/root/bitcoin/src/wallet/walletdb.cpp
Line | Count | Source |
1 | | // Copyright (c) 2009-2010 Satoshi Nakamoto |
2 | | // Copyright (c) 2009-present The Bitcoin Core developers |
3 | | // Distributed under the MIT software license, see the accompanying |
4 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
5 | | |
6 | | #include <bitcoin-build-config.h> // IWYU pragma: keep |
7 | | |
8 | | #include <wallet/walletdb.h> |
9 | | |
10 | | #include <common/system.h> |
11 | | #include <key_io.h> |
12 | | #include <primitives/transaction_identifier.h> |
13 | | #include <protocol.h> |
14 | | #include <script/script.h> |
15 | | #include <serialize.h> |
16 | | #include <sync.h> |
17 | | #include <util/bip32.h> |
18 | | #include <util/check.h> |
19 | | #include <util/fs.h> |
20 | | #include <util/time.h> |
21 | | #include <util/translation.h> |
22 | | #include <wallet/migrate.h> |
23 | | #include <wallet/sqlite.h> |
24 | | #include <wallet/wallet.h> |
25 | | |
26 | | #include <atomic> |
27 | | #include <optional> |
28 | | #include <string> |
29 | | |
30 | | namespace wallet { |
31 | | namespace DBKeys { |
32 | | const std::string ACENTRY{"acentry"}; |
33 | | const std::string ACTIVEEXTERNALSPK{"activeexternalspk"}; |
34 | | const std::string ACTIVEINTERNALSPK{"activeinternalspk"}; |
35 | | const std::string BESTBLOCK_NOMERKLE{"bestblock_nomerkle"}; |
36 | | const std::string BESTBLOCK{"bestblock"}; |
37 | | const std::string CRYPTED_KEY{"ckey"}; |
38 | | const std::string CSCRIPT{"cscript"}; |
39 | | const std::string DEFAULTKEY{"defaultkey"}; |
40 | | const std::string DESTDATA{"destdata"}; |
41 | | const std::string FLAGS{"flags"}; |
42 | | const std::string HDCHAIN{"hdchain"}; |
43 | | const std::string KEYMETA{"keymeta"}; |
44 | | const std::string KEY{"key"}; |
45 | | const std::string LOCKED_UTXO{"lockedutxo"}; |
46 | | const std::string MASTER_KEY{"mkey"}; |
47 | | const std::string MINVERSION{"minversion"}; |
48 | | const std::string NAME{"name"}; |
49 | | const std::string OLD_KEY{"wkey"}; |
50 | | const std::string ORDERPOSNEXT{"orderposnext"}; |
51 | | const std::string POOL{"pool"}; |
52 | | const std::string PURPOSE{"purpose"}; |
53 | | const std::string SETTINGS{"settings"}; |
54 | | const std::string TX{"tx"}; |
55 | | const std::string VERSION{"version"}; |
56 | | const std::string WALLETDESCRIPTOR{"walletdescriptor"}; |
57 | | const std::string WALLETDESCRIPTORCACHE{"walletdescriptorcache"}; |
58 | | const std::string WALLETDESCRIPTORLHCACHE{"walletdescriptorlhcache"}; |
59 | | const std::string WALLETDESCRIPTORCKEY{"walletdescriptorckey"}; |
60 | | const std::string WALLETDESCRIPTORKEY{"walletdescriptorkey"}; |
61 | | const std::string WATCHMETA{"watchmeta"}; |
62 | | const std::string WATCHS{"watchs"}; |
63 | | const std::unordered_set<std::string> LEGACY_TYPES{CRYPTED_KEY, CSCRIPT, DEFAULTKEY, HDCHAIN, KEYMETA, KEY, OLD_KEY, POOL, WATCHMETA, WATCHS}; |
64 | | } // namespace DBKeys |
65 | | |
66 | | void LogDBInfo() |
67 | 0 | { |
68 | | // Add useful DB information here. This will be printed during startup. |
69 | 0 | LogInfo("Using SQLite Version %s", SQLiteDatabaseVersion());Line | Count | Source | 95 | 0 | #define LogInfo(...) LogPrintLevel_(BCLog::LogFlags::ALL, BCLog::Level::Info, /*should_ratelimit=*/true, __VA_ARGS__) Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
|
|
70 | 0 | } |
71 | | |
72 | | // |
73 | | // WalletBatch |
74 | | // |
75 | | |
76 | | bool WalletBatch::WriteName(const std::string& strAddress, const std::string& strName) |
77 | 0 | { |
78 | 0 | return WriteIC(std::make_pair(DBKeys::NAME, strAddress), strName); |
79 | 0 | } |
80 | | |
81 | | bool WalletBatch::EraseName(const std::string& strAddress) |
82 | 0 | { |
83 | | // This should only be used for sending addresses, never for receiving addresses, |
84 | | // receiving addresses must always have an address book entry if they're not change return. |
85 | 0 | return EraseIC(std::make_pair(DBKeys::NAME, strAddress)); |
86 | 0 | } |
87 | | |
88 | | bool WalletBatch::WritePurpose(const std::string& strAddress, const std::string& strPurpose) |
89 | 0 | { |
90 | 0 | return WriteIC(std::make_pair(DBKeys::PURPOSE, strAddress), strPurpose); |
91 | 0 | } |
92 | | |
93 | | bool WalletBatch::ErasePurpose(const std::string& strAddress) |
94 | 0 | { |
95 | 0 | return EraseIC(std::make_pair(DBKeys::PURPOSE, strAddress)); |
96 | 0 | } |
97 | | |
98 | | bool WalletBatch::WriteTx(const CWalletTx& wtx) |
99 | 0 | { |
100 | 0 | return WriteIC(std::make_pair(DBKeys::TX, wtx.GetHash()), wtx); |
101 | 0 | } |
102 | | |
103 | | bool WalletBatch::EraseTx(Txid hash) |
104 | 0 | { |
105 | 0 | return EraseIC(std::make_pair(DBKeys::TX, hash.ToUint256())); |
106 | 0 | } |
107 | | |
108 | | bool WalletBatch::WriteKeyMetadata(const CKeyMetadata& meta, const CPubKey& pubkey, const bool overwrite) |
109 | 0 | { |
110 | 0 | return WriteIC(std::make_pair(DBKeys::KEYMETA, pubkey), meta, overwrite); |
111 | 0 | } |
112 | | |
113 | | bool WalletBatch::WriteKey(const CPubKey& vchPubKey, const CPrivKey& vchPrivKey, const CKeyMetadata& keyMeta) |
114 | 0 | { |
115 | 0 | if (!WriteKeyMetadata(keyMeta, vchPubKey, false)) { |
116 | 0 | return false; |
117 | 0 | } |
118 | | |
119 | | // hash pubkey/privkey to accelerate wallet load |
120 | 0 | const auto keypair_hash = Hash(vchPubKey, vchPrivKey); |
121 | |
|
122 | 0 | return WriteIC(std::make_pair(DBKeys::KEY, vchPubKey), std::make_pair(vchPrivKey, keypair_hash), false); |
123 | 0 | } |
124 | | |
125 | | bool WalletBatch::WriteCryptedKey(const CPubKey& vchPubKey, |
126 | | const std::vector<unsigned char>& vchCryptedSecret, |
127 | | const CKeyMetadata &keyMeta) |
128 | 0 | { |
129 | 0 | if (!WriteKeyMetadata(keyMeta, vchPubKey, true)) { |
130 | 0 | return false; |
131 | 0 | } |
132 | | |
133 | | // Compute a checksum of the encrypted key |
134 | 0 | uint256 checksum = Hash(vchCryptedSecret); |
135 | |
|
136 | 0 | const auto key = std::make_pair(DBKeys::CRYPTED_KEY, vchPubKey); |
137 | 0 | if (!WriteIC(key, std::make_pair(vchCryptedSecret, checksum), false)) { |
138 | | // It may already exist, so try writing just the checksum |
139 | 0 | std::vector<unsigned char> val; |
140 | 0 | if (!m_batch->Read(key, val)) { |
141 | 0 | return false; |
142 | 0 | } |
143 | 0 | if (!WriteIC(key, std::make_pair(val, checksum), true)) { |
144 | 0 | return false; |
145 | 0 | } |
146 | 0 | } |
147 | 0 | EraseIC(std::make_pair(DBKeys::KEY, vchPubKey)); |
148 | 0 | return true; |
149 | 0 | } |
150 | | |
151 | | bool WalletBatch::WriteMasterKey(unsigned int nID, const CMasterKey& kMasterKey) |
152 | 0 | { |
153 | 0 | return WriteIC(std::make_pair(DBKeys::MASTER_KEY, nID), kMasterKey, true); |
154 | 0 | } |
155 | | |
156 | | bool WalletBatch::EraseMasterKey(unsigned int id) |
157 | 0 | { |
158 | 0 | return EraseIC(std::make_pair(DBKeys::MASTER_KEY, id)); |
159 | 0 | } |
160 | | |
161 | | bool WalletBatch::WriteWatchOnly(const CScript &dest, const CKeyMetadata& keyMeta) |
162 | 0 | { |
163 | 0 | if (!WriteIC(std::make_pair(DBKeys::WATCHMETA, dest), keyMeta)) { |
164 | 0 | return false; |
165 | 0 | } |
166 | 0 | return WriteIC(std::make_pair(DBKeys::WATCHS, dest), uint8_t{'1'}); |
167 | 0 | } |
168 | | |
169 | | bool WalletBatch::EraseWatchOnly(const CScript &dest) |
170 | 0 | { |
171 | 0 | if (!EraseIC(std::make_pair(DBKeys::WATCHMETA, dest))) { |
172 | 0 | return false; |
173 | 0 | } |
174 | 0 | return EraseIC(std::make_pair(DBKeys::WATCHS, dest)); |
175 | 0 | } |
176 | | |
177 | | bool WalletBatch::WriteBestBlock(const CBlockLocator& locator) |
178 | 0 | { |
179 | 0 | WriteIC(DBKeys::BESTBLOCK, CBlockLocator()); // Write empty block locator so versions that require a merkle branch automatically rescan |
180 | 0 | return WriteIC(DBKeys::BESTBLOCK_NOMERKLE, locator); |
181 | 0 | } |
182 | | |
183 | | bool WalletBatch::ReadBestBlock(CBlockLocator& locator) |
184 | 0 | { |
