 | 0 | m_address_book[dest].receive_requests[id] = value; |
2910 | 0 | return true; |
2911 | 0 | } |
2912 | | |
2913 | | bool CWallet::EraseAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id) |
2914 | 0 | { |
2915 | 0 | if (!batch.EraseAddressReceiveRequest(dest, id)) return false; |
2916 | 0 | m_address_book[dest].receive_requests.erase(id); |
2917 | 0 | return true; |
2918 | 0 | } |
2919 | | |
2920 | | static util::Result<fs::path> GetWalletPath(const std::string& name) |
2921 | 0 | { |
2922 | | // Do some checking on wallet path. It should be either a: |
2923 | | // |
2924 | | // 1. Path where a directory can be created. |
2925 | | // 2. Path to an existing directory. |
2926 | | // 3. Path to a symlink to a directory. |
2927 | | // 4. For backwards compatibility, the name of a data file in -walletdir. |
2928 | 0 | const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(name)); |
2929 | 0 | fs::file_type path_type = fs::symlink_status(wallet_path).type(); |
2930 | 0 | if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory || |
2931 | 0 | (path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) || |
2932 | 0 | (path_type == fs::file_type::regular && fs::PathFromString(name).filename() == fs::PathFromString(name)))) { |
2933 | 0 | return util::Error{Untranslated(strprintf(Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2934 | 0 | "Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and " |
2935 | 0 | "database/log.?????????? files can be stored, a location where such a directory could be created, " |
2936 | 0 | "or (for backwards compatibility) the name of an existing data file in -walletdir (%s)", |
2937 | 0 | name, fs::quoted(fs::PathToString(GetWalletDir()))))}; |
2938 | 0 | } |
2939 | 0 | return wallet_path; |
2940 | 0 | } |
2941 | | |
2942 | | std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string) |
2943 | 0 | { |
2944 | 0 | const auto& wallet_path = GetWalletPath(name); |
2945 | 0 | if (!wallet_path) { |
2946 | 0 | error_string = util::ErrorString(wallet_path); |
2947 | 0 | status = DatabaseStatus::FAILED_BAD_PATH; |
2948 | 0 | return nullptr; |
2949 | 0 | } |
2950 | 0 | return MakeDatabase(*wallet_path, options, status, error_string); |
2951 | 0 | } |
2952 | | |
2953 | | bool CWallet::LoadWalletArgs(std::shared_ptr<CWallet> wallet, const WalletContext& context, bilingual_str& error, std::vector<bilingual_str>& warnings) |
2954 | 0 | { |
2955 | 0 | interfaces::Chain* chain = context.chain; |
2956 | 0 | const ArgsManager& args = *Assert(context.args); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
2957 | |
|
2958 | 0 | if (!args.GetArg("-addresstype", "").empty()) { |
2959 | 0 | std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-addresstype", "")); |
2960 | 0 | if (!parsed) { |
2961 | 0 | error = strprintf(_("Unknown address type '%s'"), args.GetArg("-addresstype", ""));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2962 | 0 | return false; |
2963 | 0 | } |
2964 | 0 | wallet->m_default_address_type = parsed.value(); |
2965 | 0 | } |
2966 | | |
2967 | 0 | if (!args.GetArg("-changetype", "").empty()) { |
2968 | 0 | std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-changetype", "")); |
2969 | 0 | if (!parsed) { |
2970 | 0 | error = strprintf(_("Unknown change type '%s'"), args.GetArg("-changetype", ""));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
2971 | 0 | return false; |
2972 | 0 | } |
2973 | 0 | wallet->m_default_change_type = parsed.value(); |
2974 | 0 | } |
2975 | | |
2976 | 0 | if (const auto arg{args.GetArg("-mintxfee")}) { |
2977 | 0 | std::optional<CAmount> min_tx_fee = ParseMoney(*arg); |
2978 | 0 | if (!min_tx_fee) { |
2979 | 0 | error = AmountErrMsg("mintxfee", *arg); |
2980 | 0 | return false; |
2981 | 0 | } else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) { |
2982 | 0 | warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") + |
2983 | 0 | _("This is the minimum transaction fee you pay on every transaction.")); |
2984 | 0 | } |
2985 | | |
2986 | 0 | wallet->m_min_fee = CFeeRate{min_tx_fee.value()}; |
2987 | 0 | } |
2988 | | |
2989 | 0 | if (const auto arg{args.GetArg("-maxapsfee")}) { |
2990 | 0 | const std::string& max_aps_fee{*arg}; |
2991 | 0 | if (max_aps_fee == "-1") { |
2992 | 0 | wallet->m_max_aps_fee = -1; |
2993 | 0 | } else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) { |
2994 | 0 | if (max_fee.value() > HIGH_APS_FEE) { |
2995 | 0 | warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") + |
2996 | 0 | _("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection.")); |
2997 | 0 | } |
2998 | 0 | wallet->m_max_aps_fee = max_fee.value(); |
2999 | 0 | } else { |
3000 | 0 | error = AmountErrMsg("maxapsfee", max_aps_fee); |
3001 | 0 | return false; |
3002 | 0 | } |
3003 | 0 | } |
3004 | | |
3005 | 0 | if (const auto arg{args.GetArg("-fallbackfee")}) { |
3006 | 0 | std::optional<CAmount> fallback_fee = ParseMoney(*arg); |
3007 | 0 | if (!fallback_fee) { |
3008 | 0 | error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-fallbackfee", *arg);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3009 | 0 | return false; |
3010 | 0 | } else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) { |
3011 | 0 | warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") + |
3012 | 0 | _("This is the transaction fee you may pay when fee estimates are not available.")); |
3013 | 0 | } |
3014 | 0 | wallet->m_fallback_fee = CFeeRate{fallback_fee.value()}; |
3015 | 0 | } |
3016 | | |
3017 | | // Disable fallback fee in case value was set to 0, enable if non-null value |
3018 | 0 | wallet->m_allow_fallback_fee = wallet->m_fallback_fee.GetFeePerK() != 0; |
3019 | |
|
3020 | 0 | if (const auto arg{args.GetArg("-discardfee")}) { |
3021 | 0 | std::optional<CAmount> discard_fee = ParseMoney(*arg); |
3022 | 0 | if (!discard_fee) { |
3023 | 0 | error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-discardfee", *arg);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3024 | 0 | return false; |
3025 | 0 | } else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) { |
3026 | 0 | warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") + |
3027 | 0 | _("This is the transaction fee you may discard if change is smaller than dust at this level")); |
3028 | 0 | } |
3029 | 0 | wallet->m_discard_rate = CFeeRate{discard_fee.value()}; |
3030 | 0 | } |
3031 | | |
3032 | 0 | if (const auto arg{args.GetArg("-maxtxfee")}) { |
3033 | 0 | std::optional<CAmount> max_fee = ParseMoney(*arg); |
3034 | 0 | if (!max_fee) { |
3035 | 0 | error = AmountErrMsg("maxtxfee", *arg); |
3036 | 0 | return false; |
3037 | 0 | } else if (max_fee.value() > HIGH_MAX_TX_FEE) { |
3038 | 0 | warnings.push_back(strprintf(_("%s is set very high! Fees this large could be paid on a single transaction."), "-maxtxfee"));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3039 | 0 | } |
3040 | | |
3041 | 0 | if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) { |
3042 | 0 | error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3043 | 0 | "-maxtxfee", *arg, chain->relayMinFee().ToString()); |
3044 | 0 | return false; |
3045 | 0 | } |
3046 | | |
3047 | 0 | wallet->m_default_max_tx_fee = max_fee.value(); |
3048 | 0 | } |
3049 | | |
3050 | 0 | if (const auto arg{args.GetArg("-consolidatefeerate")}) { |
3051 | 0 | if (std::optional<CAmount> consolidate_feerate = ParseMoney(*arg)) { |
3052 | 0 | wallet->m_consolidate_feerate = CFeeRate(*consolidate_feerate); |
3053 | 0 | } else { |
3054 | 0 | error = AmountErrMsg("consolidatefeerate", *arg); |
3055 | 0 | return false; |
3056 | 0 | } |
3057 | 0 | } |
3058 | | |
3059 | 0 | if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB) { |
3060 | 0 | warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") + |
3061 | 0 | _("The wallet will avoid paying less than the minimum relay fee.")); |
3062 | 0 | } |
3063 | |
|
3064 | 0 | wallet->m_confirm_target = args.GetIntArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET); |
3065 | 0 | wallet->m_spend_zero_conf_change = args.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE); |
3066 | 0 | wallet->m_signal_rbf = args.GetBoolArg("-walletrbf", DEFAULT_WALLET_RBF); |
3067 | |
|
3068 | 0 | wallet->m_keypool_size = std::max(args.GetIntArg("-keypool", DEFAULT_KEYPOOL_SIZE), int64_t{1}); |
3069 | 0 | wallet->m_notify_tx_changed_script = args.GetArg("-walletnotify", ""); |
3070 | 0 | wallet->SetBroadcastTransactions(args.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST)); |
3071 | |
|
3072 | 0 | return true; |
3073 | 0 | } |
3074 | | |
3075 | | std::shared_ptr<CWallet> CWallet::CreateNew(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings) |
3076 | 0 | { |
3077 | 0 | interfaces::Chain* chain = context.chain; |
3078 | 0 | const std::string& walletFile = database->Filename(); |
3079 | |
|
3080 | 0 | const auto start{SteadyClock::now()}; |
3081 | | // TODO: Can't use std::make_shared because we need a custom deleter but |
3082 | | // should be possible to use std::allocate_shared. |
3083 | 0 | std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet); |
3084 | |
|
3085 | 0 | if (!LoadWalletArgs(walletInstance, context, error, warnings)) { |
3086 | 0 | return nullptr; |
3087 | 0 | } |
3088 | | |
3089 | | // Initialize version key. |
3090 | 0 | if(!WalletBatch(walletInstance->GetDatabase()).WriteVersion(CLIENT_VERSION)) { |
3091 | 0 | error = strprintf(_("Error creating %s: Could not write version metadata."), walletFile);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3092 | 0 | return nullptr; |
3093 | 0 | } |
3094 | 0 | { |
3095 | 0 | LOCK(walletInstance->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3096 | | |
3097 | | // Init with passed flags. |
3098 | | // Always set the cache upgrade flag as this feature is supported from the beginning. |
3099 | 0 | walletInstance->InitWalletFlags(wallet_creation_flags | WALLET_FLAG_LAST_HARDENED_XPUB_CACHED); |
3100 | | |
3101 | | // Only descriptor wallets can be created |
3102 | 0 | assert(walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)); |
3103 | | |
3104 | 0 | if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) || !(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) { |
3105 | 0 | walletInstance->SetupDescriptorScriptPubKeyMans(); |
3106 | 0 | } |
3107 | |
|
3108 | 0 | if (chain) { |
3109 | 0 | std::optional<int> tip_height = chain->getHeight(); |
