Coverage Report

Created: 2024-10-21 15:10

/root/bitcoin/src/wallet/wallet.cpp
Line
Count
Source (jump to first uncovered line)
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-2022 The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <wallet/wallet.h>
7
8
#include <bitcoin-build-config.h> // IWYU pragma: keep
9
#include <addresstype.h>
10
#include <blockfilter.h>
11
#include <chain.h>
12
#include <coins.h>
13
#include <common/args.h>
14
#include <common/messages.h>
15
#include <common/settings.h>
16
#include <common/signmessage.h>
17
#include <common/system.h>
18
#include <consensus/amount.h>
19
#include <consensus/consensus.h>
20
#include <consensus/validation.h>
21
#include <external_signer.h>
22
#include <interfaces/chain.h>
23
#include <interfaces/handler.h>
24
#include <interfaces/wallet.h>
25
#include <kernel/chain.h>
26
#include <kernel/mempool_removal_reason.h>
27
#include <key.h>
28
#include <key_io.h>
29
#include <logging.h>
30
#include <node/types.h>
31
#include <outputtype.h>
32
#include <policy/feerate.h>
33
#include <primitives/block.h>
34
#include <primitives/transaction.h>
35
#include <psbt.h>
36
#include <pubkey.h>
37
#include <random.h>
38
#include <script/descriptor.h>
39
#include <script/interpreter.h>
40
#include <script/script.h>
41
#include <script/sign.h>
42
#include <script/signingprovider.h>
43
#include <script/solver.h>
44
#include <serialize.h>
45
#include <span.h>
46
#include <streams.h>
47
#include <support/allocators/secure.h>
48
#include <support/allocators/zeroafterfree.h>
49
#include <support/cleanse.h>
50
#include <sync.h>
51
#include <tinyformat.h>
52
#include <uint256.h>
53
#include <univalue.h>
54
#include <util/check.h>
55
#include <util/fs.h>
56
#include <util/fs_helpers.h>
57
#include <util/moneystr.h>
58
#include <util/result.h>
59
#include <util/string.h>
60
#include <util/time.h>
61
#include <util/translation.h>
62
#include <wallet/coincontrol.h>
63
#include <wallet/context.h>
64
#include <wallet/crypter.h>
65
#include <wallet/db.h>
66
#include <wallet/external_signer_scriptpubkeyman.h>
67
#include <wallet/scriptpubkeyman.h>
68
#include <wallet/transaction.h>
69
#include <wallet/types.h>
70
#include <wallet/walletdb.h>
71
#include <wallet/walletutil.h>
72
73
#include <algorithm>
74
#include <cassert>
75
#include <condition_variable>
76
#include <exception>
77
#include <optional>
78
#include <stdexcept>
79
#include <thread>
80
#include <tuple>
81
#include <variant>
82
83
struct KeyOriginInfo;
84
85
using common::AmountErrMsg;
86
using common::AmountHighWarn;
87
using common::PSBTError;
88
using interfaces::FoundBlock;
89
using util::ReplaceAll;
90
using util::ToString;
91
92
namespace wallet {
93
94
bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
95
0
{
96
0
    const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
97
0
        if (!setting_value.isArray()) setting_value.setArray();
98
0
        for (const auto& value : setting_value.getValues()) {
99
0
            if (value.isStr() && value.get_str() == wallet_name) return interfaces::SettingsAction::SKIP_WRITE;
100
0
        }
101
0
        setting_value.push_back(wallet_name);
102
0
        return interfaces::SettingsAction::WRITE;
103
0
    };
104
0
    return chain.updateRwSetting("wallet", update_function);
105
0
}
106
107
bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
108
0
{
109
0
    const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
110
0
        if (!setting_value.isArray()) return interfaces::SettingsAction::SKIP_WRITE;
111
0
        common::SettingsValue new_value(common::SettingsValue::VARR);
112
0
        for (const auto& value : setting_value.getValues()) {
113
0
            if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value);
114
0
        }
115
0
        if (new_value.size() == setting_value.size()) return interfaces::SettingsAction::SKIP_WRITE;
116
0
        setting_value = std::move(new_value);
117
0
        return interfaces::SettingsAction::WRITE;
118
0
    };
119
0
    return chain.updateRwSetting("wallet", update_function);
120
0
}
121
122
static void UpdateWalletSetting(interfaces::Chain& chain,
123
                                const std::string& wallet_name,
124
                                std::optional<bool> load_on_startup,
125
                                std::vector<bilingual_str>& warnings)
126
0
{
127
0
    if (!load_on_startup) return;
128
0
    if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) {
129
0
        warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup."));
130
0
    } else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) {
131
0
        warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup."));
132
0
    }
133
0
}
134
135
/**
136
 * Refresh mempool status so the wallet is in an internally consistent state and
137
 * immediately knows the transaction's status: Whether it can be considered
138
 * trusted and is eligible to be abandoned ...
139
 */
140
static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain)
141
0
{
142
0
    if (chain.isInMempool(tx.GetHash())) {
143
0
        tx.m_state = TxStateInMempool();
144
0
    } else if (tx.state<TxStateInMempool>()) {
145
0
        tx.m_state = TxStateInactive();
146
0
    }
147
0
}
148
149
bool AddWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
150
0
{
151
0
    LOCK(context.wallets_mutex);
152
0
    assert(wallet);
153
0
    std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
154
0
    if (i != context.wallets.end()) return false;
155
0
    context.wallets.push_back(wallet);
156
0
    wallet->ConnectScriptPubKeyManNotifiers();
157
0
    wallet->NotifyCanGetAddressesChanged();
158
0
    return true;
159
0
}
160
161
bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings)
162
0
{
163
0
    assert(wallet);
164
165
0
    interfaces::Chain& chain = wallet->chain();
166
0
    std::string name = wallet->GetName();
167
168
    // Unregister with the validation interface which also drops shared pointers.
169
0
    wallet->m_chain_notifications_handler.reset();
170
0
    {
171
0
        LOCK(context.wallets_mutex);
172
0
        std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
173
0
        if (i == context.wallets.end()) return false;
174
0
        context.wallets.erase(i);
175
0
    }
176
    // Notify unload so that upper layers release the shared pointer.
177
0
    wallet->NotifyUnload();
178
179
    // Write the wallet setting
180
0
    UpdateWalletSetting(chain, name, load_on_start, warnings);
181
182
0
    return true;
183
0
}
184
185
bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start)
186
0
{
187
0
    std::vector<bilingual_str> warnings;
188
0
    return RemoveWallet(context, wallet, load_on_start, warnings);
189
0
}
190
191
std::vector<std::shared_ptr<CWallet>> GetWallets(WalletContext& context)
192
0
{
193
0
    LOCK(context.wallets_mutex);
194
0
    return context.wallets;
195
0
}
196
197
std::shared_ptr<CWallet> GetDefaultWallet(WalletContext& context, size_t& count)
198
0
{
199
0
    LOCK(context.wallets_mutex);
200
0
    count = context.wallets.size();
201
0
    return count == 1 ? context.wallets[0] : nullptr;
202
0
}
203
204
std::shared_ptr<CWallet> GetWallet(WalletContext& context, const std::string& name)
205
0
{
206
0
    LOCK(context.wallets_mutex);
207
0
    for (const std::shared_ptr<CWallet>& wallet : context.wallets) {
208
0
        if (wallet->GetName() == name) return wallet;
209
0
    }
210
0
    return nullptr;
211
0
}
212
213
std::unique_ptr<interfaces::Handler> HandleLoadWallet(WalletContext& context, LoadWalletFn load_wallet)
214
0
{
215
0
    LOCK(context.wallets_mutex);
216
0
    auto it = context.wallet_load_fns.emplace(context.wallet_load_fns.end(), std::move(load_wallet));
217
0
    return interfaces::MakeCleanupHandler([&context, it] { LOCK(context.wallets_mutex); context.wallet_load_fns.erase(it); });
218
0
}
219
220
void NotifyWalletLoaded(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
221
0
{
222
0
    LOCK(context.wallets_mutex);
223
0
    for (auto& load_wallet : context.wallet_load_fns) {
224
0
        load_wallet(interfaces::MakeWallet(context, wallet));
225
0
    }
226
0
}
227
228
static GlobalMutex g_loading_wallet_mutex;
229
static GlobalMutex g_wallet_release_mutex;
230
static std::condition_variable g_wallet_release_cv;
231
static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex);
232
static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex);
233
234
// Custom deleter for shared_ptr<CWallet>.
235
static void FlushAndDeleteWallet(CWallet* wallet)
236
0
{
237
0
    const std::string name = wallet->GetName();
238
0
    wallet->WalletLogPrintf("Releasing wallet %s..\n", name);
239
0
    wallet->Flush();
240
0
    delete wallet;
241
    // Wallet is now released, notify WaitForDeleteWallet, if any.
242
0
    {
243
0
        LOCK(g_wallet_release_mutex);
244
0
        if (g_unloading_wallet_set.erase(name) == 0) {
245
            // WaitForDeleteWallet was not called for this wallet, all done.
246
0
            return;
247
0
        }
248
0
    }
249
0
    g_wallet_release_cv.notify_all();
250
0
}
251
252
void WaitForDeleteWallet(std::shared_ptr<CWallet>&& wallet)
253
0
{
254
    // Mark wallet for unloading.
255
0
    const std::string name = wallet->GetName();
256
0
    {
257
0
        LOCK(g_wallet_release_mutex);
258
0
        g_unloading_wallet_set.insert(name);
259
        // Do not expect to be the only one removing this wallet.
260
        // Multiple threads could simultaneously be waiting for deletion.
261
0
    }
262
263
    // Time to ditch our shared_ptr and wait for FlushAndDeleteWallet call.
264
0
    wallet.reset();
265
0
    {
266
0
        WAIT_LOCK(g_wallet_release_mutex, lock);
267
0
        while (g_unloading_wallet_set.count(name) == 1) {
268
0
            g_wallet_release_cv.wait(lock);
269
0
        }
270
0
    }
271
0
}
272
273
namespace {
274
std::shared_ptr<CWallet> LoadWalletInternal(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
275
0
{
276
0
    try {
277
0
        std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
278
0
        if (!database) {
279
0
            error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
280
0
            return nullptr;
281
0
        }
282
283
0
        context.chain->initMessage(_("Loading wallet…").translated);
284
0
        std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), options.create_flags, error, warnings);
285
0
        if (!wallet) {
286
0
            error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error;
287
0
            status = DatabaseStatus::FAILED_LOAD;
288
0
            return nullptr;
289
0
        }
290
291
        // Legacy wallets are being deprecated, warn if the loaded wallet is legacy
292
0
        if (!wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
293
0
            warnings.push_back(_("Wallet loaded successfully. The legacy wallet type is being deprecated and support for creating and opening legacy wallets will be removed in the future. Legacy wallets can be migrated to a descriptor wallet with migratewallet."));
294
0
        }
295
296
0
        NotifyWalletLoaded(context, wallet);
297
0
        AddWallet(context, wallet);
298
0
        wallet->postInitProcess();
299
300
        // Write the wallet setting
301
0
        UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
302
303
0
        return wallet;
304
0
    } catch (const std::runtime_error& e) {
305
0
        error = Untranslated(e.what());
306
0
        status = DatabaseStatus::FAILED_LOAD;
307
0
        return nullptr;
308
0
    }
309
0
}
310
311
class FastWalletRescanFilter
312
{
313
public:
314
0
    FastWalletRescanFilter(const CWallet& wallet) : m_wallet(wallet)
315
0
    {
316
        // fast rescanning via block filters is only supported by descriptor wallets right now
317
0
        assert(!m_wallet.IsLegacy());
318
319
        // create initial filter with scripts from all ScriptPubKeyMans
320
0
        for (auto spkm : m_wallet.GetAllScriptPubKeyMans()) {
321
0
            auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(spkm)};
322
0
            assert(desc_spkm != nullptr);
323
0
            AddScriptPubKeys(desc_spkm);
324
            // save each range descriptor's end for possible future filter updates
325
0
            if (desc_spkm->IsHDEnabled()) {
326
0
                m_last_range_ends.emplace(desc_spkm->GetID(), desc_spkm->GetEndRange());
327
0
            }
328
0
        }
329
0
    }
330
331
    void UpdateIfNeeded()
332
0
    {
333
        // repopulate filter with new scripts if top-up has happened since last iteration
334
0
        for (const auto& [desc_spkm_id, last_range_end] : m_last_range_ends) {
335
0
            auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(m_wallet.GetScriptPubKeyMan(desc_spkm_id))};
336
0
            assert(desc_spkm != nullptr);
337
0
            int32_t current_range_end{desc_spkm->GetEndRange()};
338
0
            if (current_range_end > last_range_end) {
339
0
                AddScriptPubKeys(desc_spkm, last_range_end);
340
0
                m_last_range_ends.at(desc_spkm->GetID()) = current_range_end;
341
0
            }
342
0
        }
343
0
    }
344
345
    std::optional<bool> MatchesBlock(const uint256& block_hash) const
346
0
    {
347
0
        return m_wallet.chain().blockFilterMatchesAny(BlockFilterType::BASIC, block_hash, m_filter_set);
348
0
    }
349
350
private:
351
    const CWallet& m_wallet;
352
    /** Map for keeping track of each range descriptor's last seen end range.