185 | 0 | if (m_batch->Read(DBKeys::BESTBLOCK, locator) && !locator.vHave.empty()) return true; |
186 | 0 | return m_batch->Read(DBKeys::BESTBLOCK_NOMERKLE, locator); |
187 | 0 | } |
188 | | |
189 | | bool WalletBatch::IsEncrypted() |
190 | 0 | { |
191 | 0 | DataStream prefix; |
192 | 0 | prefix << DBKeys::MASTER_KEY; |
193 | 0 | if (auto cursor = m_batch->GetNewPrefixCursor(prefix)) { |
194 | 0 | DataStream k, v; |
195 | 0 | if (cursor->Next(k, v) == DatabaseCursor::Status::MORE) return true; |
196 | 0 | } |
197 | 0 | return false; |
198 | 0 | } |
199 | | |
200 | | bool WalletBatch::WriteOrderPosNext(int64_t nOrderPosNext) |
201 | 0 | { |
202 | 0 | return WriteIC(DBKeys::ORDERPOSNEXT, nOrderPosNext); |
203 | 0 | } |
204 | | |
205 | | bool WalletBatch::WriteActiveScriptPubKeyMan(uint8_t type, const uint256& id, bool internal) |
206 | 0 | { |
207 | 0 | std::string key = internal ? DBKeys::ACTIVEINTERNALSPK : DBKeys::ACTIVEEXTERNALSPK; |
208 | 0 | return WriteIC(make_pair(key, type), id); |
209 | 0 | } |
210 | | |
211 | | bool WalletBatch::EraseActiveScriptPubKeyMan(uint8_t type, bool internal) |
212 | 0 | { |
213 | 0 | const std::string key{internal ? DBKeys::ACTIVEINTERNALSPK : DBKeys::ACTIVEEXTERNALSPK}; |
214 | 0 | return EraseIC(make_pair(key, type)); |
215 | 0 | } |
216 | | |
217 | | bool WalletBatch::WriteDescriptorKey(const uint256& desc_id, const CPubKey& pubkey, const CPrivKey& privkey) |
218 | 0 | { |
219 | | // hash pubkey/privkey to accelerate wallet load |
220 | 0 | const auto keypair_hash = Hash(pubkey, privkey); |
221 | |
|
222 | 0 | return WriteIC(std::make_pair(DBKeys::WALLETDESCRIPTORKEY, std::make_pair(desc_id, pubkey)), std::make_pair(privkey, keypair_hash), false); |
223 | 0 | } |
224 | | |
225 | | bool WalletBatch::WriteCryptedDescriptorKey(const uint256& desc_id, const CPubKey& pubkey, const std::vector<unsigned char>& secret) |
226 | 0 | { |
227 | 0 | if (!WriteIC(std::make_pair(DBKeys::WALLETDESCRIPTORCKEY, std::make_pair(desc_id, pubkey)), secret, false)) { |
228 | 0 | return false; |
229 | 0 | } |
230 | 0 | EraseIC(std::make_pair(DBKeys::WALLETDESCRIPTORKEY, std::make_pair(desc_id, pubkey))); |
231 | 0 | return true; |
232 | 0 | } |
233 | | |
234 | | bool WalletBatch::WriteDescriptor(const uint256& desc_id, const WalletDescriptor& descriptor) |
235 | 0 | { |
236 | 0 | return WriteIC(make_pair(DBKeys::WALLETDESCRIPTOR, desc_id), descriptor); |
237 | 0 | } |
238 | | |
239 | | bool WalletBatch::WriteDescriptorDerivedCache(const CExtPubKey& xpub, const uint256& desc_id, uint32_t key_exp_index, uint32_t der_index) |
240 | 0 | { |
241 | 0 | std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE); |
242 | 0 | xpub.Encode(ser_xpub.data()); |
243 | 0 | return WriteIC(std::make_pair(std::make_pair(DBKeys::WALLETDESCRIPTORCACHE, desc_id), std::make_pair(key_exp_index, der_index)), ser_xpub); |
244 | 0 | } |
245 | | |
246 | | bool WalletBatch::WriteDescriptorParentCache(const CExtPubKey& xpub, const uint256& desc_id, uint32_t key_exp_index) |
247 | 0 | { |
248 | 0 | std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE); |
249 | 0 | xpub.Encode(ser_xpub.data()); |
250 | 0 | return WriteIC(std::make_pair(std::make_pair(DBKeys::WALLETDESCRIPTORCACHE, desc_id), key_exp_index), ser_xpub); |
251 | 0 | } |
252 | | |
253 | | bool WalletBatch::WriteDescriptorLastHardenedCache(const CExtPubKey& xpub, const uint256& desc_id, uint32_t key_exp_index) |
254 | 0 | { |
255 | 0 | std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE); |
256 | 0 | xpub.Encode(ser_xpub.data()); |
257 | 0 | return WriteIC(std::make_pair(std::make_pair(DBKeys::WALLETDESCRIPTORLHCACHE, desc_id), key_exp_index), ser_xpub); |
258 | 0 | } |
259 | | |
260 | | bool WalletBatch::WriteDescriptorCacheItems(const uint256& desc_id, const DescriptorCache& cache) |
261 | 0 | { |
262 | 0 | for (const auto& parent_xpub_pair : cache.GetCachedParentExtPubKeys()) { |
263 | 0 | if (!WriteDescriptorParentCache(parent_xpub_pair.second, desc_id, parent_xpub_pair.first)) { |
264 | 0 | return false; |
265 | 0 | } |
266 | 0 | } |
267 | 0 | for (const auto& derived_xpub_map_pair : cache.GetCachedDerivedExtPubKeys()) { |
268 | 0 | for (const auto& derived_xpub_pair : derived_xpub_map_pair.second) { |
269 | 0 | if (!WriteDescriptorDerivedCache(derived_xpub_pair.second, desc_id, derived_xpub_map_pair.first, derived_xpub_pair.first)) { |
270 | 0 | return false; |
271 | 0 | } |
272 | 0 | } |
273 | 0 | } |
274 | 0 | for (const auto& lh_xpub_pair : cache.GetCachedLastHardenedExtPubKeys()) { |
275 | 0 | if (!WriteDescriptorLastHardenedCache(lh_xpub_pair.second, desc_id, lh_xpub_pair.first)) { |
276 | 0 | return false; |
277 | 0 | } |
278 | 0 | } |
279 | 0 | return true; |
280 | 0 | } |
281 | | |
282 | | bool WalletBatch::WriteLockedUTXO(const COutPoint& output) |
283 | 0 | { |
284 | 0 | return WriteIC(std::make_pair(DBKeys::LOCKED_UTXO, std::make_pair(output.hash, output.n)), uint8_t{'1'}); |
285 | 0 | } |
286 | | |
287 | | bool WalletBatch::EraseLockedUTXO(const COutPoint& output) |
288 | 0 | { |
289 | 0 | return EraseIC(std::make_pair(DBKeys::LOCKED_UTXO, std::make_pair(output.hash, output.n))); |
290 | 0 | } |
291 | | |
292 | | bool LoadKey(CWallet* pwallet, DataStream& ssKey, DataStream& ssValue, std::string& strErr) |
293 | 0 | { |
294 | 0 | LOCK(pwallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
295 | 0 | try { |
296 | 0 | CPubKey vchPubKey; |
297 | 0 | ssKey >> vchPubKey; |
298 | 0 | if (!vchPubKey.IsValid()) |
299 | 0 | { |
300 | 0 | strErr = "Error reading wallet database: CPubKey corrupt"; |
301 | 0 | return false; |
302 | 0 | } |
303 | 0 | CKey key; |
304 | 0 | CPrivKey pkey; |
305 | 0 | uint256 hash; |
306 | |
|
307 | 0 | ssValue >> pkey; |
308 | | |
309 | | // Old wallets store keys as DBKeys::KEY [pubkey] => [privkey] |
310 | | // ... which was slow for wallets with lots of keys, because the public key is re-derived from the private key |
311 | | // using EC operations as a checksum. |
312 | | // Newer wallets store keys as DBKeys::KEY [pubkey] => [privkey][hash(pubkey,privkey)], which is much faster while |
313 | | // remaining backwards-compatible. |
314 | 0 | try |
315 | 0 | { |
316 | 0 | ssValue >> hash; |
317 | 0 | } |
318 | 0 | catch (const std::ios_base::failure&) {} |
319 | |
|
320 | 0 | bool fSkipCheck = false; |
321 | |
|
322 | 0 | if (!hash.IsNull()) |
323 | 0 | { |
324 | | // hash pubkey/privkey to accelerate wallet load |
325 | 0 | const auto keypair_hash = Hash(vchPubKey, pkey); |
326 | |
|
327 | 0 | if (keypair_hash != hash) |
328 | 0 | { |
329 | 0 | strErr = "Error reading wallet database: CPubKey/CPrivKey corrupt"; |
330 | 0 | return false; |
331 | 0 | } |
332 | | |
333 | 0 | fSkipCheck = true; |
334 | 0 | } |
335 | | |
336 | 0 | if (!key.Load(pkey, vchPubKey, fSkipCheck)) |
337 | 0 | { |
338 | 0 | strErr = "Error reading wallet database: CPrivKey corrupt"; |
339 | 0 | return false; |
340 | 0 | } |
341 | 0 | if (!pwallet->GetOrCreateLegacyDataSPKM()->LoadKey(key, vchPubKey)) |
342 | 0 | { |
343 | 0 | strErr = "Error reading wallet database: LegacyDataSPKM::LoadKey failed"; |
344 | 0 | return false; |
345 | 0 | } |
346 | 0 | } catch (const std::exception& e) { |
347 | 0 | if (strErr.empty()) { |
348 | 0 | strErr = e.what(); |
349 | 0 | } |
350 | 0 | return false; |
351 | 0 | } |
352 | 0 | return true; |
353 | 0 | } |
354 | | |
355 | | bool LoadCryptedKey(CWallet* pwallet, DataStream& ssKey, DataStream& ssValue, std::string& strErr) |
356 | 0 | { |
357 | 0 | LOCK(pwallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
358 | 0 | try { |
359 | 0 | CPubKey vchPubKey; |
360 | 0 | ssKey >> vchPubKey; |
361 | 0 | if (!vchPubKey.IsValid()) |
362 | 0 | { |
363 | 0 | strErr = "Error reading wallet database: CPubKey corrupt"; |
364 | 0 | return false; |
365 | 0 | } |
366 | 0 | std::vector<unsigned char> vchPrivKey; |
367 | 0 | ssValue >> vchPrivKey; |
368 | | |
369 | | // Get the checksum and check it |
370 | 0 | bool checksum_valid = false; |