3110 | 0 | if (tip_height) { |
3111 | 0 | walletInstance->SetLastBlockProcessed(*tip_height, chain->getBlockHash(*tip_height)); |
3112 | 0 | } |
3113 | 0 | } |
3114 | 0 | } |
3115 | | |
3116 | 0 | walletInstance->WalletLogPrintf("Wallet completed creation in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start)); |
3117 | | |
3118 | | // Try to top up keypool. No-op if the wallet is locked. |
3119 | 0 | walletInstance->TopUpKeyPool(); |
3120 | |
|
3121 | 0 | if (chain && !AttachChain(walletInstance, *chain, /*rescan_required=*/false, error, warnings)) { |
3122 | 0 | walletInstance->DisconnectChainNotifications(); |
3123 | 0 | return nullptr; |
3124 | 0 | } |
3125 | | |
3126 | 0 | return walletInstance; |
3127 | 0 | } |
3128 | | |
3129 | | std::shared_ptr<CWallet> CWallet::LoadExisting(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, bilingual_str& error, std::vector<bilingual_str>& warnings) |
3130 | 0 | { |
3131 | 0 | interfaces::Chain* chain = context.chain; |
3132 | 0 | const std::string& walletFile = database->Filename(); |
3133 | |
|
3134 | 0 | const auto start{SteadyClock::now()}; |
3135 | 0 | std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet); |
3136 | |
|
3137 | 0 | if (!LoadWalletArgs(walletInstance, context, error, warnings)) { |
3138 | 0 | return nullptr; |
3139 | 0 | } |
3140 | | |
3141 | | // Load wallet |
3142 | 0 | auto nLoadWalletRet = walletInstance->PopulateWalletFromDB(error, warnings); |
3143 | 0 | bool rescan_required = nLoadWalletRet == DBErrors::NEED_RESCAN; |
3144 | 0 | if (nLoadWalletRet != DBErrors::LOAD_OK && nLoadWalletRet != DBErrors::NONCRITICAL_ERROR && !rescan_required) { |
3145 | 0 | return nullptr; |
3146 | 0 | } |
3147 | | |
3148 | 0 | if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) { |
3149 | 0 | for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) { |
3150 | 0 | if (spk_man->HavePrivateKeys()) { |
3151 | 0 | warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3152 | 0 | break; |
3153 | 0 | } |
3154 | 0 | } |
3155 | 0 | } |
3156 | |
|
3157 | 0 | walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start)); |
3158 | | |
3159 | | // Try to top up keypool. No-op if the wallet is locked. |
3160 | 0 | walletInstance->TopUpKeyPool(); |
3161 | |
|
3162 | 0 | if (chain && !AttachChain(walletInstance, *chain, rescan_required, error, warnings)) { |
3163 | 0 | walletInstance->DisconnectChainNotifications(); |
3164 | 0 | return nullptr; |
3165 | 0 | } |
3166 | | |
3167 | 0 | WITH_LOCK(walletInstance->cs_wallet, walletInstance->LogStats()); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
3168 | |
|
3169 | 0 | return walletInstance; |
3170 | 0 | } |
3171 | | |
3172 | | |
3173 | | bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, const bool rescan_required, bilingual_str& error, std::vector<bilingual_str>& warnings) |
3174 | 0 | { |
3175 | 0 | LOCK(walletInstance->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3176 | | // allow setting the chain if it hasn't been set already but prevent changing it |
3177 | 0 | assert(!walletInstance->m_chain || walletInstance->m_chain == &chain); |
3178 | 0 | walletInstance->m_chain = &chain; |
3179 | | |
3180 | | // Unless allowed, ensure wallet files are not reused across chains: |
3181 | 0 | if (!gArgs.GetBoolArg("-walletcrosschain", DEFAULT_WALLETCROSSCHAIN)) { |
3182 | 0 | WalletBatch batch(walletInstance->GetDatabase()); |
3183 | 0 | CBlockLocator locator; |
3184 | 0 | if (batch.ReadBestBlock(locator) && locator.vHave.size() > 0 && chain.getHeight()) { |
3185 | | // Wallet is assumed to be from another chain, if genesis block in the active |
3186 | | // chain differs from the genesis block known to the wallet. |
3187 | 0 | if (chain.getBlockHash(0) != locator.vHave.back()) { |
3188 | 0 | error = Untranslated("Wallet files should not be reused across chains. Restart bitcoind with -walletcrosschain to override."); |
3189 | 0 | return false; |
3190 | 0 | } |
3191 | 0 | } |
3192 | 0 | } |
3193 | | |
3194 | | // Register wallet with validationinterface. It's done before rescan to avoid |
3195 | | // missing block connections during the rescan. |
3196 | | // Because of the wallet lock being held, block connection notifications are going to |
3197 | | // be pending on the validation-side until lock release. Blocks that are connected while the |
3198 | | // rescan is ongoing will not be processed in the rescan but with the block connected notifications, |
3199 | | // so the wallet will only be completeley synced after the notifications delivery. |
3200 | 0 | walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance); |
3201 | | |
3202 | | // If rescan_required = true, rescan_height remains equal to 0 |
3203 | 0 | int rescan_height = 0; |
3204 | 0 | if (!rescan_required) |
3205 | 0 | { |
3206 | 0 | WalletBatch batch(walletInstance->GetDatabase()); |
3207 | 0 | CBlockLocator locator; |
3208 | 0 | if (batch.ReadBestBlock(locator)) { |
3209 | 0 | if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) { |
3210 | 0 | rescan_height = *fork_height; |
3211 | 0 | } |
3212 | 0 | } |
3213 | 0 | } |
3214 | |
|
3215 | 0 | const std::optional<int> tip_height = chain.getHeight(); |
3216 | 0 | if (tip_height) { |
3217 | 0 | walletInstance->SetLastBlockProcessedInMem(*tip_height, chain.getBlockHash(*tip_height)); |
3218 | 0 | } else { |
3219 | 0 | walletInstance->SetLastBlockProcessedInMem(-1, uint256()); |
3220 | 0 | } |
3221 | |
|
3222 | 0 | if (tip_height && *tip_height != rescan_height) |
3223 | 0 | { |
3224 | | // No need to read and scan block if block was created before |
3225 | | // our wallet birthday (as adjusted for block time variability) |
3226 | 0 | std::optional<int64_t> time_first_key = walletInstance->m_birth_time.load(); |
3227 | 0 | if (time_first_key) { |
3228 | 0 | FoundBlock found = FoundBlock().height(rescan_height); |
3229 | 0 | chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, found); |
3230 | 0 | if (!found.found) { |
3231 | | // We were unable to find a block that had a time more recent than our earliest timestamp |
3232 | | // or a height higher than the wallet was synced to, indicating that the wallet is newer than the |
3233 | | // current chain tip. Skip rescanning in this case. |
3234 | 0 | rescan_height = *tip_height; |
3235 | 0 | } |
3236 | 0 | } |
3237 | | |
3238 | | // Technically we could execute the code below in any case, but performing the |
3239 | | // `while` loop below can make startup very slow, so only check blocks on disk |
3240 | | // if necessary. |
3241 | 0 | if (chain.havePruned() || chain.hasAssumedValidChain()) { |
3242 | 0 | int block_height = *tip_height; |
3243 | 0 | while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) { |
3244 | 0 | --block_height; |
3245 | 0 | } |
3246 | |
|
3247 | 0 | if (rescan_height != block_height) { |
3248 | | // We can't rescan beyond blocks we don't have data for, stop and throw an error. |
3249 | | // This might happen if a user uses an old wallet within a pruned node |
3250 | | // or if they ran -disablewallet for a longer time, then decided to re-enable |
3251 | | // Exit early and print an error. |
3252 | | // It also may happen if an assumed-valid chain is in use and therefore not |
3253 | | // all block data is available. |
3254 | | // If a block is pruned after this check, we will load the wallet, |
3255 | | // but fail the rescan with a generic error. |
3256 | |
|
3257 | 0 | error = chain.havePruned() ? |
3258 | 0 | _("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of a pruned node)") : |
3259 | 0 | strprintf(_( Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3260 | 0 | "Error loading wallet. Wallet requires blocks to be downloaded, " |
3261 | 0 | "and software does not currently support loading wallets while " |
3262 | 0 | "blocks are being downloaded out of order when using assumeutxo " |
3263 | 0 | "snapshots. Wallet should be able to load successfully after " |
3264 | 0 | "node sync reaches height %s"), block_height); |
3265 | 0 | return false; |
3266 | 0 | } |
3267 | 0 | } |
3268 | | |
3269 | 0 | chain.initMessage(_("Rescanning…")); |
3270 | 0 | walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height); |
3271 | |
|
3272 | 0 | { |
3273 | 0 | WalletRescanReserver reserver(*walletInstance); |
3274 | 0 | if (!reserver.reserve()) { |
3275 | 0 | error = _("Failed to acquire rescan reserver during wallet initialization"); |
3276 | 0 | return false; |
3277 | 0 | } |
3278 | 0 | ScanResult scan_res = walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, /*max_height=*/{}, reserver, /*fUpdate=*/true, /*save_progress=*/true); |
3279 | 0 | if (ScanResult::SUCCESS != scan_res.status) { |
3280 | 0 | error = _("Failed to rescan the wallet during initialization"); |
3281 | 0 | return false; |
3282 | 0 | } |
3283 | | // Set and update the best block record |
3284 | | // Set last block scanned as the last block processed as it may be different in case of a reorg. |
3285 | | // Also save the best block locator because rescanning only updates it intermittently. |
3286 | 0 | walletInstance->SetLastBlockProcessed(*scan_res.last_scanned_height, scan_res.last_scanned_block); |
3287 | 0 | } |
3288 | 0 | } |
3289 | | |
3290 | 0 | return true; |
3291 | 0 | } |
3292 | | |
3293 | | const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const |
3294 | 0 | { |
3295 | 0 | const auto& address_book_it = m_address_book.find(dest); |
3296 | 0 | if (address_book_it == m_address_book.end()) return nullptr; |
3297 | 0 | if ((!allow_change) && address_book_it->second.IsChange()) { |
3298 | 0 | return nullptr; |
3299 | 0 | } |
3300 | 0 | return &address_book_it->second; |
3301 | 0 | } |
3302 | | |
3303 | | void CWallet::postInitProcess() |
3304 | 0 | { |
3305 | | // Add wallet transactions that aren't already in a block to mempool |
3306 | | // Do this here as mempool requires genesis block to be loaded |
3307 | 0 | ResubmitWalletTransactions(node::TxBroadcast::MEMPOOL_NO_BROADCAST, /*force=*/true); |
3308 | | |
3309 | | // Update wallet transactions with current mempool transactions. |
3310 | 0 | WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this)); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
3311 | 0 | } |
3312 | | |
3313 | | bool CWallet::BackupWallet(const std::string& strDest) const |
3314 | 0 | { |
3315 | 0 | WITH_LOCK(cs_wallet, WriteBestBlock()); Line | Count | Source | 297 | 0 | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