353
      * This information is used to detect whether new addresses were derived
354
      * (that is, if the current end range is larger than the saved end range)
355
      * after processing a block and hence a filter set update is needed to
356
      * take possible keypool top-ups into account.
357
      */
358
    std::map<uint256, int32_t> m_last_range_ends;
359
    GCSFilter::ElementSet m_filter_set;
360
361
    void AddScriptPubKeys(const DescriptorScriptPubKeyMan* desc_spkm, int32_t last_range_end = 0)
362
0
    {
363
0
        for (const auto& script_pub_key : desc_spkm->GetScriptPubKeys(last_range_end)) {
364
0
            m_filter_set.emplace(script_pub_key.begin(), script_pub_key.end());
365
0
        }
366
0
    }
367
};
368
} // namespace
369
370
std::shared_ptr<CWallet> LoadWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
371
0
{
372
0
    auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name));
373
0
    if (!result.second) {
374
0
        error = Untranslated("Wallet already loading.");
375
0
        status = DatabaseStatus::FAILED_LOAD;
376
0
        return nullptr;
377
0
    }
378
0
    auto wallet = LoadWalletInternal(context, name, load_on_start, options, status, error, warnings);
379
0
    WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first));
380
0
    return wallet;
381
0
}
382
383
std::shared_ptr<CWallet> CreateWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
384
0
{
385
0
    uint64_t wallet_creation_flags = options.create_flags;
386
0
    const SecureString& passphrase = options.create_passphrase;
387
388
0
    ArgsManager& args = *Assert(context.args);
389
390
0
    if (wallet_creation_flags & WALLET_FLAG_DESCRIPTORS) options.require_format = DatabaseFormat::SQLITE;
391
0
    else if (args.GetBoolArg("-swapbdbendian", false)) {
392
0
        options.require_format = DatabaseFormat::BERKELEY_SWAP;
393
0
    }
394
395
    // Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted
396
0
    bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET);
397
398
    // Born encrypted wallets need to be created blank first.
399
0
    if (!passphrase.empty()) {
400
0
        wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET;
401
0
    }
402
403
    // Private keys must be disabled for an external signer wallet
404
0
    if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
405
0
        error = Untranslated("Private keys must be disabled when using an external signer");
406
0
        status = DatabaseStatus::FAILED_CREATE;
407
0
        return nullptr;
408
0
    }
409
410
    // Descriptor support must be enabled for an external signer wallet
411
0
    if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS)) {
412
0
        error = Untranslated("Descriptor support must be enabled when using an external signer");
413
0
        status = DatabaseStatus::FAILED_CREATE;
414
0
        return nullptr;
415
0
    }
416
417
    // Do not allow a passphrase when private keys are disabled
418
0
    if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
419
0
        error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled.");
420
0
        status = DatabaseStatus::FAILED_CREATE;
421
0
        return nullptr;
422
0
    }
423
424
    // Wallet::Verify will check if we're trying to create a wallet with a duplicate name.
425
0
    std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
426
0
    if (!database) {
427
0
        error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
428
0
        status = DatabaseStatus::FAILED_VERIFY;
429
0
        return nullptr;
430
0
    }
431
432
    // Make the wallet
433
0
    context.chain->initMessage(_("Loading wallet…").translated);
434
0
    std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), wallet_creation_flags, error, warnings);
435
0
    if (!wallet) {
436
0
        error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error;
437
0
        status = DatabaseStatus::FAILED_CREATE;
438
0
        return nullptr;
439
0
    }
440
441
    // Encrypt the wallet
442
0
    if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
443
0
        if (!wallet->EncryptWallet(passphrase)) {
444
0
            error = Untranslated("Error: Wallet created but failed to encrypt.");
445
0
            status = DatabaseStatus::FAILED_ENCRYPT;
446
0
            return nullptr;
447
0
        }
448
0
        if (!create_blank) {
449
            // Unlock the wallet
450
0
            if (!wallet->Unlock(passphrase)) {
451
0
                error = Untranslated("Error: Wallet was encrypted but could not be unlocked");
452
0
                status = DatabaseStatus::FAILED_ENCRYPT;
453
0
                return nullptr;
454
0
            }
455
456
            // Set a seed for the wallet
457
0
            {
458
0
                LOCK(wallet->cs_wallet);
459
0
                if (wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
460
0
                    wallet->SetupDescriptorScriptPubKeyMans();
461
0
                } else {
462
0
                    for (auto spk_man : wallet->GetActiveScriptPubKeyMans()) {
463
0
                        if (!spk_man->SetupGeneration()) {
464
0
                            error = Untranslated("Unable to generate initial keys");
465
0
                            status = DatabaseStatus::FAILED_CREATE;
466
0
                            return nullptr;
467
0
                        }
468
0
                    }
469
0
                }
470
0
            }
471
472
            // Relock the wallet
473
0
            wallet->Lock();
474
0
        }
475
0
    }
476
477
0
    NotifyWalletLoaded(context, wallet);
478
0
    AddWallet(context, wallet);
479
0
    wallet->postInitProcess();
480
481
    // Write the wallet settings
482
0
    UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
483
484
    // Legacy wallets are being deprecated, warn if a newly created wallet is legacy
485
0
    if (!(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS)) {
486
0
        warnings.push_back(_("Wallet created successfully. The legacy wallet type is being deprecated and support for creating and opening legacy wallets will be removed in the future."));
487
0
    }
488
489
0
    status = DatabaseStatus::SUCCESS;
490
0
    return wallet;
491
0
}
492
493
std::shared_ptr<CWallet> RestoreWallet(WalletContext& context, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
494
0
{
495
0
    DatabaseOptions options;
496
0
    ReadDatabaseArgs(*context.args, options);
497
0
    options.require_existing = true;
498
499
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name));
500
0
    auto wallet_file = wallet_path / "wallet.dat";
501
0
    std::shared_ptr<CWallet> wallet;
502
503
0
    try {
504
0
        if (!fs::exists(backup_file)) {
505
0
            error = Untranslated("Backup file does not exist");
506
0
            status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE;
507
0
            return nullptr;
508
0
        }
509
510
0
        if (fs::exists(wallet_path) || !TryCreateDirectories(wallet_path)) {
511
0
            error = Untranslated(strprintf("Failed to create database path '%s'. Database already exists.", fs::PathToString(wallet_path)));
512
0
            status = DatabaseStatus::FAILED_ALREADY_EXISTS;
513
0
            return nullptr;
514
0
        }
515
516
0
        fs::copy_file(backup_file, wallet_file, fs::copy_options::none);
517
518
0
        wallet = LoadWallet(context, wallet_name, load_on_start, options, status, error, warnings);
519
0
    } catch (const std::exception& e) {
520
0
        assert(!wallet);
521
0
        if (!error.empty()) error += Untranslated("\n");
522
0
        error += strprintf(Untranslated("Unexpected exception: %s"), e.what());
523
0
    }
524
0
    if (!wallet) {
525
0
        fs::remove_all(wallet_path);
526
0
    }
527
528
0
    return wallet;
529
0
}
530
531
/** @defgroup mapWallet
532
 *
533
 * @{
534
 */
535
536
const CWalletTx* CWallet::GetWalletTx(const uint256& hash) const
537
0
{
538
0
    AssertLockHeld(cs_wallet);
539
0
    const auto it = mapWallet.find(hash);
540
0
    if (it == mapWallet.end())
541
0
        return nullptr;
542
0
    return &(it->second);
543
0
}
544
545
void CWallet::UpgradeKeyMetadata()
546
0
{
547
0
    if (IsLocked() || IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
548
0
        return;
549
0
    }
550
551
0
    auto spk_man = GetLegacyScriptPubKeyMan();
552
0
    if (!spk_man) {
553
0
        return;
554
0
    }
555
556
0
    spk_man->UpgradeKeyMetadata();
557
0
    SetWalletFlag(WALLET_FLAG_KEY_ORIGIN_METADATA);
558
0
}
559
560
void CWallet::UpgradeDescriptorCache()
561
0
{
562
0
    if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) {
563
0
        return;
564
0
    }
565
566
0
    for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) {
567
0
        DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
568
0
        desc_spkm->UpgradeDescriptorCache();
569
0
    }
570
0
    SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
571
0
}
572
573
bool CWallet::Unlock(const SecureString& strWalletPassphrase)
574
0
{
575
0
    CCrypter crypter;
576
0
    CKeyingMaterial _vMasterKey;
577
578
0
    {
579
0
        LOCK(cs_wallet);
580
0
        for (const MasterKeyMap::value_type& pMasterKey : mapMasterKeys)
581
0
        {
582
0
            if(!crypter.SetKeyFromPassphrase(strWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
583
0
                return false;
584
0
            if (!crypter.Decrypt(pMasterKey.second.vchCryptedKey, _vMasterKey))
585
0
                continue; // try another master key
586
0
            if (Unlock(_vMasterKey)) {
587
                // Now that we've unlocked, upgrade the key metadata
588
0
                UpgradeKeyMetadata();
589
                // Now that we've unlocked, upgrade the descriptor cache
590
0
                UpgradeDescriptorCache();
591
0
                return true;
592
0
            }
593
0
        }
594
0
    }
595
0
    return false;
596
0
}
597
598
bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase)
599
0
{
600
0
    bool fWasLocked = IsLocked();
601
602
0
    {
603
0
        LOCK2(m_relock_mutex, cs_wallet);
604
0
        Lock();
605
606
0
        CCrypter crypter;
607
0
        CKeyingMaterial _vMasterKey;
608
0
        for (MasterKeyMap::value_type& pMasterKey : mapMasterKeys)
609
0
        {
610
0
            if(!crypter.SetKeyFromPassphrase(strOldWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
611
0
                return false;
612
0
            if (!crypter.Decrypt(pMasterKey.second.vchCryptedKey, _vMasterKey))
613
0
                return false;
614
0
            if (Unlock(_vMasterKey))
615
0
            {
616
0
                constexpr MillisecondsDouble target{100};
617
0
                auto start{SteadyClock::now()};
618
0
                crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod);
619
0
                pMasterKey.second.nDeriveIterations = static_cast<unsigned int>(pMasterKey.second.nDeriveIterations * target / (SteadyClock::now() - start));
620
621
0
                start = SteadyClock::now();
622
0
                crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod);
623
0
                pMasterKey.second.nDeriveIterations = (pMasterKey.second.nDeriveIterations + static_cast<unsigned int>(pMasterKey.second.nDeriveIterations * target / (SteadyClock::now() - start))) / 2;
624
625
0
                if (pMasterKey.second.nDeriveIterations < 25000)
626
0
                    pMasterKey.second.nDeriveIterations = 25000;
627
628
0
                WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", pMasterKey.second.nDeriveIterations);
629
630
0
                if (!crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
631
0
                    return false;
632
0
                if (!crypter.Encrypt(_vMasterKey, pMasterKey.second.vchCryptedKey))
633
0
                    return false;
634
0
                WalletBatch(GetDatabase()).WriteMasterKey(pMasterKey.first, pMasterKey.second);
635
0
                if (fWasLocked)
636
0
                    Lock();
637
0
                return true;
638
0
            }
639
0
        }
640
0
    }
641
642
0
    return false;
643
0
}
644
645
void CWallet::chainStateFlushed(ChainstateRole role, const CBlockLocator& loc)
646
0
{
647
    // Don't update the best block until the chain is attached so that in case of a shutdown,
648
    // the rescan will be restarted at next startup.