371 | 0 | if (!ssValue.empty()) { |
372 | 0 | uint256 checksum; |
373 | 0 | ssValue >> checksum; |
374 | 0 | if (!(checksum_valid = Hash(vchPrivKey) == checksum)) { |
375 | 0 | strErr = "Error reading wallet database: Encrypted key corrupt"; |
376 | 0 | return false; |
377 | 0 | } |
378 | 0 | } |
379 | | |
380 | 0 | if (!pwallet->GetOrCreateLegacyDataSPKM()->LoadCryptedKey(vchPubKey, vchPrivKey, checksum_valid)) |
381 | 0 | { |
382 | 0 | strErr = "Error reading wallet database: LegacyDataSPKM::LoadCryptedKey failed"; |
383 | 0 | return false; |
384 | 0 | } |
385 | 0 | } catch (const std::exception& e) { |
386 | 0 | if (strErr.empty()) { |
387 | 0 | strErr = e.what(); |
388 | 0 | } |
389 | 0 | return false; |
390 | 0 | } |
391 | 0 | return true; |
392 | 0 | } |
393 | | |
394 | | bool LoadEncryptionKey(CWallet* pwallet, DataStream& ssKey, DataStream& ssValue, std::string& strErr) |
395 | 0 | { |
396 | 0 | LOCK(pwallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
397 | 0 | try { |
398 | | // Master encryption key is loaded into only the wallet and not any of the ScriptPubKeyMans. |
399 | 0 | unsigned int nID; |
400 | 0 | ssKey >> nID; |
401 | 0 | CMasterKey kMasterKey; |
402 | 0 | ssValue >> kMasterKey; |
403 | 0 | if(pwallet->mapMasterKeys.contains(nID)) |
404 | 0 | { |
405 | 0 | strErr = strprintf("Error reading wallet database: duplicate CMasterKey id %u", nID);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
406 | 0 | return false; |
407 | 0 | } |
408 | 0 | pwallet->mapMasterKeys[nID] = kMasterKey; |
409 | 0 | if (pwallet->nMasterKeyMaxID < nID) |
410 | 0 | pwallet->nMasterKeyMaxID = nID; |
411 | |
|
412 | 0 | } catch (const std::exception& e) { |
413 | 0 | if (strErr.empty()) { |
414 | 0 | strErr = e.what(); |
415 | 0 | } |
416 | 0 | return false; |
417 | 0 | } |
418 | 0 | return true; |
419 | 0 | } |
420 | | |
421 | | bool LoadHDChain(CWallet* pwallet, DataStream& ssValue, std::string& strErr) |
422 | 0 | { |
423 | 0 | LOCK(pwallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
424 | 0 | try { |
425 | 0 | CHDChain chain; |
426 | 0 | ssValue >> chain; |
427 | 0 | pwallet->GetOrCreateLegacyDataSPKM()->LoadHDChain(chain); |
428 | 0 | } catch (const std::exception& e) { |
429 | 0 | if (strErr.empty()) { |
430 | 0 | strErr = e.what(); |
431 | 0 | } |
432 | 0 | return false; |
433 | 0 | } |
434 | 0 | return true; |
435 | 0 | } |
436 | | |
437 | | static DBErrors LoadWalletFlags(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) |
438 | 0 | { |
439 | 0 | AssertLockHeld(pwallet->cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
440 | 0 | uint64_t flags; |
441 | 0 | if (batch.Read(DBKeys::FLAGS, flags)) { |
442 | 0 | if (!pwallet->LoadWalletFlags(flags)) { |
443 | 0 | pwallet->WalletLogPrintf("Error reading wallet database: Unknown non-tolerable wallet flags found\n"); |
444 | 0 | return DBErrors::TOO_NEW; |
445 | 0 | } |
446 | | // All wallets must be descriptor wallets unless opened with a bdb_ro db |
447 | | // bdb_ro is only used for legacy to descriptor migration. |
448 | 0 | if (pwallet->GetDatabase().Format() != "bdb_ro" && !pwallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) { |
449 | 0 | return DBErrors::LEGACY_WALLET; |
450 | 0 | } |
451 | 0 | } |
452 | 0 | return DBErrors::LOAD_OK; |
453 | 0 | } |
454 | | |
455 | | struct LoadResult |
456 | | { |
457 | | DBErrors m_result{DBErrors::LOAD_OK}; |
458 | | int m_records{0}; |
459 | | }; |
460 | | |
461 | | using LoadFunc = std::function<DBErrors(CWallet* pwallet, DataStream& key, DataStream& value, std::string& err)>; |
462 | | static LoadResult LoadRecords(CWallet* pwallet, DatabaseBatch& batch, const std::string& key, DataStream& prefix, LoadFunc load_func) |
463 | 0 | { |
464 | 0 | LoadResult result; |
465 | 0 | DataStream ssKey; |
466 | 0 | DataStream ssValue{}; |
467 | |
|
468 | 0 | Assume(!prefix.empty()); Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
|
469 | 0 | std::unique_ptr<DatabaseCursor> cursor = batch.GetNewPrefixCursor(prefix); |
470 | 0 | if (!cursor) { |
471 | 0 | pwallet->WalletLogPrintf("Error getting database cursor for '%s' records\n", key); |
472 | 0 | result.m_result = DBErrors::CORRUPT; |
473 | 0 | return result; |
474 | 0 | } |
475 | | |
476 | 0 | while (true) { |
477 | 0 | DatabaseCursor::Status status = cursor->Next(ssKey, ssValue); |
478 | 0 | if (status == DatabaseCursor::Status::DONE) { |
479 | 0 | break; |
480 | 0 | } else if (status == DatabaseCursor::Status::FAIL) { |
481 | 0 | pwallet->WalletLogPrintf("Error reading next '%s' record for wallet database\n", key); |
482 | 0 | result.m_result = DBErrors::CORRUPT; |
483 | 0 | return result; |
484 | 0 | } |
485 | 0 | std::string type; |
486 | 0 | ssKey >> type; |
487 | 0 | assert(type == key); |
488 | 0 | std::string error; |
489 | 0 | DBErrors record_res = load_func(pwallet, ssKey, ssValue, error); |
490 | 0 | if (record_res != DBErrors::LOAD_OK) { |
491 | 0 | pwallet->WalletLogPrintf("%s\n", error); |
492 | 0 | } |
493 | 0 | result.m_result = std::max(result.m_result, record_res); |
494 | 0 | ++result.m_records; |
495 | 0 | } |
496 | 0 | return result; |
497 | 0 | } |
498 | | |
499 | | static LoadResult LoadRecords(CWallet* pwallet, DatabaseBatch& batch, const std::string& key, LoadFunc load_func) |
500 | 0 | { |
501 | 0 | DataStream prefix; |
502 | 0 | prefix << key; |
503 | 0 | return LoadRecords(pwallet, batch, key, prefix, load_func); |
504 | 0 | } |
505 | | |
506 | | bool HasLegacyRecords(CWallet& wallet) |
507 | 0 | { |
508 | 0 | const auto& batch = wallet.GetDatabase().MakeBatch(); |
509 | 0 | return HasLegacyRecords(wallet, *batch); |
510 | 0 | } |
511 | | |
512 | | bool HasLegacyRecords(CWallet& wallet, DatabaseBatch& batch) |
513 | 0 | { |
514 | 0 | for (const auto& type : DBKeys::LEGACY_TYPES) { |
515 | 0 | DataStream key; |
516 | 0 | DataStream value{}; |
517 | 0 | DataStream prefix; |
518 | |
|
519 | 0 | prefix << type; |
520 | 0 | std::unique_ptr<DatabaseCursor> cursor = batch.GetNewPrefixCursor(prefix); |
521 | 0 | if (!cursor) { |
522 | | // Could only happen on a closed db, which means there is an error in the code flow. |
523 | 0 | throw std::runtime_error(strprintf("Error getting database cursor for '%s' records", type));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
524 | 0 | } |
525 | | |
526 | 0 | DatabaseCursor::Status status = cursor->Next(key, value); |
527 | 0 | if (status != DatabaseCursor::Status::DONE) { |
528 | 0 | return true; |
529 | 0 | } |
530 | 0 | } |
531 | 0 | return false; |
532 | 0 | } |
533 | | |
534 | | static DBErrors LoadLegacyWalletRecords(CWallet* pwallet, DatabaseBatch& batch, int last_client) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) |
535 | 0 | { |
536 | 0 | AssertLockHeld(pwallet->cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
537 | 0 | DBErrors result = DBErrors::LOAD_OK; |
538 | | |
539 | | // Make sure descriptor wallets don't have any legacy records |
540 | 0 | if (pwallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) { |
541 | 0 | if (HasLegacyRecords(*pwallet, batch)) { |
542 | 0 | pwallet->WalletLogPrintf("Error: Unexpected legacy entry found in descriptor wallet %s. The wallet might have been tampered with or created with malicious intent.\n", pwallet->GetName()); |
543 | 0 | return DBErrors::UNEXPECTED_LEGACY_ENTRY; |
544 | 0 | } |
545 | | |
546 | 0 | return DBErrors::LOAD_OK; |
547 | 0 | } |
548 | | |
549 | | // Load HD Chain |
550 | | // Note: There should only be one HDCHAIN record with no data following the type |
551 | 0 | LoadResult hd_chain_res = LoadRecords(pwallet, batch, DBKeys::HDCHAIN, |
552 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
553 | 0 | return LoadHDChain(pwallet, value, err) ? DBErrors:: LOAD_OK : DBErrors::CORRUPT; |
554 | 0 | }); |
555 | 0 | result = std::max(result, hd_chain_res.m_result); |
556 | | |
557 | | // Load unencrypted keys |
558 | 0 | LoadResult key_res = LoadRecords(pwallet, batch, DBKeys::KEY, |