3316 | 0 | return GetDatabase().Backup(strDest); |
3317 | 0 | } |
3318 | | |
3319 | | int CWallet::GetTxDepthInMainChain(const CWalletTx& wtx) const |
3320 | 0 | { |
3321 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3322 | 0 | if (auto* conf = wtx.state<TxStateConfirmed>()) { |
3323 | 0 | assert(conf->confirmed_block_height >= 0); |
3324 | 0 | return GetLastBlockHeight() - conf->confirmed_block_height + 1; |
3325 | 0 | } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) { |
3326 | 0 | assert(conf->conflicting_block_height >= 0); |
3327 | 0 | return -1 * (GetLastBlockHeight() - conf->conflicting_block_height + 1); |
3328 | 0 | } else { |
3329 | 0 | return 0; |
3330 | 0 | } |
3331 | 0 | } |
3332 | | |
3333 | | int CWallet::GetTxBlocksToMaturity(const CWalletTx& wtx) const |
3334 | 0 | { |
3335 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3336 | |
|
3337 | 0 | if (!wtx.IsCoinBase()) { |
3338 | 0 | return 0; |
3339 | 0 | } |
3340 | 0 | int chain_depth = GetTxDepthInMainChain(wtx); |
3341 | 0 | assert(chain_depth >= 0); // coinbase tx should not be conflicted |
3342 | 0 | return std::max(0, (COINBASE_MATURITY+1) - chain_depth); |
3343 | 0 | } |
3344 | | |
3345 | | bool CWallet::IsTxImmatureCoinBase(const CWalletTx& wtx) const |
3346 | 0 | { |
3347 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3348 | | |
3349 | | // note GetBlocksToMaturity is 0 for non-coinbase tx |
3350 | 0 | return GetTxBlocksToMaturity(wtx) > 0; |
3351 | 0 | } |
3352 | | |
3353 | | bool CWallet::IsLocked() const |
3354 | 0 | { |
3355 | 0 | if (!HasEncryptionKeys()) { |
3356 | 0 | return false; |
3357 | 0 | } |
3358 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3359 | 0 | return vMasterKey.empty(); |
3360 | 0 | } |
3361 | | |
3362 | | bool CWallet::Lock() |
3363 | 0 | { |
3364 | 0 | if (!HasEncryptionKeys()) |
3365 | 0 | return false; |
3366 | | |
3367 | 0 | { |
3368 | 0 | LOCK2(m_relock_mutex, cs_wallet); Line | Count | Source | 268 | 0 | UniqueLock criticalblock1(MaybeCheckNotHeld(cs1), #cs1, __FILE__, __LINE__); \ | 269 | 0 | UniqueLock criticalblock2(MaybeCheckNotHeld(cs2), #cs2, __FILE__, __LINE__) |
|
3369 | 0 | if (!vMasterKey.empty()) { |
3370 | 0 | memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type)); |
3371 | 0 | vMasterKey.clear(); |
3372 | 0 | } |
3373 | 0 | } |
3374 | |
|
3375 | 0 | NotifyStatusChanged(this); |
3376 | 0 | return true; |
3377 | 0 | } |
3378 | | |
3379 | | bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn) |
3380 | 0 | { |
3381 | 0 | { |
3382 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3383 | 0 | for (const auto& spk_man_pair : m_spk_managers) { |
3384 | 0 | if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn)) { |
3385 | 0 | return false; |
3386 | 0 | } |
3387 | 0 | } |
3388 | 0 | vMasterKey = vMasterKeyIn; |
3389 | 0 | } |
3390 | 0 | NotifyStatusChanged(this); |
3391 | 0 | return true; |
3392 | 0 | } |
3393 | | |
3394 | | std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const |
3395 | 0 | { |
3396 | 0 | std::set<ScriptPubKeyMan*> spk_mans; |
3397 | 0 | for (bool internal : {false, true}) { |
3398 | 0 | for (OutputType t : OUTPUT_TYPES) { |
3399 | 0 | auto spk_man = GetScriptPubKeyMan(t, internal); |
3400 | 0 | if (spk_man) { |
3401 | 0 | spk_mans.insert(spk_man); |
3402 | 0 | } |
3403 | 0 | } |
3404 | 0 | } |
3405 | 0 | return spk_mans; |
3406 | 0 | } |
3407 | | |
3408 | | bool CWallet::IsActiveScriptPubKeyMan(const ScriptPubKeyMan& spkm) const |
3409 | 0 | { |
3410 | 0 | for (const auto& [_, ext_spkm] : m_external_spk_managers) { |
3411 | 0 | if (ext_spkm == &spkm) return true; |
3412 | 0 | } |
3413 | 0 | for (const auto& [_, int_spkm] : m_internal_spk_managers) { |
3414 | 0 | if (int_spkm == &spkm) return true; |
3415 | 0 | } |
3416 | 0 | return false; |
3417 | 0 | } |
3418 | | |
3419 | | std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const |
3420 | 0 | { |
3421 | 0 | std::set<ScriptPubKeyMan*> spk_mans; |
3422 | 0 | for (const auto& spk_man_pair : m_spk_managers) { |
3423 | 0 | spk_mans.insert(spk_man_pair.second.get()); |
3424 | 0 | } |
3425 | 0 | return spk_mans; |
3426 | 0 | } |
3427 | | |
3428 | | ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const OutputType& type, bool internal) const |
3429 | 0 | { |
3430 | 0 | const std::map<OutputType, ScriptPubKeyMan*>& spk_managers = internal ? m_internal_spk_managers : m_external_spk_managers; |
3431 | 0 | std::map<OutputType, ScriptPubKeyMan*>::const_iterator it = spk_managers.find(type); |
3432 | 0 | if (it == spk_managers.end()) { |
3433 | 0 | return nullptr; |
3434 | 0 | } |
3435 | 0 | return it->second; |
3436 | 0 | } |
3437 | | |
3438 | | std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script) const |
3439 | 0 | { |
3440 | 0 | std::set<ScriptPubKeyMan*> spk_mans; |
3441 | | |
3442 | | // Search the cache for relevant SPKMs instead of iterating m_spk_managers |
3443 | 0 | const auto& it = m_cached_spks.find(script); |
3444 | 0 | if (it != m_cached_spks.end()) { |
3445 | 0 | spk_mans.insert(it->second.begin(), it->second.end()); |
3446 | 0 | } |
3447 | 0 | SignatureData sigdata; |
3448 | 0 | Assume(std::all_of(spk_mans.begin(), spk_mans.end(), [&script, &sigdata](ScriptPubKeyMan* spkm) { return spkm->CanProvide(script, sigdata); }));Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
3449 | |
|
3450 | 0 | return spk_mans; |
3451 | 0 | } |
3452 | | |
3453 | | ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const |
3454 | 0 | { |
3455 | 0 | if (m_spk_managers.contains(id)) { |
3456 | 0 | return m_spk_managers.at(id).get(); |
3457 | 0 | } |
3458 | 0 | return nullptr; |
3459 | 0 | } |
3460 | | |
3461 | | std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const |
3462 | 0 | { |
3463 | 0 | SignatureData sigdata; |
3464 | 0 | return GetSolvingProvider(script, sigdata); |
3465 | 0 | } |
3466 | | |
3467 | | std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const |
3468 | 0 | { |
3469 | | // Search the cache for relevant SPKMs instead of iterating m_spk_managers |
3470 | 0 | const auto& it = m_cached_spks.find(script); |
3471 | 0 | if (it != m_cached_spks.end()) { |
3472 | | // All spkms for a given script must already be able to make a SigningProvider for the script, so just return the first one. |
3473 | 0 | Assume(it->second.at(0)->CanProvide(script, sigdata)); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
3474 | 0 | return it->second.at(0)->GetSolvingProvider(script); |
3475 | 0 | } |
3476 | | |
3477 | 0 | return nullptr; |
3478 | 0 | } |
3479 | | |
3480 | | std::vector<WalletDescriptor> CWallet::GetWalletDescriptors(const CScript& script) const |
3481 | 0 | { |
3482 | 0 | std::vector<WalletDescriptor> descs; |
3483 | 0 | for (const auto spk_man: GetScriptPubKeyMans(script)) { |
3484 | 0 | if (const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man)) { |
3485 | 0 | LOCK(desc_spk_man->cs_desc_man); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3486 | 0 | descs.push_back(desc_spk_man->GetWalletDescriptor()); |
3487 | 0 | } |
3488 | 0 | } |
3489 | 0 | return descs; |
3490 | 0 | } |
3491 | | |
3492 | | LegacyDataSPKM* CWallet::GetLegacyDataSPKM() const |
3493 | 0 | { |
3494 | 0 | if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) { |
3495 | 0 | return nullptr; |
3496 | 0 | } |
3497 | 0 | auto it = m_internal_spk_managers.find(OutputType::LEGACY); |
3498 | 0 | if (it == m_internal_spk_managers.end()) return nullptr; |
3499 | 0 | return dynamic_cast<LegacyDataSPKM*>(it->second); |
3500 | 0 | } |
3501 | | |
3502 | | void CWallet::AddScriptPubKeyMan(const uint256& id, std::unique_ptr<ScriptPubKeyMan> spkm_man) |
3503 | 0 | { |
3504 | | // Add spkm_man to m_spk_managers before calling any method |
3505 | | // that might access it. |
3506 | 0 | const auto& spkm = m_spk_managers[id] = std::move(spkm_man); |
3507 | | |
3508 | | // Update birth time if needed |
3509 | 0 | MaybeUpdateBirthTime(spkm->GetTimeFirstKey()); |
3510 | 0 | } |
3511 | | |
3512 | | LegacyDataSPKM* CWallet::GetOrCreateLegacyDataSPKM() |
3513 | 0 | { |
3514 | 0 | SetupLegacyScriptPubKeyMan(); |
3515 | 0 | return GetLegacyDataSPKM(); |
3516 | 0 | } |
3517 | | |
3518 | | void CWallet::SetupLegacyScriptPubKeyMan() |
3519 | 0 | { |
3520 | 0 | if (!m_internal_spk_managers.empty() || !m_external_spk_managers.empty() || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) { |
3521 | 0 | return; |
3522 | 0 | } |
3523 | | |
3524 | 0 | Assert(m_database->Format() == "bdb_ro" || m_database->Format() == "mock"); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
3525 | 0 | std::unique_ptr<ScriptPubKeyMan> spk_manager = std::make_unique<LegacyDataSPKM>(*this); |
3526 | |
|
3527 | 0 | for (const auto& type : LEGACY_OUTPUT_TYPES) { |
3528 | 0 | m_internal_spk_managers[type] = spk_manager.get(); |
3529 | 0 | m_external_spk_managers[type] = spk_manager.get(); |
3530 | 0 | } |
3531 | 0 | uint256 id = spk_manager->GetID(); |
3532 | 0 | AddScriptPubKeyMan(id, std::move(spk_manager)); |
3533 | 0 | } |
3534 | | |
3535 | | bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const |
3536 | 0 | { |
3537 | 0 | LOCK(cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3538 | 0 | return cb(vMasterKey); |
3539 | 0 | } |
3540 | | |
3541 | | bool CWallet::HasEncryptionKeys() const |
3542 | 0 | { |
3543 | 0 | return !mapMasterKeys.empty(); |
3544 | 0 | } |
3545 | | |
3546 | | bool CWallet::HaveCryptedKeys() const |
3547 | 0 | { |
3548 | 0 | for (const auto& spkm : GetAllScriptPubKeyMans()) { |
3549 | 0 | if (spkm->HaveCryptedKeys()) return true; |
3550 | 0 | } |
3551 | 0 | return false; |
3552 | 0 | } |
3553 | | |
3554 | | void CWallet::ConnectScriptPubKeyManNotifiers() |
3555 | 0 | { |
3556 | 0 | for (const auto& spk_man : GetActiveScriptPubKeyMans()) { |
3557 | 0 | spk_man->NotifyCanGetAddressesChanged.connect(NotifyCanGetAddressesChanged); |
3558 | 0 | spk_man->NotifyFirstKeyTimeChanged.connect([this](const ScriptPubKeyMan*, int64_t time) { |
3559 | 0 | MaybeUpdateBirthTime(time); |
3560 | 0 | }); |
3561 | 0 | } |
3562 | 0 | } |
3563 | | |
3564 | | DescriptorScriptPubKeyMan& CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc) |
3565 | 0 | { |
3566 | 0 | DescriptorScriptPubKeyMan* spk_manager; |
3567 | 0 | if (IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) { |
3568 | 0 | spk_manager = new ExternalSignerScriptPubKeyMan(*this, desc, m_keypool_size); |