649
0
    if (m_attaching_chain || role == ChainstateRole::BACKGROUND) {
650
0
        return;
651
0
    }
652
0
    WalletBatch batch(GetDatabase());
653
0
    batch.WriteBestBlock(loc);
654
0
}
655
656
void CWallet::SetMinVersion(enum WalletFeature nVersion, WalletBatch* batch_in)
657
0
{
658
0
    LOCK(cs_wallet);
659
0
    if (nWalletVersion >= nVersion)
660
0
        return;
661
0
    WalletLogPrintf("Setting minversion to %d\n", nVersion);
662
0
    nWalletVersion = nVersion;
663
664
0
    {
665
0
        WalletBatch* batch = batch_in ? batch_in : new WalletBatch(GetDatabase());
666
0
        if (nWalletVersion > 40000)
667
0
            batch->WriteMinVersion(nWalletVersion);
668
0
        if (!batch_in)
669
0
            delete batch;
670
0
    }
671
0
}
672
673
std::set<uint256> CWallet::GetConflicts(const uint256& txid) const
674
0
{
675
0
    std::set<uint256> result;
676
0
    AssertLockHeld(cs_wallet);
677
678
0
    const auto it = mapWallet.find(txid);
679
0
    if (it == mapWallet.end())
680
0
        return result;
681
0
    const CWalletTx& wtx = it->second;
682
683
0
    std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
684
685
0
    for (const CTxIn& txin : wtx.tx->vin)
686
0
    {
687
0
        if (mapTxSpends.count(txin.prevout) <= 1)
688
0
            continue;  // No conflict if zero or one spends
689
0
        range = mapTxSpends.equal_range(txin.prevout);
690
0
        for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it)
691
0
            result.insert(_it->second);
692
0
    }
693
0
    return result;
694
0
}
695
696
bool CWallet::HasWalletSpend(const CTransactionRef& tx) const
697
0
{
698
0
    AssertLockHeld(cs_wallet);
699
0
    const Txid& txid = tx->GetHash();
700
0
    for (unsigned int i = 0; i < tx->vout.size(); ++i) {
701
0
        if (IsSpent(COutPoint(txid, i))) {
702
0
            return true;
703
0
        }
704
0
    }
705
0
    return false;
706
0
}
707
708
void CWallet::Flush()
709
0
{
710
0
    GetDatabase().Flush();
711
0
}
712
713
void CWallet::Close()
714
0
{
715
0
    GetDatabase().Close();
716
0
}
717
718
void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range)
719
0
{
720
    // We want all the wallet transactions in range to have the same metadata as
721
    // the oldest (smallest nOrderPos).
722
    // So: find smallest nOrderPos:
723
724
0
    int nMinOrderPos = std::numeric_limits<int>::max();
725
0
    const CWalletTx* copyFrom = nullptr;
726
0
    for (TxSpends::iterator it = range.first; it != range.second; ++it) {
727
0
        const CWalletTx* wtx = &mapWallet.at(it->second);
728
0
        if (wtx->nOrderPos < nMinOrderPos) {
729
0
            nMinOrderPos = wtx->nOrderPos;
730
0
            copyFrom = wtx;
731
0
        }
732
0
    }
733
734
0
    if (!copyFrom) {
735
0
        return;
736
0
    }
737
738
    // Now copy data from copyFrom to rest:
739
0
    for (TxSpends::iterator it = range.first; it != range.second; ++it)
740
0
    {
741
0
        const uint256& hash = it->second;
742
0
        CWalletTx* copyTo = &mapWallet.at(hash);
743
0
        if (copyFrom == copyTo) continue;
744
0
        assert(copyFrom && "Oldest wallet transaction in range assumed to have been found.");
745
0
        if (!copyFrom->IsEquivalentTo(*copyTo)) continue;
746
0
        copyTo->mapValue = copyFrom->mapValue;
747
0
        copyTo->vOrderForm = copyFrom->vOrderForm;
748
        // fTimeReceivedIsTxTime not copied on purpose
749
        // nTimeReceived not copied on purpose
750
0
        copyTo->nTimeSmart = copyFrom->nTimeSmart;
751
0
        copyTo->fFromMe = copyFrom->fFromMe;
752
        // nOrderPos not copied on purpose
753
        // cached members not copied on purpose
754
0
    }
755
0
}
756
757
/**
758
 * Outpoint is spent if any non-conflicted transaction
759
 * spends it:
760
 */
761
bool CWallet::IsSpent(const COutPoint& outpoint) const
762
0
{
763
0
    std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
764
0
    range = mapTxSpends.equal_range(outpoint);
765
766
0
    for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
767
0
        const uint256& wtxid = it->second;
768
0
        const auto mit = mapWallet.find(wtxid);
769
0
        if (mit != mapWallet.end()) {
770
0
            const auto& wtx = mit->second;
771
0
            if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted())
772
0
                return true; // Spent
773
0
        }
774
0
    }
775
0
    return false;
776
0
}
777
778
void CWallet::AddToSpends(const COutPoint& outpoint, const uint256& wtxid, WalletBatch* batch)
779
0
{
780
0
    mapTxSpends.insert(std::make_pair(outpoint, wtxid));
781
782
0
    if (batch) {
783
0
        UnlockCoin(outpoint, batch);
784
0
    } else {
785
0
        WalletBatch temp_batch(GetDatabase());
786
0
        UnlockCoin(outpoint, &temp_batch);
787
0
    }
788
789
0
    std::pair<TxSpends::iterator, TxSpends::iterator> range;
790
0
    range = mapTxSpends.equal_range(outpoint);
791
0
    SyncMetaData(range);
792
0
}
793
794
795
void CWallet::AddToSpends(const CWalletTx& wtx, WalletBatch* batch)
796
0
{
797
0
    if (wtx.IsCoinBase()) // Coinbases don't spend anything!
798
0
        return;
799
800
0
    for (const CTxIn& txin : wtx.tx->vin)
801
0
        AddToSpends(txin.prevout, wtx.GetHash(), batch);
802
0
}
803
804
bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
805
0
{
806
0
    if (IsCrypted())
807
0
        return false;
808
809
0
    CKeyingMaterial _vMasterKey;
810
811
0
    _vMasterKey.resize(WALLET_CRYPTO_KEY_SIZE);
812
0
    GetStrongRandBytes(_vMasterKey);
813
814
0
    CMasterKey kMasterKey;
815
816
0
    kMasterKey.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE);
817
0
    GetStrongRandBytes(kMasterKey.vchSalt);
818
819
0
    CCrypter crypter;
820
0
    constexpr MillisecondsDouble target{100};
821
0
    auto start{SteadyClock::now()};
822
0
    crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, 25000, kMasterKey.nDerivationMethod);
823
0
    kMasterKey.nDeriveIterations = static_cast<unsigned int>(25000 * target / (SteadyClock::now() - start));
824
825
0
    start = SteadyClock::now();
826
0
    crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod);
827
0
    kMasterKey.nDeriveIterations = (kMasterKey.nDeriveIterations + static_cast<unsigned int>(kMasterKey.nDeriveIterations * target / (SteadyClock::now() - start))) / 2;
828
829
0
    if (kMasterKey.nDeriveIterations < 25000)
830
0
        kMasterKey.nDeriveIterations = 25000;
831
832
0
    WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", kMasterKey.nDeriveIterations);
833
834
0
    if (!crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod))
835
0
        return false;
836
0
    if (!crypter.Encrypt(_vMasterKey, kMasterKey.vchCryptedKey))
837
0
        return false;
838
839
0
    {
840
0
        LOCK2(m_relock_mutex, cs_wallet);
841
0
        mapMasterKeys[++nMasterKeyMaxID] = kMasterKey;
842
0
        WalletBatch* encrypted_batch = new WalletBatch(GetDatabase());
843
0
        if (!encrypted_batch->TxnBegin()) {
844
0
            delete encrypted_batch;
845
0
            encrypted_batch = nullptr;
846
0
            return false;
847
0
        }
848
0
        encrypted_batch->WriteMasterKey(nMasterKeyMaxID, kMasterKey);
849
850
0
        for (const auto& spk_man_pair : m_spk_managers) {
851
0
            auto spk_man = spk_man_pair.second.get();
852
0
            if (!spk_man->Encrypt(_vMasterKey, encrypted_batch)) {
853
0
                encrypted_batch->TxnAbort();
854
0
                delete encrypted_batch;
855
0
                encrypted_batch = nullptr;
856
                // We now probably have half of our keys encrypted in memory, and half not...
857
                // die and let the user reload the unencrypted wallet.
858
0
                assert(false);
859
0
            }
860
0
        }
861
862
        // Encryption was introduced in version 0.4.0
863
0
        SetMinVersion(FEATURE_WALLETCRYPT, encrypted_batch);
864
865
0
        if (!encrypted_batch->TxnCommit()) {
866
0
            delete encrypted_batch;
867
0
            encrypted_batch = nullptr;
868
            // We now have keys encrypted in memory, but not on disk...
869
            // die to avoid confusion and let the user reload the unencrypted wallet.
870
0
            assert(false);
871
0
        }
872
873
0
        delete encrypted_batch;
874
0
        encrypted_batch = nullptr;
875
876
0
        Lock();
877
0
        Unlock(strWalletPassphrase);
878
879
        // If we are using descriptors, make new descriptors with a new seed
880
0
        if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) && !IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
881
0
            SetupDescriptorScriptPubKeyMans();
882
0
        } else if (auto spk_man = GetLegacyScriptPubKeyMan()) {
883
            // if we are using HD, replace the HD seed with a new one
884
0
            if (spk_man->IsHDEnabled()) {
885
0
                if (!spk_man->SetupGeneration(true)) {
886
0
                    return false;
887
0
                }
888
0
            }
889
0
        }
890
0
        Lock();
891
892
        // Need to completely rewrite the wallet file; if we don't, bdb might keep
893
        // bits of the unencrypted private key in slack space in the database file.