559 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
560 | 0 | return LoadKey(pwallet, key, value, err) ? DBErrors::LOAD_OK : DBErrors::CORRUPT; |
561 | 0 | }); |
562 | 0 | result = std::max(result, key_res.m_result); |
563 | | |
564 | | // Load encrypted keys |
565 | 0 | LoadResult ckey_res = LoadRecords(pwallet, batch, DBKeys::CRYPTED_KEY, |
566 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
567 | 0 | return LoadCryptedKey(pwallet, key, value, err) ? DBErrors::LOAD_OK : DBErrors::CORRUPT; |
568 | 0 | }); |
569 | 0 | result = std::max(result, ckey_res.m_result); |
570 | | |
571 | | // Load scripts |
572 | 0 | LoadResult script_res = LoadRecords(pwallet, batch, DBKeys::CSCRIPT, |
573 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) { |
574 | 0 | uint160 hash; |
575 | 0 | key >> hash; |
576 | 0 | CScript script; |
577 | 0 | value >> script; |
578 | 0 | if (!pwallet->GetOrCreateLegacyDataSPKM()->LoadCScript(script)) |
579 | 0 | { |
580 | 0 | strErr = "Error reading wallet database: LegacyDataSPKM::LoadCScript failed"; |
581 | 0 | return DBErrors::NONCRITICAL_ERROR; |
582 | 0 | } |
583 | 0 | return DBErrors::LOAD_OK; |
584 | 0 | }); |
585 | 0 | result = std::max(result, script_res.m_result); |
586 | | |
587 | | // Load keymeta |
588 | 0 | std::map<uint160, CHDChain> hd_chains; |
589 | 0 | LoadResult keymeta_res = LoadRecords(pwallet, batch, DBKeys::KEYMETA, |
590 | 0 | [&hd_chains] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) { |
591 | 0 | CPubKey vchPubKey; |
592 | 0 | key >> vchPubKey; |
593 | 0 | CKeyMetadata keyMeta; |
594 | 0 | value >> keyMeta; |
595 | 0 | pwallet->GetOrCreateLegacyDataSPKM()->LoadKeyMetadata(vchPubKey.GetID(), keyMeta); |
596 | | |
597 | | // Extract some CHDChain info from this metadata if it has any |
598 | 0 | if (keyMeta.nVersion >= CKeyMetadata::VERSION_WITH_HDDATA && !keyMeta.hd_seed_id.IsNull() && keyMeta.hdKeypath.size() > 0) { |
599 | | // Get the path from the key origin or from the path string |
600 | | // Not applicable when path is "s" or "m" as those indicate a seed |
601 | | // See https://github.com/bitcoin/bitcoin/pull/12924 |
602 | 0 | bool internal = false; |
603 | 0 | uint32_t index = 0; |
604 | 0 | if (keyMeta.hdKeypath != "s" && keyMeta.hdKeypath != "m") { |
605 | 0 | std::vector<uint32_t> path; |
606 | 0 | if (keyMeta.has_key_origin) { |
607 | | // We have a key origin, so pull it from its path vector |
608 | 0 | path = keyMeta.key_origin.path; |
609 | 0 | } else { |
610 | | // No key origin, have to parse the string |
611 | 0 | if (!ParseHDKeypath(keyMeta.hdKeypath, path)) { |
612 | 0 | strErr = "Error reading wallet database: keymeta with invalid HD keypath"; |
613 | 0 | return DBErrors::NONCRITICAL_ERROR; |
614 | 0 | } |
615 | 0 | } |
616 | | |
617 | | // Extract the index and internal from the path |
618 | | // Path string is m/0'/k'/i' |
619 | | // Path vector is [0', k', i'] (but as ints OR'd with the hardened bit |
620 | | // k == 0 for external, 1 for internal. i is the index |
621 | 0 | if (path.size() != 3) { |
622 | 0 | strErr = "Error reading wallet database: keymeta found with unexpected path"; |
623 | 0 | return DBErrors::NONCRITICAL_ERROR; |
624 | 0 | } |
625 | 0 | if (path[0] != 0x80000000) { |
626 | 0 | strErr = strprintf("Unexpected path index of 0x%08x (expected 0x80000000) for the element at index 0", path[0]);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
627 | 0 | return DBErrors::NONCRITICAL_ERROR; |
628 | 0 | } |
629 | 0 | if (path[1] != 0x80000000 && path[1] != (1 | 0x80000000)) { |
630 | 0 | strErr = strprintf("Unexpected path index of 0x%08x (expected 0x80000000 or 0x80000001) for the element at index 1", path[1]);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
631 | 0 | return DBErrors::NONCRITICAL_ERROR; |
632 | 0 | } |
633 | 0 | if ((path[2] & 0x80000000) == 0) { |
634 | 0 | strErr = strprintf("Unexpected path index of 0x%08x (expected to be greater than or equal to 0x80000000)", path[2]);Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
635 | 0 | return DBErrors::NONCRITICAL_ERROR; |
636 | 0 | } |
637 | 0 | internal = path[1] == (1 | 0x80000000); |
638 | 0 | index = path[2] & ~0x80000000; |
639 | 0 | } |
640 | | |
641 | | // Insert a new CHDChain, or get the one that already exists |
642 | 0 | auto [ins, inserted] = hd_chains.emplace(keyMeta.hd_seed_id, CHDChain()); |
643 | 0 | CHDChain& chain = ins->second; |
644 | 0 | if (inserted) { |
645 | | // For new chains, we want to default to VERSION_HD_BASE until we see an internal |
646 | 0 | chain.nVersion = CHDChain::VERSION_HD_BASE; |
647 | 0 | chain.seed_id = keyMeta.hd_seed_id; |
648 | 0 | } |
649 | 0 | if (internal) { |
650 | 0 | chain.nVersion = CHDChain::VERSION_HD_CHAIN_SPLIT; |
651 | 0 | chain.nInternalChainCounter = std::max(chain.nInternalChainCounter, index + 1); |
652 | 0 | } else { |
653 | 0 | chain.nExternalChainCounter = std::max(chain.nExternalChainCounter, index + 1); |
654 | 0 | } |
655 | 0 | } |
656 | 0 | return DBErrors::LOAD_OK; |
657 | 0 | }); |
658 | 0 | result = std::max(result, keymeta_res.m_result); |
659 | | |
660 | | // Set inactive chains |
661 | 0 | if (!hd_chains.empty()) { |
662 | 0 | LegacyDataSPKM* legacy_spkm = pwallet->GetLegacyDataSPKM(); |
663 | 0 | if (legacy_spkm) { |
664 | 0 | for (const auto& [hd_seed_id, chain] : hd_chains) { |
665 | 0 | if (hd_seed_id != legacy_spkm->GetHDChain().seed_id) { |
666 | 0 | legacy_spkm->AddInactiveHDChain(chain); |
667 | 0 | } |
668 | 0 | } |
669 | 0 | } else { |
670 | 0 | pwallet->WalletLogPrintf("Inactive HD Chains found but no Legacy ScriptPubKeyMan\n"); |
671 | 0 | result = DBErrors::CORRUPT; |
672 | 0 | } |
673 | 0 | } |
674 | | |
675 | | // Load watchonly scripts |
676 | 0 | LoadResult watch_script_res = LoadRecords(pwallet, batch, DBKeys::WATCHS, |
677 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
678 | 0 | CScript script; |
679 | 0 | key >> script; |
680 | 0 | uint8_t fYes; |
681 | 0 | value >> fYes; |
682 | 0 | if (fYes == '1') { |
683 | 0 | pwallet->GetOrCreateLegacyDataSPKM()->LoadWatchOnly(script); |
684 | 0 | } |
685 | 0 | return DBErrors::LOAD_OK; |
686 | 0 | }); |
687 | 0 | result = std::max(result, watch_script_res.m_result); |
688 | | |
689 | | // Load watchonly meta |
690 | 0 | LoadResult watch_meta_res = LoadRecords(pwallet, batch, DBKeys::WATCHMETA, |
691 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
692 | 0 | CScript script; |
693 | 0 | key >> script; |
694 | 0 | CKeyMetadata keyMeta; |
695 | 0 | value >> keyMeta; |
696 | 0 | pwallet->GetOrCreateLegacyDataSPKM()->LoadScriptMetadata(CScriptID(script), keyMeta); |
697 | 0 | return DBErrors::LOAD_OK; |
698 | 0 | }); |
699 | 0 | result = std::max(result, watch_meta_res.m_result); |
700 | | |
701 | | // Deal with old "wkey" and "defaultkey" records. |
702 | | // These are not actually loaded, but we need to check for them |
703 | | |
704 | | // We don't want or need the default key, but if there is one set, |
705 | | // we want to make sure that it is valid so that we can detect corruption |
706 | | // Note: There should only be one DEFAULTKEY with nothing trailing the type |
707 | 0 | LoadResult default_key_res = LoadRecords(pwallet, batch, DBKeys::DEFAULTKEY, |
708 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
709 | 0 | CPubKey default_pubkey; |
710 | 0 | try { |
711 | 0 | value >> default_pubkey; |
712 | 0 | } catch (const std::exception& e) { |
713 | 0 | err = e.what(); |
714 | 0 | return DBErrors::CORRUPT; |
715 | 0 | } |
716 | 0 | if (!default_pubkey.IsValid()) { |
717 | 0 | err = "Error reading wallet database: Default Key corrupt"; |
718 | 0 | return DBErrors::CORRUPT; |
719 | 0 | } |
720 | 0 | return DBErrors::LOAD_OK; |
721 | 0 | }); |
722 | 0 | result = std::max(result, default_key_res.m_result); |
723 | | |
724 | | // "wkey" records are unsupported, if we see any, throw an error |
725 | 0 | LoadResult wkey_res = LoadRecords(pwallet, batch, DBKeys::OLD_KEY, |