3569 | 0 | } else { |
3570 | 0 | spk_manager = new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size); |
3571 | 0 | } |
3572 | 0 | AddScriptPubKeyMan(id, std::unique_ptr<ScriptPubKeyMan>(spk_manager)); |
3573 | 0 | return *spk_manager; |
3574 | 0 | } |
3575 | | |
3576 | | DescriptorScriptPubKeyMan& CWallet::SetupDescriptorScriptPubKeyMan(WalletBatch& batch, const CExtKey& master_key, const OutputType& output_type, bool internal) |
3577 | 0 | { |
3578 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3579 | 0 | auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, m_keypool_size)); |
3580 | 0 | if (HasEncryptionKeys()) { |
3581 | 0 | if (IsLocked()) { |
3582 | 0 | throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors"); |
3583 | 0 | } |
3584 | 0 | if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, &batch)) { |
3585 | 0 | throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors"); |
3586 | 0 | } |
3587 | 0 | } |
3588 | 0 | spk_manager->SetupDescriptorGeneration(batch, master_key, output_type, internal); |
3589 | 0 | DescriptorScriptPubKeyMan* out = spk_manager.get(); |
3590 | 0 | uint256 id = spk_manager->GetID(); |
3591 | 0 | AddScriptPubKeyMan(id, std::move(spk_manager)); |
3592 | 0 | AddActiveScriptPubKeyManWithDb(batch, id, output_type, internal); |
3593 | 0 | return *out; |
3594 | 0 | } |
3595 | | |
3596 | | void CWallet::SetupDescriptorScriptPubKeyMans(WalletBatch& batch, const CExtKey& master_key) |
3597 | 0 | { |
3598 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3599 | 0 | for (bool internal : {false, true}) { |
3600 | 0 | for (OutputType t : OUTPUT_TYPES) { |
3601 | 0 | SetupDescriptorScriptPubKeyMan(batch, master_key, t, internal); |
3602 | 0 | } |
3603 | 0 | } |
3604 | 0 | } |
3605 | | |
3606 | | void CWallet::SetupOwnDescriptorScriptPubKeyMans(WalletBatch& batch) |
3607 | 0 | { |
3608 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3609 | 0 | assert(!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)); |
3610 | | // Make a seed |
3611 | 0 | CKey seed_key = GenerateRandomKey(); |
3612 | 0 | CPubKey seed = seed_key.GetPubKey(); |
3613 | 0 | assert(seed_key.VerifyPubKey(seed)); |
3614 | | |
3615 | | // Get the extended key |
3616 | 0 | CExtKey master_key; |
3617 | 0 | master_key.SetSeed(seed_key); |
3618 | |
|
3619 | 0 | SetupDescriptorScriptPubKeyMans(batch, master_key); |
3620 | 0 | } |
3621 | | |
3622 | | void CWallet::SetupDescriptorScriptPubKeyMans() |
3623 | 0 | { |
3624 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3625 | |
|
3626 | 0 | if (!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) { |
3627 | 0 | if (!RunWithinTxn(GetDatabase(), /*process_desc=*/"setup descriptors", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet){ |
3628 | 0 | SetupOwnDescriptorScriptPubKeyMans(batch); |
3629 | 0 | return true; |
3630 | 0 | })) throw std::runtime_error("Error: cannot process db transaction for descriptors setup"); |
3631 | 0 | } else { |
3632 | 0 | auto signer = ExternalSignerScriptPubKeyMan::GetExternalSigner(); |
3633 | 0 | if (!signer) throw std::runtime_error(util::ErrorString(signer).original); |
3634 | | |
3635 | | // TODO: add account parameter |
3636 | 0 | int account = 0; |
3637 | 0 | UniValue signer_res = signer->GetDescriptors(account); |
3638 | |
|
3639 | 0 | if (!signer_res.isObject()) throw std::runtime_error(std::string(__func__) + ": Unexpected result"); |
3640 | | |
3641 | 0 | WalletBatch batch(GetDatabase()); |
3642 | 0 | if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors import"); |
3643 | | |
3644 | 0 | for (bool internal : {false, true}) { |
3645 | 0 | const UniValue& descriptor_vals = signer_res.find_value(internal ? "internal" : "receive"); |
3646 | 0 | if (!descriptor_vals.isArray()) throw std::runtime_error(std::string(__func__) + ": Unexpected result"); |
3647 | 0 | for (const UniValue& desc_val : descriptor_vals.get_array().getValues()) { |
3648 | 0 | const std::string& desc_str = desc_val.getValStr(); |
3649 | 0 | FlatSigningProvider keys; |
3650 | 0 | std::string desc_error; |
3651 | 0 | auto descs = Parse(desc_str, keys, desc_error, false); |
3652 | 0 | if (descs.empty()) { |
3653 | 0 | throw std::runtime_error(std::string(__func__) + ": Invalid descriptor \"" + desc_str + "\" (" + desc_error + ")"); |
3654 | 0 | } |
3655 | 0 | auto& desc = descs.at(0); |
3656 | 0 | if (!desc->GetOutputType()) { |
3657 | 0 | continue; |
3658 | 0 | } |
3659 | 0 | OutputType t = *desc->GetOutputType(); |
3660 | 0 | auto spk_manager = std::unique_ptr<ExternalSignerScriptPubKeyMan>(new ExternalSignerScriptPubKeyMan(*this, m_keypool_size)); |
3661 | 0 | spk_manager->SetupDescriptor(batch, std::move(desc)); |
3662 | 0 | uint256 id = spk_manager->GetID(); |
3663 | 0 | AddScriptPubKeyMan(id, std::move(spk_manager)); |
3664 | 0 | AddActiveScriptPubKeyManWithDb(batch, id, t, internal); |
3665 | 0 | } |
3666 | 0 | } |
3667 | | |
3668 | | // Ensure imported descriptors are committed to disk |
3669 | 0 | if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors import"); |
3670 | 0 | } |
3671 | 0 | } |
3672 | | |
3673 | | void CWallet::AddActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal) |
3674 | 0 | { |
3675 | 0 | WalletBatch batch(GetDatabase()); |
3676 | 0 | return AddActiveScriptPubKeyManWithDb(batch, id, type, internal); |
3677 | 0 | } |
3678 | | |
3679 | | void CWallet::AddActiveScriptPubKeyManWithDb(WalletBatch& batch, uint256 id, OutputType type, bool internal) |
3680 | 0 | { |
3681 | 0 | if (!batch.WriteActiveScriptPubKeyMan(static_cast<uint8_t>(type), id, internal)) { |
3682 | 0 | throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed"); |
3683 | 0 | } |
3684 | 0 | LoadActiveScriptPubKeyMan(id, type, internal); |
3685 | 0 | } |
3686 | | |
3687 | | void CWallet::LoadActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal) |
3688 | 0 | { |
3689 | | // Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets. |
3690 | | // Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types. |
3691 | 0 | Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
3692 | |
|
3693 | 0 | WalletLogPrintf("Setting spkMan to active: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false"); |
3694 | 0 | auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers; |
3695 | 0 | auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers; |
3696 | 0 | auto spk_man = m_spk_managers.at(id).get(); |
3697 | 0 | spk_mans[type] = spk_man; |
3698 | |
|
3699 | 0 | const auto it = spk_mans_other.find(type); |
3700 | 0 | if (it != spk_mans_other.end() && it->second == spk_man) { |
3701 | 0 | spk_mans_other.erase(type); |
3702 | 0 | } |
3703 | |
|
3704 | 0 | NotifyCanGetAddressesChanged(); |
3705 | 0 | } |
3706 | | |
3707 | | void CWallet::DeactivateScriptPubKeyMan(uint256 id, OutputType type, bool internal) |
3708 | 0 | { |
3709 | 0 | auto spk_man = GetScriptPubKeyMan(type, internal); |
3710 | 0 | if (spk_man != nullptr && spk_man->GetID() == id) { |
3711 | 0 | WalletLogPrintf("Deactivate spkMan: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false"); |
3712 | 0 | WalletBatch batch(GetDatabase()); |
3713 | 0 | if (!batch.EraseActiveScriptPubKeyMan(static_cast<uint8_t>(type), internal)) { |
3714 | 0 | throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed"); |
3715 | 0 | } |
3716 | | |
3717 | 0 | auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers; |
3718 | 0 | spk_mans.erase(type); |
3719 | 0 | } |
3720 | | |
3721 | 0 | NotifyCanGetAddressesChanged(); |
3722 | 0 | } |
3723 | | |
3724 | | DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const |
3725 | 0 | { |
3726 | 0 | auto spk_man_pair = m_spk_managers.find(desc.id); |
3727 | |
|
3728 | 0 | if (spk_man_pair != m_spk_managers.end()) { |
3729 | | // Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match |
3730 | 0 | DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair->second.get()); |
3731 | 0 | if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) { |
3732 | 0 | return spk_manager; |
3733 | 0 | } |
3734 | 0 | } |
3735 | | |
3736 | 0 | return nullptr; |
3737 | 0 | } |
3738 | | |
3739 | | std::optional<bool> CWallet::IsInternalScriptPubKeyMan(ScriptPubKeyMan* spk_man) const |
3740 | 0 | { |
3741 | | // only active ScriptPubKeyMan can be internal |
3742 | 0 | if (!GetActiveScriptPubKeyMans().contains(spk_man)) { |
3743 | 0 | return std::nullopt; |
3744 | 0 | } |
3745 | | |
3746 | 0 | const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man); |
3747 | 0 | if (!desc_spk_man) { |
3748 | 0 | throw std::runtime_error(std::string(__func__) + ": unexpected ScriptPubKeyMan type."); |
3749 | 0 | } |
3750 | | |
3751 | 0 | LOCK(desc_spk_man->cs_desc_man); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3752 | 0 | const auto& type = desc_spk_man->GetWalletDescriptor().descriptor->GetOutputType(); |
3753 | 0 | assert(type.has_value()); |
3754 | | |
3755 | 0 | return GetScriptPubKeyMan(*type, /* internal= */ true) == desc_spk_man; |
3756 | 0 | } |
3757 | | |
3758 | | util::Result<std::reference_wrapper<DescriptorScriptPubKeyMan>> CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal) |
3759 | 0 | { |
3760 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3761 | |
|
3762 | 0 | Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
3763 | |
|
3764 | 0 | auto spk_man = GetDescriptorScriptPubKeyMan(desc); |
3765 | 0 | if (spk_man) { |
3766 | 0 | WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString()); |
3767 | 0 | if (auto spkm_res = spk_man->UpdateWalletDescriptor(desc); !spkm_res) { |
3768 | 0 | return util::Error{util::ErrorString(spkm_res)}; |
3769 | 0 | } |
3770 | 0 | } else { |
3771 | 0 | auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size)); |
3772 | 0 | spk_man = new_spk_man.get(); |
3773 | | |
3774 | | // Save the descriptor to memory |
3775 | 0 | uint256 id = new_spk_man->GetID(); |
3776 | 0 | AddScriptPubKeyMan(id, std::move(new_spk_man)); |
3777 | 0 | } |
3778 | | |
3779 | | // Add the private keys to the descriptor |
3780 | 0 | for (const auto& entry : signing_provider.keys) { |
3781 | 0 | const CKey& key = entry.second; |
3782 | 0 | spk_man->AddDescriptorKey(key, key.GetPubKey()); |
3783 | 0 | } |
3784 | | |
3785 | | // Top up key pool, the manager will generate new scriptPubKeys internally |
3786 | 0 | if (!spk_man->TopUp()) { |
3787 | 0 | return util::Error{_("Could not top up scriptPubKeys")}; |