894
0
        GetDatabase().Rewrite();
895
896
        // BDB seems to have a bad habit of writing old data into
897
        // slack space in .dat files; that is bad if the old data is
898
        // unencrypted private keys. So:
899
0
        GetDatabase().ReloadDbEnv();
900
901
0
    }
902
0
    NotifyStatusChanged(this);
903
904
0
    return true;
905
0
}
906
907
DBErrors CWallet::ReorderTransactions()
908
0
{
909
0
    LOCK(cs_wallet);
910
0
    WalletBatch batch(GetDatabase());
911
912
    // Old wallets didn't have any defined order for transactions
913
    // Probably a bad idea to change the output of this
914
915
    // First: get all CWalletTx into a sorted-by-time multimap.
916
0
    typedef std::multimap<int64_t, CWalletTx*> TxItems;
917
0
    TxItems txByTime;
918
919
0
    for (auto& entry : mapWallet)
920
0
    {
921
0
        CWalletTx* wtx = &entry.second;
922
0
        txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx));
923
0
    }
924
925
0
    nOrderPosNext = 0;
926
0
    std::vector<int64_t> nOrderPosOffsets;
927
0
    for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it)
928
0
    {
929
0
        CWalletTx *const pwtx = (*it).second;
930
0
        int64_t& nOrderPos = pwtx->nOrderPos;
931
932
0
        if (nOrderPos == -1)
933
0
        {
934
0
            nOrderPos = nOrderPosNext++;
935
0
            nOrderPosOffsets.push_back(nOrderPos);
936
937
0
            if (!batch.WriteTx(*pwtx))
938
0
                return DBErrors::LOAD_FAIL;
939
0
        }
940
0
        else
941
0
        {
942
0
            int64_t nOrderPosOff = 0;
943
0
            for (const int64_t& nOffsetStart : nOrderPosOffsets)
944
0
            {
945
0
                if (nOrderPos >= nOffsetStart)
946
0
                    ++nOrderPosOff;
947
0
            }
948
0
            nOrderPos += nOrderPosOff;
949
0
            nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1);
950
951
0
            if (!nOrderPosOff)
952
0
                continue;
953
954
            // Since we're changing the order, write it back
955
0
            if (!batch.WriteTx(*pwtx))
956
0
                return DBErrors::LOAD_FAIL;
957
0
        }
958
0
    }
959
0
    batch.WriteOrderPosNext(nOrderPosNext);
960
961
0
    return DBErrors::LOAD_OK;
962
0
}
963
964
int64_t CWallet::IncOrderPosNext(WalletBatch* batch)
965
0
{
966
0
    AssertLockHeld(cs_wallet);
967
0
    int64_t nRet = nOrderPosNext++;
968
0
    if (batch) {
969
0
        batch->WriteOrderPosNext(nOrderPosNext);
970
0
    } else {
971
0
        WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext);
972
0
    }
973
0
    return nRet;
974
0
}
975
976
void CWallet::MarkDirty()
977
0
{
978
0
    {
979
0
        LOCK(cs_wallet);
980
0
        for (std::pair<const uint256, CWalletTx>& item : mapWallet)
981
0
            item.second.MarkDirty();
982
0
    }
983
0
}
984
985
bool CWallet::MarkReplaced(const uint256& originalHash, const uint256& newHash)
986
0
{
987
0
    LOCK(cs_wallet);
988
989
0
    auto mi = mapWallet.find(originalHash);
990
991
    // There is a bug if MarkReplaced is not called on an existing wallet transaction.
992
0
    assert(mi != mapWallet.end());
993
994
0
    CWalletTx& wtx = (*mi).second;
995
996
    // Ensure for now that we're not overwriting data
997
0
    assert(wtx.mapValue.count("replaced_by_txid") == 0);
998
999
0
    wtx.mapValue["replaced_by_txid"] = newHash.ToString();
1000
1001
    // Refresh mempool status without waiting for transactionRemovedFromMempool or transactionAddedToMempool
1002
0
    RefreshMempoolStatus(wtx, chain());
1003
1004
0
    WalletBatch batch(GetDatabase());
1005
1006
0
    bool success = true;
1007
0
    if (!batch.WriteTx(wtx)) {
1008
0
        WalletLogPrintf("%s: Updating batch tx %s failed\n", __func__, wtx.GetHash().ToString());
1009
0
        success = false;
1010
0
    }
1011
1012
0
    NotifyTransactionChanged(originalHash, CT_UPDATED);
1013
1014
0
    return success;
1015
0
}
1016
1017
void CWallet::SetSpentKeyState(WalletBatch& batch, const uint256& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations)
1018
0
{
1019
0
    AssertLockHeld(cs_wallet);
1020
0
    const CWalletTx* srctx = GetWalletTx(hash);
1021
0
    if (!srctx) return;
1022
1023
0
    CTxDestination dst;
1024
0
    if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) {
1025
0
        if (IsMine(dst)) {
1026
0
            if (used != IsAddressPreviouslySpent(dst)) {
1027
0
                if (used) {
1028
0
                    tx_destinations.insert(dst);
1029
0
                }
1030
0
                SetAddressPreviouslySpent(batch, dst, used);
1031
0
            }
1032
0
        }
1033
0
    }
1034
0
}
1035
1036
bool CWallet::IsSpentKey(const CScript& scriptPubKey) const
1037
0
{
1038
0
    AssertLockHeld(cs_wallet);
1039
0
    CTxDestination dest;
1040
0
    if (!ExtractDestination(scriptPubKey, dest)) {
1041
0
        return false;
1042
0
    }
1043
0
    if (IsAddressPreviouslySpent(dest)) {
1044
0
        return true;
1045
0
    }
1046
1047
0
    if (LegacyScriptPubKeyMan* spk_man = GetLegacyScriptPubKeyMan()) {
1048
0
        for (const auto& keyid : GetAffectedKeys(scriptPubKey, *spk_man)) {
1049
0
            WitnessV0KeyHash wpkh_dest(keyid);
1050
0
            if (IsAddressPreviouslySpent(wpkh_dest)) {
1051
0
                return true;
1052
0
            }
1053
0
            ScriptHash sh_wpkh_dest(GetScriptForDestination(wpkh_dest));
1054
0
            if (IsAddressPreviouslySpent(sh_wpkh_dest)) {
1055
0
                return true;
1056
0
            }
1057
0
            PKHash pkh_dest(keyid);
1058
0
            if (IsAddressPreviouslySpent(pkh_dest)) {
1059
0
                return true;
1060
0
            }
1061
0
        }
1062
0
    }
1063
0
    return false;
1064
0
}
1065
1066
CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const TxState& state, const UpdateWalletTxFn& update_wtx, bool fFlushOnClose, bool rescanning_old_block)
1067
0
{
1068
0
    LOCK(cs_wallet);
1069
1070
0
    WalletBatch batch(GetDatabase(), fFlushOnClose);
1071
1072
0
    uint256 hash = tx->GetHash();
1073
1074
0
    if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
1075
        // Mark used destinations
1076
0
        std::set<CTxDestination> tx_destinations;
1077
1078
0
        for (const CTxIn& txin : tx->vin) {
1079
0
            const COutPoint& op = txin.prevout;
1080
0
            SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations);
1081
0
        }
1082
1083
0
        MarkDestinationsDirty(tx_destinations);
1084
0
    }
1085
1086
    // Inserts only if not already there, returns tx inserted or tx found
1087
0
    auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(tx, state));
1088
0
    CWalletTx& wtx = (*ret.first).second;
1089
0
    bool fInsertedNew = ret.second;
1090
0
    bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew);
1091
0
    if (fInsertedNew) {
1092
0
        wtx.nTimeReceived = GetTime();
1093
0
        wtx.nOrderPos = IncOrderPosNext(&batch);
1094
0
        wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1095
0
        wtx.nTimeSmart = ComputeTimeSmart(wtx, rescanning_old_block);
1096
0
        AddToSpends(wtx, &batch);
1097
1098
        // Update birth time when tx time is older than it.
1099
0
        MaybeUpdateBirthTime(wtx.GetTxTime());
1100
0
    }
1101
1102
0
    if (!fInsertedNew)
1103
0
    {
1104
0
        if (state.index() != wtx.m_state.index()) {
1105
0
            wtx.m_state = state;
1106
0
            fUpdated = true;
1107
0
        } else {
1108
0
            assert(TxStateSerializedIndex(wtx.m_state) == TxStateSerializedIndex(state));
1109
0
            assert(TxStateSerializedBlockHash(wtx.m_state) == TxStateSerializedBlockHash(state));
1110
0
        }
1111
        // If we have a witness-stripped version of this transaction, and we
1112
        // see a new version with a witness, then we must be upgrading a pre-segwit
1113
        // wallet.  Store the new version of the transaction with the witness,
1114
        // as the stripped-version must be invalid.
1115
        // TODO: Store all versions of the transaction, instead of just one.
1116
0
        if (tx->HasWitness() && !wtx.tx->HasWitness()) {
1117
0
            wtx.SetTx(tx);
1118
0
            fUpdated = true;
1119
0
        }
1120
0
    }
1121
1122
    // Mark inactive coinbase transactions and their descendants as abandoned
1123
0
    if (wtx.IsCoinBase() && wtx.isInactive()) {
1124
0
        std::vector<CWalletTx*> txs{&wtx};
1125
1126
0
        TxStateInactive inactive_state = TxStateInactive{/*abandoned=*/true};
1127
1128
0
        while (!txs.empty()) {
1129
0
            CWalletTx* desc_tx = txs.back();
1130
0
            txs.pop_back();
1131
0
            desc_tx->m_state = inactive_state;
1132
            // Break caches since we have changed the state
1133
0
            desc_tx->MarkDirty();
1134
0
            batch.WriteTx(*desc_tx);
1135
0
            MarkInputsDirty(desc_tx->tx);
1136
0
            for (unsigned int i = 0; i < desc_tx->tx->vout.size(); ++i) {
1137
0
                COutPoint outpoint(desc_tx->GetHash(), i);
1138
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(outpoint);
1139
0
                for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
1140
0
                    const auto wit = mapWallet.find(it->second);
1141
0
                    if (wit != mapWallet.end()) {
1142
0
                        txs.push_back(&wit->second);
1143
0
                    }
1144
0
                }
1145
0
            }
1146
0
        }
1147
0
    }
1148
1149
    //// debug print
1150
0
    WalletLogPrintf("AddToWallet %s  %s%s %s\n", hash.ToString(), (fInsertedNew ? "new" : ""), (fUpdated ? "update" : ""), TxStateString(state));
1151
1152
    // Write to disk
1153
0
    if (fInsertedNew || fUpdated)
1154
0
        if (!batch.WriteTx(wtx))
1155
0
            return nullptr;
1156
1157
    // Break debit/credit balance caches:
1158
0
    wtx.MarkDirty();
1159
1160
    // Notify UI of new or updated transaction
1161
0
    NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED);
1162
1163
0
#if HAVE_SYSTEM
1164
    // notify an external script when a wallet transaction comes in or is updated
1165
0
    std::string strCmd = m_notify_tx_changed_script;
1166
1167
0
    if (!strCmd.empty())
1168
0
    {
1169
0
        ReplaceAll(strCmd, "%s", hash.GetHex());
1170
0
        if (auto* conf = wtx.state<TxStateConfirmed>())
1171
0
        {
1172
0
            ReplaceAll(strCmd, "%b", conf->confirmed_block_hash.GetHex());
1173
0
            ReplaceAll(strCmd, "%h", ToString(conf->confirmed_block_height));
1174
0
        } else {
1175
0
            ReplaceAll(strCmd, "%b", "unconfirmed");
1176
0
            ReplaceAll(strCmd, "%h", "-1");
1177
0
        }
1178
0
#ifndef WIN32
1179
        // Substituting the wallet name isn't currently supported on windows
1180
        // because windows shell escaping has not been implemented yet:
1181
        // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
1182
        // A few ways it could be implemented in the future are described in:
1183
        // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
1184
0
        ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
1185
0
#endif
1186
0
        std::thread t(runCommand, strCmd);
1187
0
        t.detach(); // thread runs free
1188
0
    }
1189
0
#endif
1190
1191
0
    return &wtx;
1192
0
}
1193
1194
bool CWallet::LoadToWallet(const uint256& hash, const UpdateWalletTxFn& fill_wtx)
1195
0
{
1196
0
    const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(nullptr, TxStateInactive{}));
1197
0
    CWalletTx& wtx = ins.first->second;
1198
0
    if (!fill_wtx(wtx, ins.second)) {
1199
0
        return false;
1200
0
    }
1201
    // If wallet doesn't have a chain (e.g when using bitcoin-wallet tool),
1202
    // don't bother to update txn.