726 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
727 | 0 | err = "Found unsupported 'wkey' record, try loading with version 0.18"; |
728 | 0 | return DBErrors::LOAD_FAIL; |
729 | 0 | }); |
730 | 0 | result = std::max(result, wkey_res.m_result); |
731 | |
|
732 | 0 | if (result <= DBErrors::NONCRITICAL_ERROR) { |
733 | | // Only do logging and time first key update if there were no critical errors |
734 | 0 | pwallet->WalletLogPrintf("Legacy Wallet Keys: %u plaintext, %u encrypted, %u w/ metadata, %u total.\n", |
735 | 0 | key_res.m_records, ckey_res.m_records, keymeta_res.m_records, key_res.m_records + ckey_res.m_records); |
736 | 0 | } |
737 | |
|
738 | 0 | return result; |
739 | 0 | } |
740 | | |
741 | | template<typename... Args> |
742 | | static DataStream PrefixStream(const Args&... args) |
743 | 0 | { |
744 | 0 | DataStream prefix; |
745 | 0 | SerializeMany(prefix, args...); |
746 | 0 | return prefix; |
747 | 0 | } |
748 | | |
749 | | static DBErrors LoadDescriptorWalletRecords(CWallet* pwallet, DatabaseBatch& batch, int last_client) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) |
750 | 0 | { |
751 | 0 | AssertLockHeld(pwallet->cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
752 | | |
753 | | // Load descriptor record |
754 | 0 | int num_keys = 0; |
755 | 0 | int num_ckeys= 0; |
756 | 0 | LoadResult desc_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTOR, |
757 | 0 | [&batch, &num_keys, &num_ckeys, &last_client] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) { |
758 | 0 | DBErrors result = DBErrors::LOAD_OK; |
759 | |
|
760 | 0 | uint256 id; |
761 | 0 | key >> id; |
762 | 0 | WalletDescriptor desc; |
763 | 0 | try { |
764 | 0 | value >> desc; |
765 | 0 | } catch (const std::ios_base::failure& e) { |
766 | 0 | strErr = strprintf("Error: Unrecognized descriptor found in wallet %s. ", pwallet->GetName());Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
767 | 0 | strErr += (last_client > CLIENT_VERSION) ? "The wallet might have been created on a newer version. " : |
768 | 0 | "The database might be corrupted or the software version is not compatible with one of your wallet descriptors. "; |
769 | 0 | strErr += "Please try running the latest software version"; |
770 | | // Also include error details |
771 | 0 | strErr = strprintf("%s\nDetails: %s", strErr, e.what());Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
772 | 0 | return DBErrors::UNKNOWN_DESCRIPTOR; |
773 | 0 | } |
774 | 0 | DescriptorScriptPubKeyMan& spkm = pwallet->LoadDescriptorScriptPubKeyMan(id, desc); |
775 | | |
776 | | // Prior to doing anything with this spkm, verify ID compatibility |
777 | 0 | if (id != spkm.GetID()) { |
778 | 0 | strErr = "The descriptor ID calculated by the wallet differs from the one in DB"; |
779 | 0 | return DBErrors::CORRUPT; |
780 | 0 | } |
781 | | |
782 | 0 | DescriptorCache cache; |
783 | | |
784 | | // Get key cache for this descriptor |
785 | 0 | DataStream prefix = PrefixStream(DBKeys::WALLETDESCRIPTORCACHE, id); |
786 | 0 | LoadResult key_cache_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORCACHE, prefix, |
787 | 0 | [&id, &cache] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
788 | 0 | bool parent = true; |
789 | 0 | uint256 desc_id; |
790 | 0 | uint32_t key_exp_index; |
791 | 0 | uint32_t der_index; |
792 | 0 | key >> desc_id; |
793 | 0 | assert(desc_id == id); |
794 | 0 | key >> key_exp_index; |
795 | | |
796 | | // if the der_index exists, it's a derived xpub |
797 | 0 | try |
798 | 0 | { |
799 | 0 | key >> der_index; |
800 | 0 | parent = false; |
801 | 0 | } |
802 | 0 | catch (...) {} |
803 | |
|
804 | 0 | std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE); |
805 | 0 | value >> ser_xpub; |
806 | 0 | CExtPubKey xpub; |
807 | 0 | xpub.Decode(ser_xpub.data()); |
808 | 0 | if (parent) { |
809 | 0 | cache.CacheParentExtPubKey(key_exp_index, xpub); |
810 | 0 | } else { |
811 | 0 | cache.CacheDerivedExtPubKey(key_exp_index, der_index, xpub); |
812 | 0 | } |
813 | 0 | return DBErrors::LOAD_OK; |
814 | 0 | }); |
815 | 0 | result = std::max(result, key_cache_res.m_result); |
816 | | |
817 | | // Get last hardened cache for this descriptor |
818 | 0 | prefix = PrefixStream(DBKeys::WALLETDESCRIPTORLHCACHE, id); |
819 | 0 | LoadResult lh_cache_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORLHCACHE, prefix, |
820 | 0 | [&id, &cache] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
821 | 0 | uint256 desc_id; |
822 | 0 | uint32_t key_exp_index; |
823 | 0 | key >> desc_id; |
824 | 0 | assert(desc_id == id); |
825 | 0 | key >> key_exp_index; |
826 | |
|
827 | 0 | std::vector<unsigned char> ser_xpub(BIP32_EXTKEY_SIZE); |
828 | 0 | value >> ser_xpub; |
829 | 0 | CExtPubKey xpub; |
830 | 0 | xpub.Decode(ser_xpub.data()); |
831 | 0 | cache.CacheLastHardenedExtPubKey(key_exp_index, xpub); |
832 | 0 | return DBErrors::LOAD_OK; |
833 | 0 | }); |
834 | 0 | result = std::max(result, lh_cache_res.m_result); |
835 | | |
836 | | // Set the cache for this descriptor |
837 | 0 | auto spk_man = (DescriptorScriptPubKeyMan*)pwallet->GetScriptPubKeyMan(id); |
838 | 0 | assert(spk_man); |
839 | 0 | spk_man->SetCache(cache); |
840 | | |
841 | | // Get unencrypted keys |
842 | 0 | prefix = PrefixStream(DBKeys::WALLETDESCRIPTORKEY, id); |
843 | 0 | LoadResult key_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORKEY, prefix, |
844 | 0 | [&id, &spk_man] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) { |
845 | 0 | uint256 desc_id; |
846 | 0 | CPubKey pubkey; |
847 | 0 | key >> desc_id; |
848 | 0 | assert(desc_id == id); |
849 | 0 | key >> pubkey; |
850 | 0 | if (!pubkey.IsValid()) |
851 | 0 | { |
852 | 0 | strErr = "Error reading wallet database: descriptor unencrypted key CPubKey corrupt"; |
853 | 0 | return DBErrors::CORRUPT; |
854 | 0 | } |
855 | 0 | CKey privkey; |
856 | 0 | CPrivKey pkey; |
857 | 0 | uint256 hash; |
858 | |
|
859 | 0 | value >> pkey; |
860 | 0 | value >> hash; |
861 | | |
862 | | // hash pubkey/privkey to accelerate wallet load |
863 | 0 | const auto keypair_hash = Hash(pubkey, pkey); |
864 | |
|
865 | 0 | if (keypair_hash != hash) |
866 | 0 | { |
867 | 0 | strErr = "Error reading wallet database: descriptor unencrypted key CPubKey/CPrivKey corrupt"; |
868 | 0 | return DBErrors::CORRUPT; |
869 | 0 | } |
870 | | |
871 | 0 | if (!privkey.Load(pkey, pubkey, true)) |
872 | 0 | { |
873 | 0 | strErr = "Error reading wallet database: descriptor unencrypted key CPrivKey corrupt"; |
874 | 0 | return DBErrors::CORRUPT; |
875 | 0 | } |
876 | 0 | spk_man->AddKey(pubkey.GetID(), privkey); |
877 | 0 | return DBErrors::LOAD_OK; |
878 | 0 | }); |
879 | 0 | result = std::max(result, key_res.m_result); |
880 | 0 | num_keys = key_res.m_records; |
881 | | |
882 | | // Get encrypted keys |
883 | 0 | prefix = PrefixStream(DBKeys::WALLETDESCRIPTORCKEY, id); |
884 | 0 | LoadResult ckey_res = LoadRecords(pwallet, batch, DBKeys::WALLETDESCRIPTORCKEY, prefix, |
885 | 0 | [&id, &spk_man] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
886 | 0 | uint256 desc_id; |
887 | 0 | CPubKey pubkey; |
888 | 0 | key >> desc_id; |
889 | 0 | assert(desc_id == id); |
890 | 0 | key >> pubkey; |
891 | 0 | if (!pubkey.IsValid()) |
892 | 0 | { |
893 | 0 | err = "Error reading wallet database: descriptor encrypted key CPubKey corrupt"; |
894 | 0 | return DBErrors::CORRUPT; |
895 | 0 | } |
896 | 0 | std::vector<unsigned char> privkey; |
897 | 0 | value >> privkey; |
898 | |
|
899 | 0 | spk_man->AddCryptedKey(pubkey.GetID(), pubkey, privkey); |
900 | 0 | return DBErrors::LOAD_OK; |
901 | 0 | }); |
902 | 0 | result = std::max(result, ckey_res.m_result); |
903 | 0 | num_ckeys = ckey_res.m_records; |
904 | |
|
905 | 0 | return result; |
906 | 0 | }); |
907 | |
|
908 | 0 | if (desc_res.m_result <= DBErrors::NONCRITICAL_ERROR) { |
909 | | // Only log if there are no critical errors |
910 | 0 | pwallet->WalletLogPrintf("Descriptors: %u, Descriptor Keys: %u plaintext, %u encrypted, %u total.\n", |