3788 | 0 | } |
3789 | | |
3790 | | // Apply the label if necessary |
3791 | | // Note: we disable labels for ranged descriptors |
3792 | 0 | if (!desc.descriptor->IsRange()) { |
3793 | 0 | auto script_pub_keys = spk_man->GetScriptPubKeys(); |
3794 | 0 | if (script_pub_keys.empty()) { |
3795 | 0 | return util::Error{_("Could not generate scriptPubKeys (cache is empty)")}; |
3796 | 0 | } |
3797 | | |
3798 | 0 | if (!internal) { |
3799 | 0 | for (const auto& script : script_pub_keys) { |
3800 | 0 | CTxDestination dest; |
3801 | 0 | if (ExtractDestination(script, dest)) { |
3802 | 0 | SetAddressBook(dest, label, AddressPurpose::RECEIVE); |
3803 | 0 | } |
3804 | 0 | } |
3805 | 0 | } |
3806 | 0 | } |
3807 | | |
3808 | | // Save the descriptor to DB |
3809 | 0 | spk_man->WriteDescriptor(); |
3810 | | |
3811 | | // Break balance caches so that outputs that are now IsMine in already known txs will be included in the balance |
3812 | 0 | MarkDirty(); |
3813 | |
|
3814 | 0 | return std::reference_wrapper(*spk_man); |
3815 | 0 | } |
3816 | | |
3817 | | bool CWallet::MigrateToSQLite(bilingual_str& error) |
3818 | 0 | { |
3819 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3820 | |
|
3821 | 0 | WalletLogPrintf("Migrating wallet storage database from BerkeleyDB to SQLite.\n"); |
3822 | |
|
3823 | 0 | if (m_database->Format() == "sqlite") { |
3824 | 0 | error = _("Error: This wallet already uses SQLite"); |
3825 | 0 | return false; |
3826 | 0 | } |
3827 | | |
3828 | | // Get all of the records for DB type migration |
3829 | 0 | std::unique_ptr<DatabaseBatch> batch = m_database->MakeBatch(); |
3830 | 0 | std::unique_ptr<DatabaseCursor> cursor = batch->GetNewCursor(); |
3831 | 0 | std::vector<std::pair<SerializeData, SerializeData>> records; |
3832 | 0 | if (!cursor) { |
3833 | 0 | error = _("Error: Unable to begin reading all records in the database"); |
3834 | 0 | return false; |
3835 | 0 | } |
3836 | 0 | DatabaseCursor::Status status = DatabaseCursor::Status::FAIL; |
3837 | 0 | while (true) { |
3838 | 0 | DataStream ss_key{}; |
3839 | 0 | DataStream ss_value{}; |
3840 | 0 | status = cursor->Next(ss_key, ss_value); |
3841 | 0 | if (status != DatabaseCursor::Status::MORE) { |
3842 | 0 | break; |
3843 | 0 | } |
3844 | 0 | SerializeData key(ss_key.begin(), ss_key.end()); |
3845 | 0 | SerializeData value(ss_value.begin(), ss_value.end()); |
3846 | 0 | records.emplace_back(key, value); |
3847 | 0 | } |
3848 | 0 | cursor.reset(); |
3849 | 0 | batch.reset(); |
3850 | 0 | if (status != DatabaseCursor::Status::DONE) { |
3851 | 0 | error = _("Error: Unable to read all records in the database"); |
3852 | 0 | return false; |
3853 | 0 | } |
3854 | | |
3855 | | // Close this database and delete the file |
3856 | 0 | fs::path db_path = fs::PathFromString(m_database->Filename()); |
3857 | 0 | m_database->Close(); |
3858 | 0 | fs::remove(db_path); |
3859 | | |
3860 | | // Generate the path for the location of the migrated wallet |
3861 | | // Wallets that are plain files rather than wallet directories will be migrated to be wallet directories. |
3862 | 0 | const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(m_name)); |
3863 | | |
3864 | | // Make new DB |
3865 | 0 | DatabaseOptions opts; |
3866 | 0 | opts.require_create = true; |
3867 | 0 | opts.require_format = DatabaseFormat::SQLITE; |
3868 | 0 | DatabaseStatus db_status; |
3869 | 0 | std::unique_ptr<WalletDatabase> new_db = MakeDatabase(wallet_path, opts, db_status, error); |
3870 | 0 | assert(new_db); // This is to prevent doing anything further with this wallet. The original file was deleted, but a backup exists. |
3871 | 0 | m_database.reset(); |
3872 | 0 | m_database = std::move(new_db); |
3873 | | |
3874 | | // Write existing records into the new DB |
3875 | 0 | batch = m_database->MakeBatch(); |
3876 | 0 | bool began = batch->TxnBegin(); |
3877 | 0 | assert(began); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution. |
3878 | 0 | for (const auto& [key, value] : records) { |
3879 | 0 | if (!batch->Write(std::span{key}, std::span{value})) { |
3880 | 0 | batch->TxnAbort(); |
3881 | 0 | m_database->Close(); |
3882 | 0 | fs::remove(m_database->Filename()); |
3883 | 0 | assert(false); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution. |
3884 | 0 | } |
3885 | 0 | } |
3886 | 0 | bool committed = batch->TxnCommit(); |
3887 | 0 | assert(committed); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution. |
3888 | 0 | return true; |
3889 | 0 | } |
3890 | | |
3891 | | std::optional<MigrationData> CWallet::GetDescriptorsForLegacy(bilingual_str& error) const |
3892 | 0 | { |
3893 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3894 | |
|
3895 | 0 | LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM(); |
3896 | 0 | if (!Assume(legacy_spkm)) {Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
3897 | | // This shouldn't happen |
3898 | 0 | error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));Line | Count | Source | 96 | 0 | #define STR_INTERNAL_BUG(msg) StrFormatInternalBug((msg), std::source_location::current()) |
|
3899 | 0 | return std::nullopt; |
3900 | 0 | } |
3901 | | |
3902 | 0 | std::optional<MigrationData> res = legacy_spkm->MigrateToDescriptor(); |
3903 | 0 | if (res == std::nullopt) { |
3904 | 0 | error = _("Error: Unable to produce descriptors for this legacy wallet. Make sure to provide the wallet's passphrase if it is encrypted."); |
3905 | 0 | return std::nullopt; |
3906 | 0 | } |
3907 | 0 | return res; |
3908 | 0 | } |
3909 | | |
3910 | | util::Result<void> CWallet::ApplyMigrationData(WalletBatch& local_wallet_batch, MigrationData& data) |
3911 | 0 | { |
3912 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
3913 | |
|
3914 | 0 | LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM(); |
3915 | 0 | if (!Assume(legacy_spkm)) {Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
3916 | | // This shouldn't happen |
3917 | 0 | return util::Error{Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"))};Line | Count | Source | 96 | 0 | #define STR_INTERNAL_BUG(msg) StrFormatInternalBug((msg), std::source_location::current()) |
|
3918 | 0 | } |
3919 | | |
3920 | | // Note: when the legacy wallet has no spendable scripts, it must be empty at the end of the process. |
3921 | 0 | bool has_spendable_material = !data.desc_spkms.empty() || data.master_key.key.IsValid(); |
3922 | | |
3923 | | // Get all invalid or non-watched scripts that will not be migrated |
3924 | 0 | std::set<CTxDestination> not_migrated_dests; |
3925 | 0 | for (const auto& script : legacy_spkm->GetNotMineScriptPubKeys()) { |
3926 | 0 | CTxDestination dest; |
3927 | 0 | if (ExtractDestination(script, dest)) not_migrated_dests.emplace(dest); |
3928 | 0 | } |
3929 | | |
3930 | | // When the legacy wallet has no spendable scripts, the main wallet will be empty, leaving its script cache empty as well. |
3931 | | // The watch-only and/or solvable wallet(s) will contain the scripts in their respective caches. |
3932 | 0 | if (!data.desc_spkms.empty()) Assume(!m_cached_spks.empty()); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
3933 | 0 | if (!data.watch_descs.empty()) Assume(!data.watchonly_wallet->m_cached_spks.empty()); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
3934 | 0 | if (!data.solvable_descs.empty()) Assume(!data.solvable_wallet->m_cached_spks.empty()); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
3935 | |
|
3936 | 0 | for (auto& desc_spkm : data.desc_spkms) { |
3937 | 0 | if (m_spk_managers.contains(desc_spkm->GetID())) { |
3938 | 0 | return util::Error{_("Error: Duplicate descriptors created during migration. Your wallet may be corrupted.")}; |
3939 | 0 | } |
3940 | 0 | uint256 id = desc_spkm->GetID(); |
3941 | 0 | AddScriptPubKeyMan(id, std::move(desc_spkm)); |
3942 | 0 | } |
3943 | | |
3944 | | // Remove the LegacyScriptPubKeyMan from disk |
3945 | 0 | if (!legacy_spkm->DeleteRecordsWithDB(local_wallet_batch)) { |
3946 | 0 | return util::Error{_("Error: cannot remove legacy wallet records")}; |
3947 | 0 | } |
3948 | | |
3949 | | // Remove the LegacyScriptPubKeyMan from memory |
3950 | 0 | m_spk_managers.erase(legacy_spkm->GetID()); |
3951 | 0 | m_external_spk_managers.clear(); |
3952 | 0 | m_internal_spk_managers.clear(); |
3953 | | |
3954 | | // Setup new descriptors (only if we are migrating any key material) |
3955 | 0 | SetWalletFlagWithDB(local_wallet_batch, WALLET_FLAG_DESCRIPTORS | WALLET_FLAG_LAST_HARDENED_XPUB_CACHED); |
3956 | 0 | if (has_spendable_material && !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) { |
3957 | | // Use the existing master key if we have it |
3958 | 0 | if (data.master_key.key.IsValid()) { |
3959 | 0 | SetupDescriptorScriptPubKeyMans(local_wallet_batch, data.master_key); |
3960 | 0 | } else { |
3961 | | // Setup with a new seed if we don't. |
3962 | 0 | SetupOwnDescriptorScriptPubKeyMans(local_wallet_batch); |
3963 | 0 | } |
3964 | 0 | } |
3965 | | |
3966 | | // Get best block locator so that we can copy it to the watchonly and solvables |
3967 | 0 | CBlockLocator best_block_locator; |
3968 | 0 | if (!local_wallet_batch.ReadBestBlock(best_block_locator)) { |
3969 | 0 | return util::Error{_("Error: Unable to read wallet's best block locator record")}; |
3970 | 0 | } |
3971 | | |
3972 | | // Update m_txos to match the descriptors remaining in this wallet |
3973 | 0 | m_txos.clear(); |
3974 | 0 | RefreshAllTXOs(); |
3975 | | |
3976 | | // Check if the transactions in the wallet are still ours. Either they belong here, or they belong in the watchonly wallet. |
3977 | | // We need to go through these in the tx insertion order so that lookups to spends works. |
3978 | 0 | std::vector<Txid> txids_to_delete; |
3979 | 0 | std::unique_ptr<WalletBatch> watchonly_batch; |
3980 | 0 | if (data.watchonly_wallet) { |
3981 | 0 | watchonly_batch = std::make_unique<WalletBatch>(data.watchonly_wallet->GetDatabase()); |
3982 | 0 | if (!watchonly_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.watchonly_wallet->GetName())};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3983 | | // Copy the next tx order pos to the watchonly wallet |
3984 | 0 | LOCK(data.watchonly_wallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
3985 | 0 | data.watchonly_wallet->nOrderPosNext = nOrderPosNext; |
3986 | 0 | watchonly_batch->WriteOrderPosNext(data.watchonly_wallet->nOrderPosNext); |