1203
0
    if (HaveChain()) {
1204
0
      wtx.updateState(chain());
1205
0
    }
1206
0
    if (/* insertion took place */ ins.second) {
1207
0
        wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1208
0
    }
1209
0
    AddToSpends(wtx);
1210
0
    for (const CTxIn& txin : wtx.tx->vin) {
1211
0
        auto it = mapWallet.find(txin.prevout.hash);
1212
0
        if (it != mapWallet.end()) {
1213
0
            CWalletTx& prevtx = it->second;
1214
0
            if (auto* prev = prevtx.state<TxStateBlockConflicted>()) {
1215
0
                MarkConflicted(prev->conflicting_block_hash, prev->conflicting_block_height, wtx.GetHash());
1216
0
            }
1217
0
        }
1218
0
    }
1219
1220
    // Update birth time when tx time is older than it.
1221
0
    MaybeUpdateBirthTime(wtx.GetTxTime());
1222
1223
0
    return true;
1224
0
}
1225
1226
bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, const SyncTxState& state, bool fUpdate, bool rescanning_old_block)
1227
0
{
1228
0
    const CTransaction& tx = *ptx;
1229
0
    {
1230
0
        AssertLockHeld(cs_wallet);
1231
1232
0
        if (auto* conf = std::get_if<TxStateConfirmed>(&state)) {
1233
0
            for (const CTxIn& txin : tx.vin) {
1234
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout);
1235
0
                while (range.first != range.second) {
1236
0
                    if (range.first->second != tx.GetHash()) {
1237
0
                        WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), conf->confirmed_block_hash.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n);
1238
0
                        MarkConflicted(conf->confirmed_block_hash, conf->confirmed_block_height, range.first->second);
1239
0
                    }
1240
0
                    range.first++;
1241
0
                }
1242
0
            }
1243
0
        }
1244
1245
0
        bool fExisted = mapWallet.count(tx.GetHash()) != 0;
1246
0
        if (fExisted && !fUpdate) return false;
1247
0
        if (fExisted || IsMine(tx) || IsFromMe(tx))
1248
0
        {
1249
            /* Check if any keys in the wallet keypool that were supposed to be unused
1250
             * have appeared in a new transaction. If so, remove those keys from the keypool.
1251
             * This can happen when restoring an old wallet backup that does not contain
1252
             * the mostly recently created transactions from newer versions of the wallet.
1253
             */
1254
1255
            // loop though all outputs
1256
0
            for (const CTxOut& txout: tx.vout) {
1257
0
                for (const auto& spk_man : GetScriptPubKeyMans(txout.scriptPubKey)) {
1258
0
                    for (auto &dest : spk_man->MarkUnusedAddresses(txout.scriptPubKey)) {
1259
                        // If internal flag is not defined try to infer it from the ScriptPubKeyMan
1260
0
                        if (!dest.internal.has_value()) {
1261
0
                            dest.internal = IsInternalScriptPubKeyMan(spk_man);
1262
0
                        }
1263
1264
                        // skip if can't determine whether it's a receiving address or not
1265
0
                        if (!dest.internal.has_value()) continue;
1266
1267
                        // If this is a receiving address and it's not in the address book yet
1268
                        // (e.g. it wasn't generated on this node or we're restoring from backup)
1269
                        // add it to the address book for proper transaction accounting
1270
0
                        if (!*dest.internal && !FindAddressBookEntry(dest.dest, /* allow_change= */ false)) {
1271
0
                            SetAddressBook(dest.dest, "", AddressPurpose::RECEIVE);
1272
0
                        }
1273
0
                    }
1274
0
                }
1275
0
            }
1276
1277
            // Block disconnection override an abandoned tx as unconfirmed
1278
            // which means user may have to call abandontransaction again
1279
0
            TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKS8_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKS9_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKSA_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
1280
0
            CWalletTx* wtx = AddToWallet(MakeTransactionRef(tx), tx_state, /*update_wtx=*/nullptr, /*fFlushOnClose=*/false, rescanning_old_block);
1281
0
            if (!wtx) {
1282
                // Can only be nullptr if there was a db write error (missing db, read-only db or a db engine internal writing error).
1283
                // As we only store arriving transaction in this process, and we don't want an inconsistent state, let's throw an error.
1284
0
                throw std::runtime_error("DB error adding transaction to wallet, write failed");
1285
0
            }
1286
0
            return true;
1287
0
        }
1288
0
    }
1289
0
    return false;
1290
0
}
1291
1292
bool CWallet::TransactionCanBeAbandoned(const uint256& hashTx) const
1293
0
{
1294
0
    LOCK(cs_wallet);
1295
0
    const CWalletTx* wtx = GetWalletTx(hashTx);
1296
0
    return wtx && !wtx->isAbandoned() && GetTxDepthInMainChain(*wtx) == 0 && !wtx->InMempool();
1297
0
}
1298
1299
void CWallet::MarkInputsDirty(const CTransactionRef& tx)
1300
0
{
1301
0
    for (const CTxIn& txin : tx->vin) {
1302
0
        auto it = mapWallet.find(txin.prevout.hash);
1303
0
        if (it != mapWallet.end()) {
1304
0
            it->second.MarkDirty();
1305
0
        }
1306
0
    }
1307
0
}
1308
1309
bool CWallet::AbandonTransaction(const uint256& hashTx)
1310
0
{
1311
0
    LOCK(cs_wallet);
1312
1313
    // Can't mark abandoned if confirmed or in mempool
1314
0
    auto it = mapWallet.find(hashTx);
1315
0
    assert(it != mapWallet.end());
1316
0
    const CWalletTx& origtx = it->second;
1317
0
    if (GetTxDepthInMainChain(origtx) != 0 || origtx.InMempool()) {
1318
0
        return false;
1319
0
    }
1320
1321
0
    auto try_updating_state = [](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1322
        // If the orig tx was not in block/mempool, none of its spends can be.
1323
0
        assert(!wtx.isConfirmed());
1324
0
        assert(!wtx.InMempool());
1325
        // If already conflicted or abandoned, no need to set abandoned
1326
0
        if (!wtx.isBlockConflicted() && !wtx.isAbandoned()) {
1327
0
            wtx.m_state = TxStateInactive{/*abandoned=*/true};
1328
0
            return TxUpdate::NOTIFY_CHANGED;
1329
0
        }
1330
0
        return TxUpdate::UNCHANGED;
1331
0
    };
1332
1333
    // Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too.
1334
    // States are not permanent, so these transactions can become unabandoned if they are re-added to the
1335
    // mempool, or confirmed in a block, or conflicted.
1336
    // Note: If the reorged coinbase is re-added to the main chain, the descendants that have not had their
1337
    // states change will remain abandoned and will require manual broadcast if the user wants them.
1338
1339
0
    RecursiveUpdateTxState(hashTx, try_updating_state);
1340
1341
0
    return true;
1342
0
}
1343
1344
void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const uint256& hashTx)
1345
0
{
1346
0
    LOCK(cs_wallet);
1347
1348
    // If number of conflict confirms cannot be determined, this means
1349
    // that the block is still unknown or not yet part of the main chain,
1350
    // for example when loading the wallet during a reindex. Do nothing in that
1351
    // case.
1352
0
    if (m_last_block_processed_height < 0 || conflicting_height < 0) {
1353
0
        return;
1354
0
    }
1355
0
    int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1;
1356
0
    if (conflictconfirms >= 0)
1357
0
        return;
1358
1359
0
    auto try_updating_state = [&](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1360
0
        if (conflictconfirms < GetTxDepthInMainChain(wtx)) {
1361
            // Block is 'more conflicted' than current confirm; update.
1362
            // Mark transaction as conflicted with this block.
1363
0
            wtx.m_state = TxStateBlockConflicted{hashBlock, conflicting_height};
1364
0
            return TxUpdate::CHANGED;
1365
0
        }
1366
0
        return TxUpdate::UNCHANGED;
1367
0
    };
1368
1369
    // Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too.
1370
0
    RecursiveUpdateTxState(hashTx, try_updating_state);
1371
1372
0
}
1373
1374
0
void CWallet::RecursiveUpdateTxState(const uint256& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1375
    // Do not flush the wallet here for performance reasons
1376
0
    WalletBatch batch(GetDatabase(), false);
1377
0
    RecursiveUpdateTxState(&batch, tx_hash, try_updating_state);
1378
0
}
1379
1380
0
void CWallet::RecursiveUpdateTxState(WalletBatch* batch, const uint256& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1381
0
    std::set<uint256> todo;
1382
0
    std::set<uint256> done;
1383
1384
0
    todo.insert(tx_hash);
1385
1386
0
    while (!todo.empty()) {
1387
0
        uint256 now = *todo.begin();
1388
0
        todo.erase(now);
1389
0
        done.insert(now);
1390
0
        auto it = mapWallet.find(now);
1391
0
        assert(it != mapWallet.end());
1392
0
        CWalletTx& wtx = it->second;
1393
1394
0
        TxUpdate update_state = try_updating_state(wtx);
1395
0
        if (update_state != TxUpdate::UNCHANGED) {
1396
0
            wtx.MarkDirty();
1397
0
            if (batch) batch->WriteTx(wtx);
1398
            // Iterate over all its outputs, and update those tx states as well (if applicable)
1399
0
            for (unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
1400
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(COutPoint(Txid::FromUint256(now), i));
1401
0
                for (TxSpends::const_iterator iter = range.first; iter != range.second; ++iter) {
1402
0
                    if (!done.count(iter->second)) {
1403
0
                        todo.insert(iter->second);
1404
0
                    }
1405
0
                }
1406
0
            }
1407
1408
0
            if (update_state == TxUpdate::NOTIFY_CHANGED) {
1409
0
                NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED);
1410
0
            }
1411
1412
            // If a transaction changes its tx state, that usually changes the balance
1413
            // available of the outputs it spends. So force those to be recomputed
1414
0
            MarkInputsDirty(wtx.tx);
1415
0
        }
1416
0
    }
1417
0
}
1418
1419
void CWallet::SyncTransaction(const CTransactionRef& ptx, const SyncTxState& state, bool update_tx, bool rescanning_old_block)
1420
0
{
1421
0
    if (!AddToWalletIfInvolvingMe(ptx, state, update_tx, rescanning_old_block))
1422
0
        return; // Not one of ours
1423
1424
    // If a transaction changes 'conflicted' state, that changes the balance
1425
    // available of the outputs it spends. So force those to be
1426
    // recomputed, also:
1427
0
    MarkInputsDirty(ptx);
1428
0
}
1429
1430
0
void CWallet::transactionAddedToMempool(const CTransactionRef& tx) {
1431
0
    LOCK(cs_wallet);
1432
0
    SyncTransaction(tx, TxStateInMempool{});
1433
1434
0
    auto it = mapWallet.find(tx->GetHash());
1435
0
    if (it != mapWallet.end()) {
1436
0
        RefreshMempoolStatus(it->second, chain());
1437
0
    }
1438
1439
0
    const Txid& txid = tx->GetHash();
1440
1441
0
    for (const CTxIn& tx_in : tx->vin) {
1442
        // For each wallet transaction spending this prevout..