911 | 0 | desc_res.m_records, num_keys, num_ckeys, num_keys + num_ckeys); |
912 | 0 | } |
913 | |
|
914 | 0 | return desc_res.m_result; |
915 | 0 | } |
916 | | |
917 | | static DBErrors LoadAddressBookRecords(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) |
918 | 0 | { |
919 | 0 | AssertLockHeld(pwallet->cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
920 | 0 | DBErrors result = DBErrors::LOAD_OK; |
921 | | |
922 | | // Load name record |
923 | 0 | LoadResult name_res = LoadRecords(pwallet, batch, DBKeys::NAME, |
924 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) { |
925 | 0 | std::string strAddress; |
926 | 0 | key >> strAddress; |
927 | 0 | std::string label; |
928 | 0 | value >> label; |
929 | 0 | pwallet->m_address_book[DecodeDestination(strAddress)].SetLabel(label); |
930 | 0 | return DBErrors::LOAD_OK; |
931 | 0 | }); |
932 | 0 | result = std::max(result, name_res.m_result); |
933 | | |
934 | | // Load purpose record |
935 | 0 | LoadResult purpose_res = LoadRecords(pwallet, batch, DBKeys::PURPOSE, |
936 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) { |
937 | 0 | std::string strAddress; |
938 | 0 | key >> strAddress; |
939 | 0 | std::string purpose_str; |
940 | 0 | value >> purpose_str; |
941 | 0 | std::optional<AddressPurpose> purpose{PurposeFromString(purpose_str)}; |
942 | 0 | if (!purpose) { |
943 | 0 | pwallet->WalletLogPrintf("Warning: nonstandard purpose string '%s' for address '%s'\n", purpose_str, strAddress); |
944 | 0 | } |
945 | 0 | pwallet->m_address_book[DecodeDestination(strAddress)].purpose = purpose; |
946 | 0 | return DBErrors::LOAD_OK; |
947 | 0 | }); |
948 | 0 | result = std::max(result, purpose_res.m_result); |
949 | | |
950 | | // Load destination data record |
951 | 0 | LoadResult dest_res = LoadRecords(pwallet, batch, DBKeys::DESTDATA, |
952 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) { |
953 | 0 | std::string strAddress, strKey, strValue; |
954 | 0 | key >> strAddress; |
955 | 0 | key >> strKey; |
956 | 0 | value >> strValue; |
957 | 0 | const CTxDestination& dest{DecodeDestination(strAddress)}; |
958 | 0 | if (strKey.compare("used") == 0) { |
959 | | // Load "used" key indicating if an IsMine address has |
960 | | // previously been spent from with avoid_reuse option enabled. |
961 | | // The strValue is not used for anything currently, but could |
962 | | // hold more information in the future. Current values are just |
963 | | // "1" or "p" for present (which was written prior to |
964 | | // f5ba424cd44619d9b9be88b8593d69a7ba96db26). |
965 | 0 | pwallet->LoadAddressPreviouslySpent(dest); |
966 | 0 | } else if (strKey.starts_with("rr")) { |
967 | | // Load "rr##" keys where ## is a decimal number, and strValue |
968 | | // is a serialized RecentRequestEntry object. |
969 | 0 | pwallet->LoadAddressReceiveRequest(dest, strKey.substr(2), strValue); |
970 | 0 | } |
971 | 0 | return DBErrors::LOAD_OK; |
972 | 0 | }); |
973 | 0 | result = std::max(result, dest_res.m_result); |
974 | |
|
975 | 0 | return result; |
976 | 0 | } |
977 | | |
978 | | static DBErrors LoadTxRecords(CWallet* pwallet, DatabaseBatch& batch, bool& any_unordered) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) |
979 | 0 | { |
980 | 0 | AssertLockHeld(pwallet->cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
981 | 0 | DBErrors result = DBErrors::LOAD_OK; |
982 | | |
983 | | // Load tx record |
984 | 0 | any_unordered = false; |
985 | 0 | LoadResult tx_res = LoadRecords(pwallet, batch, DBKeys::TX, |
986 | 0 | [&any_unordered] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) { |
987 | 0 | DBErrors result = DBErrors::LOAD_OK; |
988 | 0 | Txid hash; |
989 | 0 | key >> hash; |
990 | | // LoadToWallet call below creates a new CWalletTx that fill_wtx |
991 | | // callback fills with transaction metadata. |
992 | 0 | auto fill_wtx = [&](CWalletTx& wtx, bool new_tx) { |
993 | 0 | if(!new_tx) { |
994 | | // There's some corruption here since the tx we just tried to load was already in the wallet. |
995 | 0 | err = "Error: Corrupt transaction found. This can be fixed by removing transactions from wallet and rescanning."; |
996 | 0 | result = DBErrors::CORRUPT; |
997 | 0 | return false; |
998 | 0 | } |
999 | 0 | value >> wtx; |
1000 | 0 | if (wtx.GetHash() != hash) |
1001 | 0 | return false; |
1002 | | |
1003 | 0 | if (wtx.nOrderPos == -1) |
1004 | 0 | any_unordered = true; |
1005 | |
|
1006 | 0 | return true; |
1007 | 0 | }; |
1008 | 0 | if (!pwallet->LoadToWallet(hash, fill_wtx)) { |
1009 | | // Use std::max as fill_wtx may have already set result to CORRUPT |
1010 | 0 | result = std::max(result, DBErrors::NEED_RESCAN); |
1011 | 0 | } |
1012 | 0 | return result; |
1013 | 0 | }); |
1014 | 0 | result = std::max(result, tx_res.m_result); |
1015 | | |
1016 | | // Load locked utxo record |
1017 | 0 | LoadResult locked_utxo_res = LoadRecords(pwallet, batch, DBKeys::LOCKED_UTXO, |
1018 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) { |
1019 | 0 | Txid hash; |
1020 | 0 | uint32_t n; |
1021 | 0 | key >> hash; |
1022 | 0 | key >> n; |
1023 | 0 | pwallet->LoadLockedCoin(COutPoint(hash, n), /*persistent=*/true); |
1024 | 0 | return DBErrors::LOAD_OK; |
1025 | 0 | }); |
1026 | 0 | result = std::max(result, locked_utxo_res.m_result); |
1027 | | |
1028 | | // Load orderposnext record |
1029 | | // Note: There should only be one ORDERPOSNEXT record with nothing trailing the type |
1030 | 0 | LoadResult order_pos_res = LoadRecords(pwallet, batch, DBKeys::ORDERPOSNEXT, |
1031 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) { |
1032 | 0 | try { |
1033 | 0 | value >> pwallet->nOrderPosNext; |
1034 | 0 | } catch (const std::exception& e) { |
1035 | 0 | err = e.what(); |
1036 | 0 | return DBErrors::NONCRITICAL_ERROR; |
1037 | 0 | } |
1038 | 0 | return DBErrors::LOAD_OK; |
1039 | 0 | }); |
1040 | 0 | result = std::max(result, order_pos_res.m_result); |
1041 | | |
1042 | | // After loading all tx records, abandon any coinbase that is no longer in the active chain. |
1043 | | // This could happen during an external wallet load, or if the user replaced the chain data. |
1044 | 0 | for (auto& [id, wtx] : pwallet->mapWallet) { |
1045 | 0 | if (wtx.IsCoinBase() && wtx.isInactive()) { |
1046 | 0 | pwallet->AbandonTransaction(wtx); |
1047 | 0 | } |
1048 | 0 | } |
1049 | |
|
1050 | 0 | return result; |
1051 | 0 | } |
1052 | | |
1053 | | static DBErrors LoadActiveSPKMs(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) |
1054 | 0 | { |
1055 | 0 | AssertLockHeld(pwallet->cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1056 | 0 | DBErrors result = DBErrors::LOAD_OK; |
1057 | | |
1058 | | // Load spk records |
1059 | 0 | std::set<std::pair<OutputType, bool>> seen_spks; |
1060 | 0 | for (const auto& spk_key : {DBKeys::ACTIVEEXTERNALSPK, DBKeys::ACTIVEINTERNALSPK}) { |
1061 | 0 | LoadResult spkm_res = LoadRecords(pwallet, batch, spk_key, |
1062 | 0 | [&seen_spks, &spk_key] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& strErr) { |
1063 | 0 | uint8_t output_type; |
1064 | 0 | key >> output_type; |
1065 | 0 | uint256 id; |
1066 | 0 | value >> id; |
1067 | |
|
1068 | 0 | bool internal = spk_key == DBKeys::ACTIVEINTERNALSPK; |
1069 | 0 | auto [it, insert] = seen_spks.emplace(static_cast<OutputType>(output_type), internal); |
1070 | 0 | if (!insert) { |
1071 | 0 | strErr = "Multiple ScriptpubKeyMans specified for a single type"; |
1072 | 0 | return DBErrors::CORRUPT; |
1073 | 0 | } |
1074 | 0 | pwallet->LoadActiveScriptPubKeyMan(id, static_cast<OutputType>(output_type), /*internal=*/internal); |
1075 | 0 | return DBErrors::LOAD_OK; |
1076 | 0 | }); |
1077 | 0 | result = std::max(result, spkm_res.m_result); |
1078 | 0 | } |
1079 | 0 | return result; |
1080 | 0 | } |
1081 | | |
1082 | | static DBErrors LoadDecryptionKeys(CWallet* pwallet, DatabaseBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(pwallet->cs_wallet) |