3987 | | // Write the best block locator to avoid rescanning on reload |
3988 | 0 | if (!watchonly_batch->WriteBestBlock(best_block_locator)) { |
3989 | 0 | return util::Error{_("Error: Unable to write watchonly wallet best block locator record")}; |
3990 | 0 | } |
3991 | 0 | } |
3992 | 0 | std::unique_ptr<WalletBatch> solvables_batch; |
3993 | 0 | if (data.solvable_wallet) { |
3994 | 0 | solvables_batch = std::make_unique<WalletBatch>(data.solvable_wallet->GetDatabase()); |
3995 | 0 | if (!solvables_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.solvable_wallet->GetName())};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
3996 | | // Write the best block locator to avoid rescanning on reload |
3997 | 0 | if (!solvables_batch->WriteBestBlock(best_block_locator)) { |
3998 | 0 | return util::Error{_("Error: Unable to write solvable wallet best block locator record")}; |
3999 | 0 | } |
4000 | 0 | } |
4001 | 0 | for (const auto& [_pos, wtx] : wtxOrdered) { |
4002 | | // Check it is the watchonly wallet's |
4003 | | // solvable_wallet doesn't need to be checked because transactions for those scripts weren't being watched for |
4004 | 0 | bool is_mine = IsMine(*wtx->tx) || IsFromMe(*wtx->tx); |
4005 | 0 | if (data.watchonly_wallet) { |
4006 | 0 | LOCK(data.watchonly_wallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
4007 | 0 | if (data.watchonly_wallet->IsMine(*wtx->tx) || data.watchonly_wallet->IsFromMe(*wtx->tx)) { |
4008 | | // Add to watchonly wallet |
4009 | 0 | const Txid& hash = wtx->GetHash(); |
4010 | 0 | const CWalletTx& to_copy_wtx = *wtx; |
4011 | 0 | if (!data.watchonly_wallet->LoadToWallet(hash, [&](CWalletTx& ins_wtx, bool new_tx) EXCLUSIVE_LOCKS_REQUIRED(data.watchonly_wallet->cs_wallet) { |
4012 | 0 | if (!new_tx) return false; |
4013 | 0 | ins_wtx.SetTx(to_copy_wtx.tx); |
4014 | 0 | ins_wtx.CopyFrom(to_copy_wtx); |
4015 | 0 | return true; |
4016 | 0 | })) { |
4017 | 0 | return util::Error{strprintf(_("Error: Could not add watchonly tx %s to watchonly wallet"), wtx->GetHash().GetHex())};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
4018 | 0 | } |
4019 | 0 | watchonly_batch->WriteTx(data.watchonly_wallet->mapWallet.at(hash)); |
4020 | | // Mark as to remove from the migrated wallet only if it does not also belong to it |
4021 | 0 | if (!is_mine) { |
4022 | 0 | txids_to_delete.push_back(hash); |
4023 | 0 | continue; |
4024 | 0 | } |
4025 | 0 | } |
4026 | 0 | } |
4027 | 0 | if (!is_mine) { |
4028 | | // Both not ours and not in the watchonly wallet |
4029 | 0 | return util::Error{strprintf(_("Error: Transaction %s in wallet cannot be identified to belong to migrated wallets"), wtx->GetHash().GetHex())};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
4030 | 0 | } |
4031 | | // Rewrite the transaction so that anything that may have changed about it in memory also persists to disk |
4032 | 0 | local_wallet_batch.WriteTx(*wtx); |
4033 | 0 | } |
4034 | | |
4035 | | // Do the removes |
4036 | 0 | if (txids_to_delete.size() > 0) { |
4037 | 0 | if (auto res = RemoveTxs(local_wallet_batch, txids_to_delete); !res) { |
4038 | 0 | return util::Error{_("Error: Could not delete watchonly transactions. ") + util::ErrorString(res)}; |
4039 | 0 | } |
4040 | 0 | } |
4041 | | |
4042 | | // Pair external wallets with their corresponding db handler |
4043 | 0 | std::vector<std::pair<std::shared_ptr<CWallet>, std::unique_ptr<WalletBatch>>> wallets_vec; |
4044 | 0 | if (data.watchonly_wallet) wallets_vec.emplace_back(data.watchonly_wallet, std::move(watchonly_batch)); |
4045 | 0 | if (data.solvable_wallet) wallets_vec.emplace_back(data.solvable_wallet, std::move(solvables_batch)); |
4046 | | |
4047 | | // Write address book entry to disk |
4048 | 0 | auto func_store_addr = [](WalletBatch& batch, const CTxDestination& dest, const CAddressBookData& entry) { |
4049 | 0 | auto address{EncodeDestination(dest)}; |
4050 | 0 | if (entry.purpose) batch.WritePurpose(address, PurposeToString(*entry.purpose)); |
4051 | 0 | if (entry.label) batch.WriteName(address, *entry.label); |
4052 | 0 | for (const auto& [id, request] : entry.receive_requests) { |
4053 | 0 | batch.WriteAddressReceiveRequest(dest, id, request); |
4054 | 0 | } |
4055 | 0 | if (entry.previously_spent) batch.WriteAddressPreviouslySpent(dest, true); |
4056 | 0 | }; |
4057 | | |
4058 | | // Check the address book data in the same way we did for transactions |
4059 | 0 | std::vector<CTxDestination> dests_to_delete; |
4060 | 0 | for (const auto& [dest, record] : m_address_book) { |
4061 | | // Ensure "receive" entries that are no longer part of the original wallet are transferred to another wallet |
4062 | | // Entries for everything else ("send") will be cloned to all wallets. |
4063 | 0 | bool require_transfer = record.purpose == AddressPurpose::RECEIVE && !IsMine(dest); |
4064 | 0 | bool copied = false; |
4065 | 0 | for (auto& [wallet, batch] : wallets_vec) { |
4066 | 0 | LOCK(wallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
4067 | 0 | if (require_transfer && !wallet->IsMine(dest)) continue; |
4068 | | |
4069 | | // Copy the entire address book entry |
4070 | 0 | wallet->m_address_book[dest] = record; |
4071 | 0 | func_store_addr(*batch, dest, record); |
4072 | |
|
4073 | 0 | copied = true; |
4074 | | // Only delete 'receive' records that are no longer part of the original wallet |
4075 | 0 | if (require_transfer) { |
4076 | 0 | dests_to_delete.push_back(dest); |
4077 | 0 | break; |
4078 | 0 | } |
4079 | 0 | } |
4080 | | |
4081 | | // Fail immediately if we ever found an entry that was ours and cannot be transferred |
4082 | | // to any of the created wallets (watch-only, solvable). |
4083 | | // Means that no inferred descriptor maps to the stored entry. Which mustn't happen. |
4084 | 0 | if (require_transfer && !copied) { |
4085 | | |
4086 | | // Skip invalid/non-watched scripts that will not be migrated |
4087 | 0 | if (not_migrated_dests.contains(dest)) { |
4088 | 0 | dests_to_delete.push_back(dest); |
4089 | 0 | continue; |
4090 | 0 | } |
4091 | | |
4092 | 0 | return util::Error{_("Error: Address book data in wallet cannot be identified to belong to migrated wallets")}; |
4093 | 0 | } |
4094 | 0 | } |
4095 | | |
4096 | | // Persist external wallets address book entries |
4097 | 0 | for (auto& [wallet, batch] : wallets_vec) { |
4098 | 0 | if (!batch->TxnCommit()) { |
4099 | 0 | return util::Error{strprintf(_("Error: Unable to write data to disk for wallet %s"), wallet->GetName())};Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
4100 | 0 | } |
4101 | 0 | } |
4102 | | |
4103 | | // Remove the things to delete in this wallet |
4104 | 0 | if (dests_to_delete.size() > 0) { |
4105 | 0 | for (const auto& dest : dests_to_delete) { |
4106 | 0 | if (!DelAddressBookWithDB(local_wallet_batch, dest)) { |
4107 | 0 | return util::Error{_("Error: Unable to remove watchonly address book data")}; |
4108 | 0 | } |
4109 | 0 | } |
4110 | 0 | } |
4111 | | |
4112 | | // If there was no key material in the main wallet, there should be no records on it anymore. |
4113 | | // This wallet will be discarded at the end of the process. Only wallets that contain the |
4114 | | // migrated records will be presented to the user. |
4115 | 0 | if (!has_spendable_material) { |
4116 | 0 | if (!m_address_book.empty()) return util::Error{_("Error: Not all address book records were migrated")}; |
4117 | 0 | if (!mapWallet.empty()) return util::Error{_("Error: Not all transaction records were migrated")}; |
4118 | 0 | } |
4119 | | |
4120 | 0 | return {}; // all good |
4121 | 0 | } |
4122 | | |
4123 | | bool CWallet::CanGrindR() const |
4124 | 0 | { |
4125 | 0 | return !IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS); |
4126 | 0 | } |
4127 | | |
4128 | | // Returns wallet prefix for migration. |
4129 | | // Used to name the backup file and newly created wallets. |
4130 | | // E.g. a watch-only wallet is named "<prefix>_watchonly". |
4131 | | static std::string MigrationPrefixName(CWallet& wallet) |
4132 | 0 | { |
4133 | 0 | const std::string& name{wallet.GetName()}; |
4134 | 0 | return name.empty() ? "default_wallet" : name; |
4135 | 0 | } |
4136 | | |
4137 | | bool DoMigration(CWallet& wallet, WalletContext& context, bilingual_str& error, MigrationResult& res) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet) |
4138 | 0 | { |
4139 | 0 | AssertLockHeld(wallet.cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
4140 | | |
4141 | | // Get all of the descriptors from the legacy wallet |
4142 | 0 | std::optional<MigrationData> data = wallet.GetDescriptorsForLegacy(error); |
4143 | 0 | if (data == std::nullopt) return false; |
4144 | | |
4145 | | // Create the watchonly and solvable wallets if necessary |
4146 | 0 | if (data->watch_descs.size() > 0 || data->solvable_descs.size() > 0) { |
4147 | 0 | DatabaseOptions options; |
4148 | 0 | options.require_existing = false; |
4149 | 0 | options.require_create = true; |
4150 | 0 | options.require_format = DatabaseFormat::SQLITE; |
4151 | |
|
4152 | 0 | WalletContext empty_context; |
4153 | 0 | empty_context.args = context.args; |
4154 | | |
4155 | | // Make the wallets |
4156 | 0 | options.create_flags = WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET | WALLET_FLAG_DESCRIPTORS; |
4157 | 0 | if (wallet.IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) { |
4158 | 0 | options.create_flags |= WALLET_FLAG_AVOID_REUSE; |
4159 | 0 | } |
4160 | 0 | if (wallet.IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) { |
4161 | 0 | options.create_flags |= WALLET_FLAG_KEY_ORIGIN_METADATA; |
4162 | 0 | } |
4163 | 0 | if (data->watch_descs.size() > 0) { |
4164 | 0 | wallet.WalletLogPrintf("Making a new watchonly wallet containing the watched scripts\n"); |
4165 | |
|
4166 | 0 | DatabaseStatus status; |
4167 | 0 | std::vector<bilingual_str> warnings; |
4168 | 0 | std::string wallet_name = MigrationPrefixName(wallet) + "_watchonly"; |
4169 | 0 | std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error); |
4170 | 0 | if (!database) { |
4171 | 0 | error = strprintf(_("Wallet file creation failed: %s"), error);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
4172 | 0 | return false; |
4173 | 0 | } |
4174 | | |
4175 | 0 | data->watchonly_wallet = CWallet::CreateNew(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings); |
4176 | 0 | if (!data->watchonly_wallet) { |