1443
0
        for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1444
0
            const uint256& spent_id = range.first->second;
1445
            // Skip the recently added tx
1446
0
            if (spent_id == txid) continue;
1447
0
            RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1448
0
                return wtx.mempool_conflicts.insert(txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1449
0
            });
1450
0
        }
1451
0
    }
1452
0
}
1453
1454
0
void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason) {
1455
0
    LOCK(cs_wallet);
1456
0
    auto it = mapWallet.find(tx->GetHash());
1457
0
    if (it != mapWallet.end()) {
1458
0
        RefreshMempoolStatus(it->second, chain());
1459
0
    }
1460
    // Handle transactions that were removed from the mempool because they
1461
    // conflict with transactions in a newly connected block.
1462
0
    if (reason == MemPoolRemovalReason::CONFLICT) {
1463
        // Trigger external -walletnotify notifications for these transactions.
1464
        // Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons:
1465
        //
1466
        // 1. The transactionRemovedFromMempool callback does not currently
1467
        //    provide the conflicting block's hash and height, and for backwards
1468
        //    compatibility reasons it may not be not safe to store conflicted
1469
        //    wallet transactions with a null block hash. See
1470
        //    https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993.
1471
        // 2. For most of these transactions, the wallet's internal conflict
1472
        //    detection in the blockConnected handler will subsequently call
1473
        //    MarkConflicted and update them with CONFLICTED status anyway. This
1474
        //    applies to any wallet transaction that has inputs spent in the
1475
        //    block, or that has ancestors in the wallet with inputs spent by
1476
        //    the block.
1477
        // 3. Longstanding behavior since the sync implementation in
1478
        //    https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync
1479
        //    implementation before that was to mark these transactions
1480
        //    unconfirmed rather than conflicted.
1481
        //
1482
        // Nothing described above should be seen as an unchangeable requirement
1483
        // when improving this code in the future. The wallet's heuristics for
1484
        // distinguishing between conflicted and unconfirmed transactions are
1485
        // imperfect, and could be improved in general, see
1486
        // https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking
1487
0
        SyncTransaction(tx, TxStateInactive{});
1488
0
    }
1489
1490
0
    const Txid& txid = tx->GetHash();
1491
1492
0
    for (const CTxIn& tx_in : tx->vin) {
1493
        // Iterate over all wallet transactions spending txin.prev
1494
        // and recursively mark them as no longer conflicting with
1495
        // txid
1496
0
        for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1497
0
            const uint256& spent_id = range.first->second;
1498
1499
0
            RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1500
0
                return wtx.mempool_conflicts.erase(txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1501
0
            });
1502
0
        }
1503
0
    }
1504
0
}
1505
1506
void CWallet::blockConnected(ChainstateRole role, const interfaces::BlockInfo& block)
1507
0
{
1508
0
    if (role == ChainstateRole::BACKGROUND) {
1509
0
        return;
1510
0
    }
1511
0
    assert(block.data);
1512
0
    LOCK(cs_wallet);
1513
1514
0
    m_last_block_processed_height = block.height;
1515
0
    m_last_block_processed = block.hash;
1516
1517
    // No need to scan block if it was created before the wallet birthday.
1518
    // Uses chain max time and twice the grace period to adjust time for block time variability.
1519
0
    if (block.chain_time_max < m_birth_time.load() - (TIMESTAMP_WINDOW * 2)) return;
1520
1521
    // Scan block
1522
0
    for (size_t index = 0; index < block.data->vtx.size(); index++) {
1523
0
        SyncTransaction(block.data->vtx[index], TxStateConfirmed{block.hash, block.height, static_cast<int>(index)});
1524
0
        transactionRemovedFromMempool(block.data->vtx[index], MemPoolRemovalReason::BLOCK);
1525
0
    }
1526
0
}
1527
1528
void CWallet::blockDisconnected(const interfaces::BlockInfo& block)
1529
0
{
1530
0
    assert(block.data);
1531
0
    LOCK(cs_wallet);
1532
1533
    // At block disconnection, this will change an abandoned transaction to
1534
    // be unconfirmed, whether or not the transaction is added back to the mempool.
1535
    // User may have to call abandontransaction again. It may be addressed in the
1536
    // future with a stickier abandoned state or even removing abandontransaction call.
1537
0
    m_last_block_processed_height = block.height - 1;
1538
0
    m_last_block_processed = *Assert(block.prev_hash);
1539
1540
0
    int disconnect_height = block.height;
1541
1542
0
    for (const CTransactionRef& ptx : Assert(block.data)->vtx) {
1543
0
        SyncTransaction(ptx, TxStateInactive{});
1544
1545
0
        for (const CTxIn& tx_in : ptx->vin) {
1546
            // No other wallet transactions conflicted with this transaction
1547
0
            if (mapTxSpends.count(tx_in.prevout) < 1) continue;
1548
1549
0
            std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(tx_in.prevout);
1550
1551
            // For all of the spends that conflict with this transaction
1552
0
            for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) {
1553
0
                CWalletTx& wtx = mapWallet.find(_it->second)->second;
1554
1555
0
                if (!wtx.isBlockConflicted()) continue;
1556
1557
0
                auto try_updating_state = [&](CWalletTx& tx) {
1558
0
                    if (!tx.isBlockConflicted()) return TxUpdate::UNCHANGED;
1559
0
                    if (tx.state<TxStateBlockConflicted>()->conflicting_block_height >= disconnect_height) {
1560
0
                        tx.m_state = TxStateInactive{};
1561
0
                        return TxUpdate::CHANGED;
1562
0
                    }
1563
0
                    return TxUpdate::UNCHANGED;
1564
0
                };
1565
1566
0
                RecursiveUpdateTxState(wtx.tx->GetHash(), try_updating_state);
1567
0
            }
1568
0
        }
1569
0
    }
1570
0
}
1571
1572
void CWallet::updatedBlockTip()
1573
0
{
1574
0
    m_best_block_time = GetTime();
1575
0
}
1576
1577
0
void CWallet::BlockUntilSyncedToCurrentChain() const {
1578
0
    AssertLockNotHeld(cs_wallet);
1579
    // Skip the queue-draining stuff if we know we're caught up with
1580
    // chain().Tip(), otherwise put a callback in the validation interface queue and wait
1581
    // for the queue to drain enough to execute it (indicating we are caught up
1582
    // at least with the time we entered this function).
1583
0
    uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed);
1584
0
    chain().waitForNotificationsIfTipChanged(last_block_hash);
1585
0
}
1586
1587
// Note that this function doesn't distinguish between a 0-valued input,
1588
// and a not-"is mine" (according to the filter) input.
1589
CAmount CWallet::GetDebit(const CTxIn &txin, const isminefilter& filter) const
1590
0
{
1591
0
    {
1592
0
        LOCK(cs_wallet);
1593
0
        const auto mi = mapWallet.find(txin.prevout.hash);
1594
0
        if (mi != mapWallet.end())
1595
0
        {
1596
0
            const CWalletTx& prev = (*mi).second;
1597
0
            if (txin.prevout.n < prev.tx->vout.size())
1598
0
                if (IsMine(prev.tx->vout[txin.prevout.n]) & filter)
1599
0
                    return prev.tx->vout[txin.prevout.n].nValue;
1600
0
        }
1601
0
    }
1602
0
    return 0;
1603
0
}
1604
1605
isminetype CWallet::IsMine(const CTxOut& txout) const
1606
0
{
1607
0
    AssertLockHeld(cs_wallet);
1608
0
    return IsMine(txout.scriptPubKey);
1609
0
}
1610
1611
isminetype CWallet::IsMine(const CTxDestination& dest) const
1612
0
{
1613
0
    AssertLockHeld(cs_wallet);
1614
0
    return IsMine(GetScriptForDestination(dest));
1615
0
}
1616
1617
isminetype CWallet::IsMine(const CScript& script) const
1618
0
{
1619
0
    AssertLockHeld(cs_wallet);
1620
1621
    // Search the cache so that IsMine is called only on the relevant SPKMs instead of on everything in m_spk_managers
1622
0
    const auto& it = m_cached_spks.find(script);
1623
0
    if (it != m_cached_spks.end()) {
1624
0
        isminetype res = ISMINE_NO;
1625
0
        for (const auto& spkm : it->second) {
1626
0
            res = std::max(res, spkm->IsMine(script));
1627
0
        }
1628
0
        Assume(res == ISMINE_SPENDABLE);
1629
0
        return res;
1630
0
    }
1631
1632
    // Legacy wallet
1633
0
    if (LegacyScriptPubKeyMan* spkm = GetLegacyScriptPubKeyMan()) {
1634
0
        return spkm->IsMine(script);
1635
0
    }
1636
1637
0
    return ISMINE_NO;
1638
0
}
1639
1640
bool CWallet::IsMine(const CTransaction& tx) const
1641
0
{
1642
0
    AssertLockHeld(cs_wallet);
1643
0
    for (const CTxOut& txout : tx.vout)
1644
0
        if (IsMine(txout))
1645
0
            return true;
1646
0
    return false;
1647
0
}
1648
1649
isminetype CWallet::IsMine(const COutPoint& outpoint) const
1650
0
{
1651
0
    AssertLockHeld(cs_wallet);
1652
0
    auto wtx = GetWalletTx(outpoint.hash);
1653
0
    if (!wtx) {
1654
0
        return ISMINE_NO;
1655
0
    }
1656
0
    if (outpoint.n >= wtx->tx->vout.size()) {
1657
0
        return ISMINE_NO;
1658
0
    }
1659
0
    return IsMine(wtx->tx->vout[outpoint.n]);
1660
0
}
1661
1662
bool CWallet::IsFromMe(const CTransaction& tx) const
1663
0
{
1664
0
    return (GetDebit(tx, ISMINE_ALL) > 0);
1665
0
}
1666
1667
CAmount CWallet::GetDebit(const CTransaction& tx, const isminefilter& filter) const
1668
0
{
1669
0
    CAmount nDebit = 0;
1670
0
    for (const CTxIn& txin : tx.vin)
1671
0
    {
1672
0
        nDebit += GetDebit(txin, filter);
1673
0
        if (!MoneyRange(nDebit))
1674
0
            throw std::runtime_error(std::string(__func__) + ": value out of range");
1675
0
    }
1676
0
    return nDebit;
1677
0
}
1678
1679
bool CWallet::IsHDEnabled() const
1680
0
{
1681
    // All Active ScriptPubKeyMans must be HD for this to be true
1682
0
    bool result = false;
1683
0
    for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
1684
0
        if (!spk_man->IsHDEnabled()) return false;
1685
0
        result = true;
1686
0
    }
1687
0
    return result;
1688
0
}
1689
1690
bool CWallet::CanGetAddresses(bool internal) const
1691
0
{
1692
0
    LOCK(cs_wallet);
1693
0
    if (m_spk_managers.empty()) return false;
1694
0
    for (OutputType t : OUTPUT_TYPES) {
1695
0
        auto spk_man = GetScriptPubKeyMan(t, internal);
1696
0
        if (spk_man && spk_man->CanGetAddresses(internal)) {
1697
0
            return true;
1698
0
        }
1699
0
    }
1700
0
    return false;
1701
0
}
1702
1703
void CWallet::SetWalletFlag(uint64_t flags)
1704
0
{
1705
0