1083 | 0 | { |
1084 | 0 | AssertLockHeld(pwallet->cs_wallet); Line | Count | Source | 142 | 0 | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
1085 | | |
1086 | | // Load decryption key (mkey) records |
1087 | 0 | LoadResult mkey_res = LoadRecords(pwallet, batch, DBKeys::MASTER_KEY, |
1088 | 0 | [] (CWallet* pwallet, DataStream& key, DataStream& value, std::string& err) { |
1089 | 0 | if (!LoadEncryptionKey(pwallet, key, value, err)) { |
1090 | 0 | return DBErrors::CORRUPT; |
1091 | 0 | } |
1092 | 0 | return DBErrors::LOAD_OK; |
1093 | 0 | }); |
1094 | 0 | return mkey_res.m_result; |
1095 | 0 | } |
1096 | | |
1097 | | DBErrors WalletBatch::LoadWallet(CWallet* pwallet) |
1098 | 0 | { |
1099 | 0 | DBErrors result = DBErrors::LOAD_OK; |
1100 | 0 | bool any_unordered = false; |
1101 | |
|
1102 | 0 | LOCK(pwallet->cs_wallet); Line | Count | Source | 266 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1103 | | |
1104 | | // Last client version to open this wallet |
1105 | 0 | int last_client = CLIENT_VERSION; |
1106 | 0 | bool has_last_client = m_batch->Read(DBKeys::VERSION, last_client); |
1107 | 0 | if (has_last_client) pwallet->WalletLogPrintf("Last client version = %d\n", last_client); |
1108 | |
|
1109 | 0 | try { |
1110 | | // Load wallet flags, so they are known when processing other records. |
1111 | | // The FLAGS key is absent during wallet creation. |
1112 | 0 | if ((result = LoadWalletFlags(pwallet, *m_batch)) != DBErrors::LOAD_OK) return result; |
1113 | | |
1114 | 0 | #ifndef ENABLE_EXTERNAL_SIGNER |
1115 | 0 | if (pwallet->IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) { |
1116 | 0 | pwallet->WalletLogPrintf("Error: External signer wallet being loaded without external signer support compiled\n"); |
1117 | 0 | return DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED; |
1118 | 0 | } |
1119 | 0 | #endif |
1120 | | |
1121 | | // Load legacy wallet keys |
1122 | 0 | result = std::max(LoadLegacyWalletRecords(pwallet, *m_batch, last_client), result); |
1123 | | |
1124 | | // Load descriptors |
1125 | 0 | result = std::max(LoadDescriptorWalletRecords(pwallet, *m_batch, last_client), result); |
1126 | | // Early return if there are unknown descriptors. Later loading of ACTIVEINTERNALSPK and ACTIVEEXTERNALEXPK |
1127 | | // may reference the unknown descriptor's ID which can result in a misleading corruption error |
1128 | | // when in reality the wallet is simply too new. |
1129 | 0 | if (result == DBErrors::UNKNOWN_DESCRIPTOR) return result; |
1130 | | |
1131 | | // Load address book |
1132 | 0 | result = std::max(LoadAddressBookRecords(pwallet, *m_batch), result); |
1133 | | |
1134 | | // Load SPKMs |
1135 | 0 | result = std::max(LoadActiveSPKMs(pwallet, *m_batch), result); |
1136 | | |
1137 | | // Load decryption keys |
1138 | 0 | result = std::max(LoadDecryptionKeys(pwallet, *m_batch), result); |
1139 | | |
1140 | | // Load tx records |
1141 | 0 | result = std::max(LoadTxRecords(pwallet, *m_batch, any_unordered), result); |
1142 | 0 | } catch (std::runtime_error& e) { |
1143 | | // Exceptions that can be ignored or treated as non-critical are handled by the individual loading functions. |
1144 | | // Any uncaught exceptions will be caught here and treated as critical. |
1145 | | // Catch std::runtime_error specifically as many functions throw these and they at least have some message that |
1146 | | // we can log |
1147 | 0 | pwallet->WalletLogPrintf("%s\n", e.what()); |
1148 | 0 | result = DBErrors::CORRUPT; |
1149 | 0 | } catch (...) { |
1150 | | // All other exceptions are still problematic, but we can't log them |
1151 | 0 | result = DBErrors::CORRUPT; |
1152 | 0 | } |
1153 | | |
1154 | | // Any wallet corruption at all: skip any rewriting or |
1155 | | // upgrading, we don't want to make it worse. |
1156 | 0 | if (result != DBErrors::LOAD_OK) |
1157 | 0 | return result; |
1158 | | |
1159 | 0 | if (!has_last_client || last_client != CLIENT_VERSION) // Update |
1160 | 0 | this->WriteVersion(CLIENT_VERSION); |
1161 | |
|
1162 | 0 | if (any_unordered) |
1163 | 0 | result = pwallet->ReorderTransactions(); |
1164 | | |
1165 | | // Upgrade all of the descriptor caches to cache the last hardened xpub |
1166 | | // This operation is not atomic, but if it fails, only new entries are added so it is backwards compatible |
1167 | 0 | try { |
1168 | 0 | pwallet->UpgradeDescriptorCache(); |
1169 | 0 | } catch (...) { |
1170 | 0 | result = DBErrors::CORRUPT; |
1171 | 0 | } |
1172 | | |
1173 | | // Since it was accidentally possible to "encrypt" a wallet with private keys disabled, we should check if this is |
1174 | | // such a wallet and remove the encryption key records to avoid any future issues. |
1175 | | // Although wallets without private keys should not have *ckey records, we should double check that. |
1176 | | // Removing the mkey records is only safe if there are no *ckey records. |
1177 | 0 | if (pwallet->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) && pwallet->HasEncryptionKeys() && !pwallet->HaveCryptedKeys()) { |
1178 | 0 | pwallet->WalletLogPrintf("Detected extraneous encryption keys in this wallet without private keys. Removing extraneous encryption keys.\n"); |
1179 | 0 | for (const auto& [id, _] : pwallet->mapMasterKeys) { |
1180 | 0 | if (!EraseMasterKey(id)) { |
1181 | 0 | pwallet->WalletLogPrintf("Error: Unable to remove extraneous encryption key '%u'. Wallet corrupt.\n", id); |
1182 | 0 | return DBErrors::CORRUPT; |
1183 | 0 | } |
1184 | 0 | } |
1185 | 0 | pwallet->mapMasterKeys.clear(); |
1186 | 0 | } |
1187 | | |
1188 | 0 | return result; |
1189 | 0 | } |
1190 | | |
1191 | | static bool RunWithinTxn(WalletBatch& batch, std::string_view process_desc, const std::function<bool(WalletBatch&)>& func) |
1192 | 0 | { |
1193 | 0 | if (!batch.TxnBegin()) { |
1194 | 0 | LogDebug(BCLog::WALLETDB, "Error: cannot create db txn for %s\n", process_desc); Line | Count | Source | 115 | 0 | #define LogDebug(category, ...) detail_LogIfCategoryAndLevelEnabled(category, BCLog::Level::Debug, __VA_ARGS__) Line | Count | Source | 106 | 0 | do { \ | 107 | 0 | if (util::log::ShouldLog((category), (level))) { \ | 108 | 0 | bool rate_limit{level >= BCLog::Level::Info}; \ | 109 | 0 | Assume(!rate_limit); /*Only called with the levels below*/ \ Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
| 110 | 0 | LogPrintLevel_(category, level, rate_limit, __VA_ARGS__); \ Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
| 111 | 0 | } \ | 112 | 0 | } while (0) |
|
|
1195 | 0 | return false; |
1196 | 0 | } |
1197 | | |
1198 | | // Run procedure |
1199 | 0 | if (!func(batch)) { |
1200 | 0 | LogDebug(BCLog::WALLETDB, "Error: %s failed\n", process_desc); Line | Count | Source | 115 | 0 | #define LogDebug(category, ...) detail_LogIfCategoryAndLevelEnabled(category, BCLog::Level::Debug, __VA_ARGS__) Line | Count | Source | 106 | 0 | do { \ | 107 | 0 | if (util::log::ShouldLog((category), (level))) { \ | 108 | 0 | bool rate_limit{level >= BCLog::Level::Info}; \ | 109 | 0 | Assume(!rate_limit); /*Only called with the levels below*/ \ Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
| 110 | 0 | LogPrintLevel_(category, level, rate_limit, __VA_ARGS__); \ Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
| 111 | 0 | } \ | 112 | 0 | } while (0) |
|
|
1201 | 0 | batch.TxnAbort(); |
1202 | 0 | return false; |
1203 | 0 | } |
1204 | | |
1205 | 0 | if (!batch.TxnCommit()) { |
1206 | 0 | LogDebug(BCLog::WALLETDB, "Error: cannot commit db txn for %s\n", process_desc); Line | Count | Source | 115 | 0 | #define LogDebug(category, ...) detail_LogIfCategoryAndLevelEnabled(category, BCLog::Level::Debug, __VA_ARGS__) Line | Count | Source | 106 | 0 | do { \ | 107 | 0 | if (util::log::ShouldLog((category), (level))) { \ | 108 | 0 | bool rate_limit{level >= BCLog::Level::Info}; \ | 109 | 0 | Assume(!rate_limit); /*Only called with the levels below*/ \ Line | Count | Source | 125 | 0 | #define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val) |