4177 | 0 | error = _("Error: Failed to create new watchonly wallet"); |
4178 | 0 | return false; |
4179 | 0 | } |
4180 | 0 | res.watchonly_wallet = data->watchonly_wallet; |
4181 | 0 | LOCK(data->watchonly_wallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
4182 | | |
4183 | | // Parse the descriptors and add them to the new wallet |
4184 | 0 | for (const auto& [desc_str, creation_time] : data->watch_descs) { |
4185 | | // Parse the descriptor |
4186 | 0 | FlatSigningProvider keys; |
4187 | 0 | std::string parse_err; |
4188 | 0 | std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /*require_checksum=*/ true); |
4189 | 0 | assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors |
4190 | 0 | assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor |
4191 | | |
4192 | | // Add to the wallet |
4193 | 0 | WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0); |
4194 | 0 | if (auto spkm_res = data->watchonly_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) { |
4195 | 0 | throw std::runtime_error(util::ErrorString(spkm_res).original); |
4196 | 0 | } |
4197 | 0 | } |
4198 | | |
4199 | | // Add the wallet to settings |
4200 | 0 | UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings); |
4201 | 0 | } |
4202 | 0 | if (data->solvable_descs.size() > 0) { |
4203 | 0 | wallet.WalletLogPrintf("Making a new watchonly wallet containing the unwatched solvable scripts\n"); |
4204 | |
|
4205 | 0 | DatabaseStatus status; |
4206 | 0 | std::vector<bilingual_str> warnings; |
4207 | 0 | std::string wallet_name = MigrationPrefixName(wallet) + "_solvables"; |
4208 | 0 | std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error); |
4209 | 0 | if (!database) { |
4210 | 0 | error = strprintf(_("Wallet file creation failed: %s"), error);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
4211 | 0 | return false; |
4212 | 0 | } |
4213 | | |
4214 | 0 | data->solvable_wallet = CWallet::CreateNew(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings); |
4215 | 0 | if (!data->solvable_wallet) { |
4216 | 0 | error = _("Error: Failed to create new watchonly wallet"); |
4217 | 0 | return false; |
4218 | 0 | } |
4219 | 0 | res.solvables_wallet = data->solvable_wallet; |
4220 | 0 | LOCK(data->solvable_wallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
4221 | | |
4222 | | // Parse the descriptors and add them to the new wallet |
4223 | 0 | for (const auto& [desc_str, creation_time] : data->solvable_descs) { |
4224 | | // Parse the descriptor |
4225 | 0 | FlatSigningProvider keys; |
4226 | 0 | std::string parse_err; |
4227 | 0 | std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /*require_checksum=*/ true); |
4228 | 0 | assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors |
4229 | 0 | assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor |
4230 | | |
4231 | | // Add to the wallet |
4232 | 0 | WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0); |
4233 | 0 | if (auto spkm_res = data->solvable_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) { |
4234 | 0 | throw std::runtime_error(util::ErrorString(spkm_res).original); |
4235 | 0 | } |
4236 | 0 | } |
4237 | | |
4238 | | // Add the wallet to settings |
4239 | 0 | UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings); |
4240 | 0 | } |
4241 | 0 | } |
4242 | | |
4243 | | // Add the descriptors to wallet, remove LegacyScriptPubKeyMan, and cleanup txs and address book data |
4244 | 0 | return RunWithinTxn(wallet.GetDatabase(), /*process_desc=*/"apply migration process", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet){ |
4245 | 0 | if (auto res_migration = wallet.ApplyMigrationData(batch, *data); !res_migration) { |
4246 | 0 | error = util::ErrorString(res_migration); |
4247 | 0 | return false; |
4248 | 0 | } |
4249 | 0 | wallet.WalletLogPrintf("Wallet migration complete.\n"); |
4250 | 0 | return true; |
4251 | 0 | }); |
4252 | 0 | } |
4253 | | |
4254 | | util::Result<MigrationResult> MigrateLegacyToDescriptor(const std::string& wallet_name, const SecureString& passphrase, WalletContext& context) |
4255 | 0 | { |
4256 | 0 | std::vector<bilingual_str> warnings; |
4257 | 0 | bilingual_str error; |
4258 | | |
4259 | | // The only kind of wallets that could be loaded are descriptor ones, which don't need to be migrated. |
4260 | 0 | if (auto wallet = GetWallet(context, wallet_name)) { |
4261 | 0 | assert(wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)); |
4262 | 0 | return util::Error{_("Error: This wallet is already a descriptor wallet")}; |
4263 | 0 | } else { |
4264 | | // Check if the wallet is BDB |
4265 | 0 | const auto& wallet_path = GetWalletPath(wallet_name); |
4266 | 0 | if (!wallet_path) { |
4267 | 0 | return util::Error{util::ErrorString(wallet_path)}; |
4268 | 0 | } |
4269 | 0 | if (!fs::exists(*wallet_path)) { |
4270 | 0 | return util::Error{_("Error: Wallet does not exist")}; |
4271 | 0 | } |
4272 | 0 | if (!IsBDBFile(BDBDataFile(*wallet_path))) { |
4273 | 0 | return util::Error{_("Error: This wallet is already a descriptor wallet")}; |
4274 | 0 | } |
4275 | 0 | } |
4276 | | |
4277 | | // Load the wallet but only in the context of this function. |
4278 | | // No signals should be connected nor should anything else be aware of this wallet |
4279 | 0 | WalletContext empty_context; |
4280 | 0 | empty_context.args = context.args; |
4281 | 0 | DatabaseOptions options; |
4282 | 0 | options.require_existing = true; |
4283 | 0 | options.require_format = DatabaseFormat::BERKELEY_RO; |
4284 | 0 | DatabaseStatus status; |
4285 | 0 | std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error); |
4286 | 0 | if (!database) { |
4287 | 0 | return util::Error{Untranslated("Wallet file verification failed.") + Untranslated(" ") + error}; |
4288 | 0 | } |
4289 | | |
4290 | | // Make the local wallet |
4291 | 0 | std::shared_ptr<CWallet> local_wallet = CWallet::LoadExisting(empty_context, wallet_name, std::move(database), error, warnings); |
4292 | 0 | if (!local_wallet) { |
4293 | 0 | return util::Error{Untranslated("Wallet loading failed.") + Untranslated(" ") + error}; |
4294 | 0 | } |
4295 | | |
4296 | 0 | return MigrateLegacyToDescriptor(std::move(local_wallet), passphrase, context); |
4297 | 0 | } |
4298 | | |
4299 | | util::Result<MigrationResult> MigrateLegacyToDescriptor(std::shared_ptr<CWallet> local_wallet, const SecureString& passphrase, WalletContext& context) |
4300 | 0 | { |
4301 | 0 | MigrationResult res; |
4302 | 0 | bilingual_str error; |
4303 | 0 | std::vector<bilingual_str> warnings; |
4304 | |
|
4305 | 0 | DatabaseOptions options; |
4306 | 0 | options.require_existing = true; |
4307 | 0 | DatabaseStatus status; |
4308 | |
|
4309 | 0 | const std::string wallet_name = local_wallet->GetName(); |
4310 | | |
4311 | | // Before anything else, check if there is something to migrate. |
4312 | 0 | if (local_wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) { |
4313 | 0 | return util::Error{_("Error: This wallet is already a descriptor wallet")}; |
4314 | 0 | } |
4315 | | |
4316 | | // Make a backup of the DB in the wallet's directory with a unique filename |
4317 | | // using the wallet name and current timestamp. The backup filename is based |
4318 | | // on the name of the parent directory containing the wallet data in most |
4319 | | // cases, but in the case where the wallet name is a path to a data file, |
4320 | | // the name of the data file is used, and in the case where the wallet name |
4321 | | // is blank, "default_wallet" is used. |
4322 | 0 | const std::string backup_prefix = wallet_name.empty() ? MigrationPrefixName(*local_wallet) : [&] { |
4323 | | // fs::weakly_canonical resolves relative specifiers and remove trailing slashes. |
4324 | 0 | const auto legacy_wallet_path = fs::weakly_canonical(GetWalletDir() / fs::PathFromString(wallet_name)); |
4325 | 0 | return fs::PathToString(legacy_wallet_path.filename()); |
4326 | 0 | }(); |
4327 | |
|
4328 | 0 | fs::path backup_filename = fs::PathFromString(strprintf("%s_%d.legacy.bak", backup_prefix, GetTime()));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
4329 | 0 | fs::path backup_path = fsbridge::AbsPathJoin(GetWalletDir(), backup_filename); |
4330 | 0 | if (!local_wallet->BackupWallet(fs::PathToString(backup_path))) { |
4331 | 0 | return util::Error{_("Error: Unable to make a backup of your wallet")}; |
4332 | 0 | } |
4333 | 0 | res.backup_path = backup_path; |
4334 | |
|
4335 | 0 | bool success = false; |
4336 | | |
4337 | | // Unlock the wallet if needed |
4338 | 0 | if (local_wallet->IsLocked() && !local_wallet->Unlock(passphrase)) { |
4339 | 0 | if (passphrase.find('\0') == std::string::npos) { |
4340 | 0 | return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase was not provided or was incorrect.")}; |
4341 | 0 | } else { |
4342 | 0 | return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase entered was incorrect. " |
4343 | 0 | "The passphrase contains a null character (ie - a zero byte). " |
4344 | 0 | "If this passphrase was set with a version of this software prior to 25.0, " |
4345 | 0 | "please try again with only the characters up to — but not including — " |
4346 | 0 | "the first null character.")}; |
4347 | 0 | } |
4348 | 0 | } |
4349 | | |
4350 | | // Indicates whether the current wallet is empty after migration. |
4351 | | // Notes: |
4352 | | // When non-empty: the local wallet becomes the main spendable wallet. |
4353 | | // When empty: The local wallet is excluded from the result, as the |
4354 | | // user does not expect an empty spendable wallet after |
4355 | | // migrating only watch-only scripts. |
4356 | 0 | bool empty_local_wallet = false; |
4357 | |
|
4358 | 0 | { |
4359 | 0 | LOCK(local_wallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
4360 | | // First change to using SQLite |
4361 | 0 | if (!local_wallet->MigrateToSQLite(error)) return util::Error{error}; |
4362 | | |
4363 | | // Do the migration of keys and scripts for non-empty wallets, and cleanup if it fails |
4364 | 0 | if (HasLegacyRecords(*local_wallet)) { |
4365 | 0 | success = DoMigration(*local_wallet, context, error, res); |
4366 | | // No scripts mean empty wallet after migration |
4367 | 0 | empty_local_wallet = local_wallet->GetAllScriptPubKeyMans().empty(); |
4368 | 0 | } else { |
4369 | | // Make sure that descriptors flag is actually set |
4370 | 0 | local_wallet->SetWalletFlag(WALLET_FLAG_DESCRIPTORS); |