    LOCK(cs_wallet);
1706
0
    m_wallet_flags |= flags;
1707
0
    if (!WalletBatch(GetDatabase()).WriteWalletFlags(m_wallet_flags))
1708
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1709
0
}
1710
1711
void CWallet::UnsetWalletFlag(uint64_t flag)
1712
0
{
1713
0
    WalletBatch batch(GetDatabase());
1714
0
    UnsetWalletFlagWithDB(batch, flag);
1715
0
}
1716
1717
void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag)
1718
0
{
1719
0
    LOCK(cs_wallet);
1720
0
    m_wallet_flags &= ~flag;
1721
0
    if (!batch.WriteWalletFlags(m_wallet_flags))
1722
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1723
0
}
1724
1725
void CWallet::UnsetBlankWalletFlag(WalletBatch& batch)
1726
0
{
1727
0
    UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET);
1728
0
}
1729
1730
bool CWallet::IsWalletFlagSet(uint64_t flag) const
1731
0
{
1732
0
    return (m_wallet_flags & flag);
1733
0
}
1734
1735
bool CWallet::LoadWalletFlags(uint64_t flags)
1736
0
{
1737
0
    LOCK(cs_wallet);
1738
0
    if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) {
1739
        // contains unknown non-tolerable wallet flags
1740
0
        return false;
1741
0
    }
1742
0
    m_wallet_flags = flags;
1743
1744
0
    return true;
1745
0
}
1746
1747
void CWallet::InitWalletFlags(uint64_t flags)
1748
0
{
1749
0
    LOCK(cs_wallet);
1750
1751
    // We should never be writing unknown non-tolerable wallet flags
1752
0
    assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32));
1753
    // This should only be used once, when creating a new wallet - so current flags are expected to be blank
1754
0
    assert(m_wallet_flags == 0);
1755
1756
0
    if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) {
1757
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1758
0
    }
1759
1760
0
    if (!LoadWalletFlags(flags)) assert(false);
1761
0
}
1762
1763
bool CWallet::ImportScripts(const std::set<CScript> scripts, int64_t timestamp)
1764
0
{
1765
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1766
0
    if (!spk_man) {
1767
0
        return false;
1768
0
    }
1769
0
    LOCK(spk_man->cs_KeyStore);
1770
0
    return spk_man->ImportScripts(scripts, timestamp);
1771
0
}
1772
1773
bool CWallet::ImportPrivKeys(const std::map<CKeyID, CKey>& privkey_map, const int64_t timestamp)
1774
0
{
1775
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1776
0
    if (!spk_man) {
1777
0
        return false;
1778
0
    }
1779
0
    LOCK(spk_man->cs_KeyStore);
1780
0
    return spk_man->ImportPrivKeys(privkey_map, timestamp);
1781
0
}
1782
1783
bool CWallet::ImportPubKeys(const std::vector<std::pair<CKeyID, bool>>& ordered_pubkeys, const std::map<CKeyID, CPubKey>& pubkey_map, const std::map<CKeyID, std::pair<CPubKey, KeyOriginInfo>>& key_origins, const bool add_keypool, const int64_t timestamp)
1784
0
{
1785
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1786
0
    if (!spk_man) {
1787
0
        return false;
1788
0
    }
1789
0
    LOCK(spk_man->cs_KeyStore);
1790
0
    return spk_man->ImportPubKeys(ordered_pubkeys, pubkey_map, key_origins, add_keypool, timestamp);
1791
0
}
1792
1793
bool CWallet::ImportScriptPubKeys(const std::string& label, const std::set<CScript>& script_pub_keys, const bool have_solving_data, const bool apply_label, const int64_t timestamp)
1794
0
{
1795
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1796
0
    if (!spk_man) {
1797
0
        return false;
1798
0
    }
1799
0
    LOCK(spk_man->cs_KeyStore);
1800
0
    if (!spk_man->ImportScriptPubKeys(script_pub_keys, have_solving_data, timestamp)) {
1801
0
        return false;
1802
0
    }
1803
0
    if (apply_label) {
1804
0
        WalletBatch batch(GetDatabase());
1805
0
        for (const CScript& script : script_pub_keys) {
1806
0
            CTxDestination dest;
1807
0
            ExtractDestination(script, dest);
1808
0
            if (IsValidDestination(dest)) {
1809
0
                SetAddressBookWithDB(batch, dest, label, AddressPurpose::RECEIVE);
1810
0
            }
1811
0
        }
1812
0
    }
1813
0
    return true;
1814
0
}
1815
1816
void CWallet::MaybeUpdateBirthTime(int64_t time)
1817
0
{
1818
0
    int64_t birthtime = m_birth_time.load();
1819
0
    if (time < birthtime) {
1820
0
        m_birth_time = time;
1821
0
    }
1822
0
}
1823
1824
/**
1825
 * Scan active chain for relevant transactions after importing keys. This should
1826
 * be called whenever new keys are added to the wallet, with the oldest key
1827
 * creation time.
1828
 *
1829
 * @return Earliest timestamp that could be successfully scanned from. Timestamp
1830
 * returned will be higher than startTime if relevant blocks could not be read.
1831
 */
1832
int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update)
1833
0
{
1834
    // Find starting block. May be null if nCreateTime is greater than the
1835
    // highest blockchain timestamp, in which case there is nothing that needs
1836
    // to be scanned.
1837
0
    int start_height = 0;
1838
0
    uint256 start_block;
1839
0
    bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height));
1840
0
    WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);
1841
1842
0
    if (start) {
1843
        // TODO: this should take into account failure by ScanResult::USER_ABORT
1844
0
        ScanResult result = ScanForWalletTransactions(start_block, start_height, /*max_height=*/{}, reserver, /*fUpdate=*/update, /*save_progress=*/false);
1845
0
        if (result.status == ScanResult::FAILURE) {
1846
0
            int64_t time_max;
1847
0
            CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max)));
1848
0
            return time_max + TIMESTAMP_WINDOW + 1;
1849
0
        }
1850
0
    }
1851
0
    return startTime;
1852
0
}
1853
1854
/**
1855
 * Scan the block chain (starting in start_block) for transactions
1856
 * from or to us. If fUpdate is true, found transactions that already
1857
 * exist in the wallet will be updated. If max_height is not set, the
1858
 * mempool will be scanned as well.
1859
 *
1860
 * @param[in] start_block Scan starting block. If block is not on the active
1861
 *                        chain, the scan will return SUCCESS immediately.
1862
 * @param[in] start_height Height of start_block
1863
 * @param[in] max_height  Optional max scanning height. If unset there is
1864
 *                        no maximum and scanning can continue to the tip
1865
 *
1866
 * @return ScanResult returning scan information and indicating success or
1867
 *         failure. Return status will be set to SUCCESS if scan was
1868
 *         successful. FAILURE if a complete rescan was not possible (due to
1869
 *         pruning or corruption). USER_ABORT if the rescan was aborted before
1870
 *         it could complete.
1871
 *
1872
 * @pre Caller needs to make sure start_block (and the optional stop_block) are on
1873
 * the main chain after to the addition of any new keys you want to detect
1874
 * transactions for.
1875
 */
1876
CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate, const bool save_progress)
1877
0
{
1878
0
    constexpr auto INTERVAL_TIME{60s};
1879
0
    auto current_time{reserver.now()};
1880
0
    auto start_time{reserver.now()};
1881
1882
0
    assert(reserver.isReserved());
1883
1884
0
    uint256 block_hash = start_block;
1885
0
    ScanResult result;
1886
1887
0
    std::unique_ptr<FastWalletRescanFilter> fast_rescan_filter;
1888
0
    if (!IsLegacy() && chain().hasBlockFilterIndex(BlockFilterType::BASIC)) fast_rescan_filter = std::make_unique<FastWalletRescanFilter>(*this);
1889
1890
0
    WalletLogPrintf("Rescan started from block %s... (%s)\n", start_block.ToString(),
1891
0
                    fast_rescan_filter ? "fast variant using block filters" : "slow variant inspecting all blocks");
1892
1893
0
    fAbortRescan = false;
1894
0
    ShowProgress(strprintf("%s " + _("Rescanning…").translated, GetDisplayName()), 0); // show rescan progress in GUI as dialog or on splashscreen, if rescan required on startup (e.g. due to corruption)
1895
0
    uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1896
0
    uint256 end_hash = tip_hash;
1897
0
    if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash));
1898
0
    double progress_begin = chain().guessVerificationProgress(block_hash);
1899
0
    double progress_end = chain().guessVerificationProgress(end_hash);
1900
0
    double progress_current = progress_begin;
1901
0
    int block_height = start_height;
1902
0
    while (!fAbortRescan && !chain().shutdownRequested()) {
1903
0
        if (progress_end - progress_begin > 0.0) {
1904
0
            m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin);
1905
0
        } else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal)
1906
0
            m_scanning_progress = 0;
1907
0
        }
1908
0
        if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) {
1909
0
            ShowProgress(strprintf("%s " + _("Rescanning…").translated, GetDisplayName()), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));
1910
0
        }
1911
1912
0
        bool next_interval = reserver.now() >= current_time + INTERVAL_TIME;
1913
0
        if (next_interval) {
1914
0
            current_time = reserver.now();
1915
0
            WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current);
1916
0
        }
1917
1918
0
        bool fetch_block{true};
1919
0
        if (fast_rescan_filter) {
1920
0
            fast_rescan_filter->UpdateIfNeeded();
1921
0
            auto matches_block{fast_rescan_filter->MatchesBlock(block_hash)};
1922
0
            if (matches_block.has_value()) {
1923
0
                if (*matches_block) {
1924
0
                    LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (filter matched)\n", block_height, block_hash.ToString());
1925
0
                } else {
1926
0
                    result.last_scanned_block = block_hash;
1927
0
                    result.last_scanned_height = block_height;
1928
0
                    fetch_block = false;
1929
0
                }
1930
0
            } else {
1931
0
                LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (WARNING: block filter not found!)\n", block_height, block_hash.ToString());
1932
0
            }
1933
0
        }
1934
1935
        // Find next block separately from reading data above, because reading
1936
        // is slow and there might be a reorg while it is read.
1937
0
        bool block_still_active = false;
1938
0
        bool next_block = false;
1939
0
        uint256 next_block_hash;
1940
0
        chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash)));
1941
1942
0
        if (fetch_block) {
1943
            // Read block data
1944
0
            CBlock block;
1945
0
            chain().findBlock(block_hash, FoundBlock().data(block));
1946
1947
0
            if (!block.IsNull()) {
1948
0
                LOCK(cs_wallet);
1949
0
                if (!block_still_active) {
1950
                    // Abort scan if current block is no longer active, to prevent
1951
                    // marking transactions as coming from the wrong block.