| 110 | 0 | LogPrintLevel_(category, level, rate_limit, __VA_ARGS__); \ Line | Count | Source | 89 | 0 | #define LogPrintLevel_(category, level, should_ratelimit, ...) LogPrintFormatInternal(SourceLocation{__func__}, category, level, should_ratelimit, __VA_ARGS__) |
| 111 | 0 | } \ | 112 | 0 | } while (0) |
|
|
1207 | 0 | return false; |
1208 | 0 | } |
1209 | | |
1210 | | // All good |
1211 | 0 | return true; |
1212 | 0 | } |
1213 | | |
1214 | | bool RunWithinTxn(WalletDatabase& database, std::string_view process_desc, const std::function<bool(WalletBatch&)>& func) |
1215 | 0 | { |
1216 | 0 | WalletBatch batch(database); |
1217 | 0 | return RunWithinTxn(batch, process_desc, func); |
1218 | 0 | } |
1219 | | |
1220 | | bool WalletBatch::WriteAddressPreviouslySpent(const CTxDestination& dest, bool previously_spent) |
1221 | 0 | { |
1222 | 0 | auto key{std::make_pair(DBKeys::DESTDATA, std::make_pair(EncodeDestination(dest), std::string("used")))}; |
1223 | 0 | return previously_spent ? WriteIC(key, std::string("1")) : EraseIC(key); |
1224 | 0 | } |
1225 | | |
1226 | | bool WalletBatch::WriteAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& receive_request) |
1227 | 0 | { |
1228 | 0 | return WriteIC(std::make_pair(DBKeys::DESTDATA, std::make_pair(EncodeDestination(dest), "rr" + id)), receive_request); |
1229 | 0 | } |
1230 | | |
1231 | | bool WalletBatch::EraseAddressReceiveRequest(const CTxDestination& dest, const std::string& id) |
1232 | 0 | { |
1233 | 0 | return EraseIC(std::make_pair(DBKeys::DESTDATA, std::make_pair(EncodeDestination(dest), "rr" + id))); |
1234 | 0 | } |
1235 | | |
1236 | | bool WalletBatch::EraseAddressData(const CTxDestination& dest) |
1237 | 0 | { |
1238 | 0 | DataStream prefix; |
1239 | 0 | prefix << DBKeys::DESTDATA << EncodeDestination(dest); |
1240 | 0 | return m_batch->ErasePrefix(prefix); |
1241 | 0 | } |
1242 | | |
1243 | | bool WalletBatch::WriteWalletFlags(const uint64_t flags) |
1244 | 0 | { |
1245 | 0 | return WriteIC(DBKeys::FLAGS, flags); |
1246 | 0 | } |
1247 | | |
1248 | | bool WalletBatch::EraseRecords(const std::unordered_set<std::string>& types) |
1249 | 0 | { |
1250 | 0 | return std::all_of(types.begin(), types.end(), [&](const std::string& type) { |
1251 | 0 | return m_batch->ErasePrefix(DataStream() << type); |
1252 | 0 | }); |
1253 | 0 | } |
1254 | | |
1255 | | bool WalletBatch::TxnBegin() |
1256 | 0 | { |
1257 | 0 | return m_batch->TxnBegin(); |
1258 | 0 | } |
1259 | | |
1260 | | bool WalletBatch::TxnCommit() |
1261 | 0 | { |
1262 | 0 | bool res = m_batch->TxnCommit(); |
1263 | 0 | if (res) { |
1264 | 0 | for (const auto& listener : m_txn_listeners) { |
1265 | 0 | listener.on_commit(); |
1266 | 0 | } |
1267 | | // txn finished, clear listeners |
1268 | 0 | m_txn_listeners.clear(); |
1269 | 0 | } |
1270 | 0 | return res; |
1271 | 0 | } |
1272 | | |
1273 | | bool WalletBatch::TxnAbort() |
1274 | 0 | { |
1275 | 0 | bool res = m_batch->TxnAbort(); |
1276 | 0 | if (res) { |
1277 | 0 | for (const auto& listener : m_txn_listeners) { |
1278 | 0 | listener.on_abort(); |
1279 | 0 | } |
1280 | | // txn finished, clear listeners |
1281 | 0 | m_txn_listeners.clear(); |
1282 | 0 | } |
1283 | 0 | return res; |
1284 | 0 | } |
1285 | | |
1286 | | void WalletBatch::RegisterTxnListener(const DbTxnListener& l) |
1287 | 0 | { |
1288 | 0 | assert(m_batch->HasActiveTxn()); |
1289 | 0 | m_txn_listeners.emplace_back(l); |
1290 | 0 | } |
1291 | | |
1292 | | std::unique_ptr<WalletDatabase> MakeDatabase(const fs::path& path, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error) |
1293 | 0 | { |
1294 | 0 | bool exists; |
1295 | 0 | try { |
1296 | 0 | exists = fs::symlink_status(path).type() != fs::file_type::not_found; |
1297 | 0 | } catch (const fs::filesystem_error& e) { |
1298 | 0 | error = Untranslated(strprintf("Failed to access database path '%s': %s", fs::PathToString(path), e.code().message()));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1299 | 0 | status = DatabaseStatus::FAILED_BAD_PATH; |
1300 | 0 | return nullptr; |
1301 | 0 | } |
1302 | | |
1303 | 0 | std::optional<DatabaseFormat> format; |
1304 | 0 | if (exists) { |
1305 | 0 | if (IsBDBFile(BDBDataFile(path))) { |
1306 | 0 | format = DatabaseFormat::BERKELEY_RO; |
1307 | 0 | } |
1308 | 0 | if (IsSQLiteFile(SQLiteDataFile(path))) { |
1309 | 0 | if (format) { |
1310 | 0 | error = Untranslated(strprintf("Failed to load database path '%s'. Data is in ambiguous format.", fs::PathToString(path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1311 | 0 | status = DatabaseStatus::FAILED_BAD_FORMAT; |
1312 | 0 | return nullptr; |
1313 | 0 | } |
1314 | 0 | format = DatabaseFormat::SQLITE; |
1315 | 0 | } |
1316 | 0 | } else if (options.require_existing) { |
1317 | 0 | error = Untranslated(strprintf("Failed to load database path '%s'. Path does not exist.", fs::PathToString(path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1318 | 0 | status = DatabaseStatus::FAILED_NOT_FOUND; |
1319 | 0 | return nullptr; |
1320 | 0 | } |
1321 | | |
1322 | 0 | if (!format && options.require_existing) { |
1323 | 0 | error = Untranslated(strprintf("Failed to load database path '%s'. Data is not in recognized format.", fs::PathToString(path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1324 | 0 | status = DatabaseStatus::FAILED_BAD_FORMAT; |
1325 | 0 | return nullptr; |
1326 | 0 | } |
1327 | | |
1328 | 0 | if (format && options.require_create) { |
1329 | 0 | error = Untranslated(strprintf("Failed to create database path '%s'. Database already exists.", fs::PathToString(path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1330 | 0 | status = DatabaseStatus::FAILED_ALREADY_EXISTS; |
1331 | 0 | return nullptr; |
1332 | 0 | } |
1333 | | |
1334 | | // BERKELEY_RO can only be opened if require_format was set, which only occurs in migration. |
1335 | 0 | if (format && format == DatabaseFormat::BERKELEY_RO && (!options.require_format || options.require_format != DatabaseFormat::BERKELEY_RO)) { |
1336 | 0 | error = Untranslated(strprintf("Failed to open database path '%s'. The wallet appears to be a Legacy wallet, please use the wallet migration tool (migratewallet RPC or the GUI option).", fs::PathToString(path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1337 | 0 | status = DatabaseStatus::FAILED_LEGACY_DISABLED; |
1338 | 0 | return nullptr; |
1339 | 0 | } |
1340 | | |
1341 | | // A db already exists so format is set, but options also specifies the format, so make sure they agree |
1342 | 0 | if (format && options.require_format && format != options.require_format) { |
1343 | 0 | error = Untranslated(strprintf("Failed to load database path '%s'. Data is not in required format.", fs::PathToString(path)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
1344 | 0 | status = DatabaseStatus::FAILED_BAD_FORMAT; |
1345 | 0 | return nullptr; |
1346 | 0 | } |
1347 | | |
1348 | | // Format is not set when a db doesn't already exist, so use the format specified by the options if it is set. |
1349 | 0 | if (!format && options.require_format) format = options.require_format; |
1350 | |
|
1351 | 0 | if (!format) { |
1352 | 0 | format = DatabaseFormat::SQLITE; |
1353 | 0 | } |
1354 | |
|
1355 | 0 | if (format == DatabaseFormat::SQLITE) { |
1356 | 0 | return MakeSQLiteDatabase(path, options, status, error); |
1357 | 0 | } |
1358 | | |
1359 | 0 | if (format == DatabaseFormat::BERKELEY_RO) { |
1360 | 0 | return MakeBerkeleyRODatabase(path, options, status, error); |
1361 | 0 | } |
1362 | | |
1363 | 0 | error = Untranslated(STR_INTERNAL_BUG("Could not determine wallet format"));Line | Count | Source | 96 | 0 | #define STR_INTERNAL_BUG(msg) StrFormatInternalBug((msg), std::source_location::current()) |
|
1364 | 0 | status = DatabaseStatus::FAILED_BAD_FORMAT; |
1365 | 0 | return nullptr; |
1366 | 0 | } |
1367 | | } // namespace wallet |