4371 | 0 | success = true; |
4372 | 0 | } |
4373 | 0 | } |
4374 | | |
4375 | | // In case of loading failure, we need to remember the wallet files we have created to remove. |
4376 | | // A `set` is used as it may be populated with the same wallet directory paths multiple times, |
4377 | | // both before and after loading. This ensures the set is complete even if one of the wallets |
4378 | | // fails to load. |
4379 | 0 | std::set<fs::path> wallet_files_to_remove; |
4380 | 0 | std::set<fs::path> wallet_empty_dirs_to_remove; |
4381 | | |
4382 | | // Helper to track wallet files and directories for cleanup on failure. |
4383 | | // Only directories of wallets created during migration (not the main wallet) are tracked. |
4384 | 0 | auto track_for_cleanup = [&](const CWallet& wallet) { |
4385 | 0 | const auto files = wallet.GetDatabase().Files(); |
4386 | 0 | wallet_files_to_remove.insert(files.begin(), files.end()); |
4387 | 0 | if (wallet.GetName() != wallet_name) { |
4388 | | // If this isn’t the main wallet, mark its directory for removal. |
4389 | | // This applies to the watch-only and solvable wallets. |
4390 | | // Wallets stored directly as files in the top-level directory |
4391 | | // (e.g. default unnamed wallets) don’t have a removable parent directory. |
4392 | 0 | wallet_empty_dirs_to_remove.insert(fs::PathFromString(wallet.GetDatabase().Filename()).parent_path()); |
4393 | 0 | } |
4394 | 0 | }; |
4395 | | |
4396 | |
|
4397 | 0 | if (success) { |
4398 | 0 | Assume(!res.wallet); // We will set it here. Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
4399 | | // Check if the local wallet is empty after migration |
4400 | 0 | if (empty_local_wallet) { |
4401 | | // This wallet has no records. We can safely remove it. |
4402 | 0 | std::vector<fs::path> paths_to_remove = local_wallet->GetDatabase().Files(); |
4403 | 0 | local_wallet.reset(); |
4404 | 0 | for (const auto& path_to_remove : paths_to_remove) fs::remove(path_to_remove); |
4405 | 0 | } |
4406 | |
|
4407 | 0 | LogInfo("Loading new wallets after migration...\n");Line | Count | Source | 95 | 0 | #define LogInfo(...) LogPrintLevel_(BCLog::LogFlags::ALL, BCLog::Level::Info, /*should_ratelimit=*/true, __VA_ARGS__) Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
|
|
4408 | | // Migration successful, load all the migrated wallets. |
4409 | 0 | for (std::shared_ptr<CWallet>* wallet_ptr : {&local_wallet, &res.watchonly_wallet, &res.solvables_wallet}) { |
4410 | 0 | if (success && *wallet_ptr) { |
4411 | 0 | std::shared_ptr<CWallet>& wallet = *wallet_ptr; |
4412 | | // Track db path and load wallet |
4413 | 0 | track_for_cleanup(*wallet); |
4414 | 0 | assert(wallet.use_count() == 1); |
4415 | 0 | std::string wallet_name = wallet->GetName(); |
4416 | 0 | wallet.reset(); |
4417 | 0 | wallet = LoadWallet(context, wallet_name, /*load_on_start=*/std::nullopt, options, status, error, warnings); |
4418 | 0 | if (!wallet) { |
4419 | 0 | LogError("Failed to load wallet '%s' after migration. Rolling back migration to preserve consistency. "Line | Count | Source | 97 | 0 | #define LogError(...) LogPrintLevel_(BCLog::LogFlags::ALL, BCLog::Level::Error, /*should_ratelimit=*/true, __VA_ARGS__) Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
|
|
4420 | 0 | "Error cause: %s\n", wallet_name, error.original); |
4421 | 0 | success = false; |
4422 | 0 | break; |
4423 | 0 | } |
4424 | | |
4425 | | // Set the first successfully loaded wallet as the main one. |
4426 | | // The loop order is intentional and must always start with the local wallet. |
4427 | 0 | if (!res.wallet) { |
4428 | 0 | res.wallet_name = wallet->GetName(); |
4429 | 0 | res.wallet = std::move(wallet); |
4430 | 0 | } |
4431 | 0 | } |
4432 | 0 | } |
4433 | 0 | } |
4434 | 0 | if (!success) { |
4435 | | // Make list of wallets to cleanup |
4436 | 0 | std::vector<std::shared_ptr<CWallet>> created_wallets; |
4437 | 0 | if (local_wallet) created_wallets.push_back(std::move(local_wallet)); |
4438 | 0 | if (res.watchonly_wallet) created_wallets.push_back(std::move(res.watchonly_wallet)); |
4439 | 0 | if (res.solvables_wallet) created_wallets.push_back(std::move(res.solvables_wallet)); |
4440 | | |
4441 | | // Get the directories to remove after unloading |
4442 | 0 | for (std::shared_ptr<CWallet>& wallet : created_wallets) { |
4443 | 0 | track_for_cleanup(*wallet); |
4444 | 0 | } |
4445 | | |
4446 | | // Unload the wallets |
4447 | 0 | for (std::shared_ptr<CWallet>& w : created_wallets) { |
4448 | 0 | if (w->HaveChain()) { |
4449 | | // Unloading for wallets that were loaded for normal use |
4450 | 0 | if (!RemoveWallet(context, w, /*load_on_start=*/false)) { |
4451 | 0 | error += _("\nUnable to cleanup failed migration"); |
4452 | 0 | return util::Error{error}; |
4453 | 0 | } |
4454 | 0 | WaitForDeleteWallet(std::move(w)); |
4455 | 0 | } else { |
4456 | | // Unloading for wallets in local context |
4457 | 0 | assert(w.use_count() == 1); |
4458 | 0 | w.reset(); |
4459 | 0 | } |
4460 | 0 | } |
4461 | | |
4462 | | // First, delete the db files we have created throughout this process and nothing else |
4463 | 0 | for (const fs::path& file : wallet_files_to_remove) { |
4464 | 0 | fs::remove(file); |
4465 | 0 | } |
4466 | | |
4467 | | // Second, delete the created wallet directories and nothing else. They must be empty at this point. |
4468 | 0 | for (const fs::path& dir : wallet_empty_dirs_to_remove) { |
4469 | 0 | Assume(fs::is_empty(dir)); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
4470 | 0 | fs::remove(dir); |
4471 | 0 | } |
4472 | | |
4473 | | // Restore the backup |
4474 | | // Convert the backup file to the wallet db file by renaming it and moving it into the wallet's directory. |
4475 | 0 | bilingual_str restore_error; |
4476 | 0 | const auto& ptr_wallet = RestoreWallet(context, backup_path, wallet_name, /*load_on_start=*/std::nullopt, status, restore_error, warnings, /*load_after_restore=*/false, /*allow_unnamed=*/true); |
4477 | 0 | if (!restore_error.empty()) { |
4478 | 0 | error += restore_error + _("\nUnable to restore backup of wallet."); |
4479 | 0 | return util::Error{error}; |
4480 | 0 | } |
4481 | | // Verify that the legacy wallet is not loaded after restoring from the backup. |
4482 | 0 | assert(!ptr_wallet); |
4483 | | |
4484 | 0 | return util::Error{error}; |
4485 | 0 | } |
4486 | 0 | return res; |
4487 | 0 | } |
4488 | | |
4489 | | void CWallet::CacheNewScriptPubKeys(const std::set<CScript>& spks, ScriptPubKeyMan* spkm) |
4490 | 0 | { |
4491 | 0 | for (const auto& script : spks) { |
4492 | 0 | m_cached_spks[script].push_back(spkm); |
4493 | 0 | } |
4494 | 0 | } |
4495 | | |
4496 | | void CWallet::TopUpCallback(const std::set<CScript>& spks, ScriptPubKeyMan* spkm) |
4497 | 0 | { |
4498 | | // Update scriptPubKey cache |
4499 | 0 | CacheNewScriptPubKeys(spks, spkm); |
4500 | 0 | } |
4501 | | |
4502 | | std::set<CExtPubKey> CWallet::GetActiveHDPubKeys() const |
4503 | 0 | { |
4504 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
4505 | |
|
4506 | 0 | Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
4507 | |
|
4508 | 0 | std::set<CExtPubKey> active_xpubs; |
4509 | 0 | for (const auto& spkm : GetActiveScriptPubKeyMans()) { |
4510 | 0 | const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm); |
4511 | 0 | assert(desc_spkm); |
4512 | 0 | LOCK(desc_spkm->cs_desc_man); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
4513 | 0 | WalletDescriptor w_desc = desc_spkm->GetWalletDescriptor(); |
4514 | |
|
4515 | 0 | std::set<CPubKey> desc_pubkeys; |
4516 | 0 | std::set<CExtPubKey> desc_xpubs; |
4517 | 0 | w_desc.descriptor->GetPubKeys(desc_pubkeys, desc_xpubs); |
4518 | 0 | active_xpubs.merge(std::move(desc_xpubs)); |
4519 | 0 | } |
4520 | 0 | return active_xpubs; |
4521 | 0 | } |
4522 | | |
4523 | | std::optional<CKey> CWallet::GetKey(const CKeyID& keyid) const |
4524 | 0 | { |
4525 | 0 | Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
4526 | |
|
4527 | 0 | for (const auto& spkm : GetAllScriptPubKeyMans()) { |
4528 | 0 | const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm); |
4529 | 0 | assert(desc_spkm); |
4530 | 0 | LOCK(desc_spkm->cs_desc_man); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
4531 | 0 | if (std::optional<CKey> key = desc_spkm->GetKey(keyid)) { |
4532 | 0 | return key; |
4533 | 0 | } |
4534 | 0 | } |
4535 | 0 | return std::nullopt; |
4536 | 0 | } |
4537 | | |
4538 | | void CWallet::WriteBestBlock() const |
4539 | 0 | { |
4540 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
4541 | |
|
4542 | 0 | if (!m_last_block_processed.IsNull()) { |
4543 | 0 | CBlockLocator loc; |
4544 | 0 | chain().findBlock(m_last_block_processed, FoundBlock().locator(loc)); |
4545 | |
|
4546 | 0 | if (!loc.IsNull()) { |
4547 | 0 | WalletBatch batch(GetDatabase()); |
4548 | 0 | batch.WriteBestBlock(loc); |
4549 | 0 | } |
4550 | 0 | } |
4551 | 0 | } |
4552 | | |
4553 | | void CWallet::RefreshTXOsFromTx(const CWalletTx& wtx) |
4554 | 0 | { |
4555 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
4556 | 0 | for (uint32_t i = 0; i < wtx.tx->vout.size(); ++i) { |
4557 | 0 | const CTxOut& txout = wtx.tx->vout.at(i); |
4558 | 0 | if (!IsMine(txout)) continue; |
4559 | 0 | COutPoint outpoint(wtx.GetHash(), i); |
4560 | 0 | if (m_txos.contains(outpoint)) { |
4561 | 0 | } else { |
4562 | 0 | m_txos.emplace(outpoint, WalletTXO{wtx, txout}); |
4563 | 0 | } |
4564 | 0 | } |
4565 | 0 | } |
4566 | | |
4567 | | void CWallet::RefreshAllTXOs() |
4568 | 0 | { |
4569 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
4570 | 0 | for (const auto& [_, wtx] : mapWallet) { |
4571 | 0 | RefreshTXOsFromTx(wtx); |
4572 | 0 | } |
4573 | 0 | } |
4574 | | |
4575 | | std::optional<WalletTXO> CWallet::GetTXO(const COutPoint& outpoint) const |
4576 | 0 | { |
4577 | 0 | AssertLockHeld(cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
4578 | 0 | const auto& it = m_txos.find(outpoint); |
4579 | 0 | if (it == m_txos.end()) { |
4580 | 0 | return std::nullopt; |
4581 | 0 | } |
4582 | 0 | return it->second; |
4583 | 0 | } |
4584 | | |
4585 | | void CWallet::DisconnectChainNotifications() |
4586 | 0 | { |
4587 | 0 | if (m_chain_notifications_handler) { |
4588 | 0 | m_chain_notifications_handler->disconnect(); |
4589 | 0 | chain().waitForNotifications(); |
4590 | 0 | m_chain_notifications_handler.reset(); |
4591 | 0 | } |
4592 | 0 | } |
4593 | | |
4594 | | } // namespace wallet |