1952
0
                    result.last_failed_block = block_hash;
1953
0
                    result.status = ScanResult::FAILURE;
1954
0
                    break;
1955
0
                }
1956
0
                for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) {
1957
0
                    SyncTransaction(block.vtx[posInBlock], TxStateConfirmed{block_hash, block_height, static_cast<int>(posInBlock)}, fUpdate, /*rescanning_old_block=*/true);
1958
0
                }
1959
                // scan succeeded, record block as most recent successfully scanned
1960
0
                result.last_scanned_block = block_hash;
1961
0
                result.last_scanned_height = block_height;
1962
1963
0
                if (save_progress && next_interval) {
1964
0
                    CBlockLocator loc = m_chain->getActiveChainLocator(block_hash);
1965
1966
0
                    if (!loc.IsNull()) {
1967
0
                        WalletLogPrintf("Saving scan progress %d.\n", block_height);
1968
0
                        WalletBatch batch(GetDatabase());
1969
0
                        batch.WriteBestBlock(loc);
1970
0
                    }
1971
0
                }
1972
0
            } else {
1973
                // could not scan block, keep scanning but record this block as the most recent failure
1974
0
                result.last_failed_block = block_hash;
1975
0
                result.status = ScanResult::FAILURE;
1976
0
            }
1977
0
        }
1978
0
        if (max_height && block_height >= *max_height) {
1979
0
            break;
1980
0
        }
1981
0
        {
1982
0
            if (!next_block) {
1983
                // break successfully when rescan has reached the tip, or
1984
                // previous block is no longer on the chain due to a reorg
1985
0
                break;
1986
0
            }
1987
1988
            // increment block and verification progress
1989
0
            block_hash = next_block_hash;
1990
0
            ++block_height;
1991
0
            progress_current = chain().guessVerificationProgress(block_hash);
1992
1993
            // handle updated tip hash
1994
0
            const uint256 prev_tip_hash = tip_hash;
1995
0
            tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1996
0
            if (!max_height && prev_tip_hash != tip_hash) {
1997
                // in case the tip has changed, update progress max
1998
0
                progress_end = chain().guessVerificationProgress(tip_hash);
1999
0
            }
2000
0
        }
2001
0
    }
2002
0
    if (!max_height) {
2003
0
        WalletLogPrintf("Scanning current mempool transactions.\n");
2004
0
        WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
2005
0
    }
2006
0
    ShowProgress(strprintf("%s " + _("Rescanning…").translated, GetDisplayName()), 100); // hide progress dialog in GUI
2007
0
    if (block_height && fAbortRescan) {
2008
0
        WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current);
2009
0
        result.status = ScanResult::USER_ABORT;
2010
0
    } else if (block_height && chain().shutdownRequested()) {
2011
0
        WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current);
2012
0
        result.status = ScanResult::USER_ABORT;
2013
0
    } else {
2014
0
        WalletLogPrintf("Rescan completed in %15dms\n", Ticks<std::chrono::milliseconds>(reserver.now() - start_time));
2015
0
    }
2016
0
    return result;
2017
0
}
2018
2019
bool CWallet::SubmitTxMemoryPoolAndRelay(CWalletTx& wtx, std::string& err_string, bool relay) const
2020
0
{
2021
0
    AssertLockHeld(cs_wallet);
2022
2023
    // Can't relay if wallet is not broadcasting
2024
0
    if (!GetBroadcastTransactions()) return false;
2025
    // Don't relay abandoned transactions
2026
0
    if (wtx.isAbandoned()) return false;
2027
    // Don't try to submit coinbase transactions. These would fail anyway but would
2028
    // cause log spam.
2029
0
    if (wtx.IsCoinBase()) return false;
2030
    // Don't try to submit conflicted or confirmed transactions.
2031
0
    if (GetTxDepthInMainChain(wtx) != 0) return false;
2032
2033
    // Submit transaction to mempool for relay
2034
0
    WalletLogPrintf("Submitting wtx %s to mempool for relay\n", wtx.GetHash().ToString());
2035
    // We must set TxStateInMempool here. Even though it will also be set later by the
2036
    // entered-mempool callback, if we did not there would be a race where a
2037
    // user could call sendmoney in a loop and hit spurious out of funds errors
2038
    // because we think that this newly generated transaction's change is
2039
    // unavailable as we're not yet aware that it is in the mempool.
2040
    //
2041
    // If broadcast fails for any reason, trying to set wtx.m_state here would be incorrect.
2042
    // If transaction was previously in the mempool, it should be updated when
2043
    // TransactionRemovedFromMempool fires.
2044
0
    bool ret = chain().broadcastTransaction(wtx.tx, m_default_max_tx_fee, relay, err_string);
2045
0
    if (ret) wtx.m_state = TxStateInMempool{};
2046
0
    return ret;
2047
0
}
2048
2049
std::set<uint256> CWallet::GetTxConflicts(const CWalletTx& wtx) const
2050
0
{
2051
0
    AssertLockHeld(cs_wallet);
2052
2053
0
    const uint256 myHash{wtx.GetHash()};
2054
0
    std::set<uint256> result{GetConflicts(myHash)};
2055
0
    result.erase(myHash);
2056
0
    return result;
2057
0
}
2058
2059
bool CWallet::ShouldResend() const
2060
0
{
2061
    // Don't attempt to resubmit if the wallet is configured to not broadcast
2062
0
    if (!fBroadcastTransactions) return false;
2063
2064
    // During reindex, importing and IBD, old wallet transactions become
2065
    // unconfirmed. Don't resend them as that would spam other nodes.
2066
    // We only allow forcing mempool submission when not relaying to avoid this spam.
2067
0
    if (!chain().isReadyToBroadcast()) return false;
2068
2069
    // Do this infrequently and randomly to avoid giving away
2070
    // that these are our transactions.
2071
0
    if (NodeClock::now() < m_next_resend) return false;
2072
2073
0
    return true;
2074
0
}
2075
2076
0
NodeClock::time_point CWallet::GetDefaultNextResend() { return FastRandomContext{}.rand_uniform_delay(NodeClock::now() + 12h, 24h); }
2077
2078
// Resubmit transactions from the wallet to the mempool, optionally asking the
2079
// mempool to relay them. On startup, we will do this for all unconfirmed
2080
// transactions but will not ask the mempool to relay them. We do this on startup
2081
// to ensure that our own mempool is aware of our transactions. There
2082
// is a privacy side effect here as not broadcasting on startup also means that we won't
2083
// inform the world of our wallet's state, particularly if the wallet (or node) is not
2084
// yet synced.
2085
//
2086
// Otherwise this function is called periodically in order to relay our unconfirmed txs.
2087
// We do this on a random timer to slightly obfuscate which transactions
2088
// come from our wallet.
2089
//
2090
// TODO: Ideally, we'd only resend transactions that we think should have been
2091
// mined in the most recent block. Any transaction that wasn't in the top
2092
// blockweight of transactions in the mempool shouldn't have been mined,
2093
// and so is probably just sitting in the mempool waiting to be confirmed.
2094
// Rebroadcasting does nothing to speed up confirmation and only damages
2095
// privacy.
2096
//
2097
// The `force` option results in all unconfirmed transactions being submitted to
2098
// the mempool. This does not necessarily result in those transactions being relayed,
2099
// that depends on the `relay` option. Periodic rebroadcast uses the pattern
2100
// relay=true force=false, while loading into the mempool
2101
// (on start, or after import) uses relay=false force=true.
2102
void CWallet::ResubmitWalletTransactions(bool relay, bool force)
2103
0
{
2104
    // Don't attempt to resubmit if the wallet is configured to not broadcast,
2105
    // even if forcing.
2106
0
    if (!fBroadcastTransactions) return;
2107
2108
0
    int submitted_tx_count = 0;
2109
2110
0
    { // cs_wallet scope
2111
0
        LOCK(cs_wallet);
2112
2113
        // First filter for the transactions we want to rebroadcast.
2114
        // We use a set with WalletTxOrderComparator so that rebroadcasting occurs in insertion order
2115
0
        std::set<CWalletTx*, WalletTxOrderComparator> to_submit;
2116
0
        for (auto& [txid, wtx] : mapWallet) {
2117
            // Only rebroadcast unconfirmed txs
2118
0
            if (!wtx.isUnconfirmed()) continue;
2119
2120
            // Attempt to rebroadcast all txes more than 5 minutes older than
2121
            // the last block, or all txs if forcing.
2122
0
            if (!force && wtx.nTimeReceived > m_best_block_time - 5 * 60) continue;
2123
0
            to_submit.insert(&wtx);
2124
0
        }
2125
        // Now try submitting the transactions to the memory pool and (optionally) relay them.
2126
0
        for (auto wtx : to_submit) {
2127
0
            std::string unused_err_string;
2128
0
            if (SubmitTxMemoryPoolAndRelay(*wtx, unused_err_string, relay)) ++submitted_tx_count;
2129
0
        }
2130
0
    } // cs_wallet
2131
2132
0
    if (submitted_tx_count > 0) {
2133
0
        WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count);
2134
0
    }
2135
0
}
2136
2137
/** @} */ // end of mapWallet
2138
2139
void MaybeResendWalletTxs(WalletContext& context)
2140
0
{
2141
0
    for (const std::shared_ptr<CWallet>& pwallet : GetWallets(context)) {
2142
0
        if (!pwallet->ShouldResend()) continue;
2143
0
        pwallet->ResubmitWalletTransactions(/*relay=*/true, /*force=*/false);
2144
0
        pwallet->SetNextResend();
2145
0
    }
2146
0
}
2147
2148
2149
/** @defgroup Actions
2150
 *
2151
 * @{
2152
 */
2153
2154
bool CWallet::SignTransaction(CMutableTransaction& tx) const
2155
0
{
2156
0
    AssertLockHeld(cs_wallet);
2157
2158
    // Build coins map
2159
0
    std::map<COutPoint, Coin> coins;
2160
0
    for (auto& input : tx.vin) {
2161
0
        const auto mi = mapWallet.find(input.prevout.hash);
2162
0
        if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) {
2163
0
            return false;
2164
0
        }
2165
0
        const CWalletTx& wtx = mi->second;
2166
0
        int prev_height = wtx.state<TxStateConfirmed>() ? wtx.state<TxStateConfirmed>()->confirmed_block_height : 0;
2167
0
        coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], prev_height, wtx.IsCoinBase());
2168
0
    }
2169
0
    std::map<int, bilingual_str> input_errors;
2170
0
    return SignTransaction(tx, coins, SIGHASH_DEFAULT, input_errors);
2171
0
}
2172
2173
bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const
2174
0
{
2175
    // Try to sign with all ScriptPubKeyMans
2176
0
    for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2177
        // spk_man->SignTransaction will return true if the transaction is complete,
2178
        // so we can exit early and return true if that happens
2179
0
        if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) {
2180
0
            return true;
2181
0
        }
2182
0
    }
2183
2184
    // At this point, one input was not fully signed otherwise we would have exited already
2185
0
    return false;
2186
0
}
2187
2188
std::optional<PSBTError> CWallet::FillPSBT(PartiallySignedTransaction& psbtx, bool& complete, int sighash_type, bool sign, bool bip32derivs, size_t * n_signed, bool finalize) const
2189
0
{
2190
0
    if (n_signed) {
2191
0
        *n_signed = 0;
2192
0
    }
2193
0
    LOCK(cs_wallet);
2194
    // Get all of the previous transactions
2195
0
    for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
2196
0
        const CTxIn& txin = psbtx.tx->vin[i];
2197
0
        PSBTInput& input = psbtx.inputs.at(i);
2198
2199
0
        if (PSBTInputSigned(input)) {
2200
0
            continue;
2201
0
        }
2202
2203
        // If we have no utxo, grab it from the wallet.
2204
0
        if (!input.non_witness_utxo) {
2205
0
            const uint256& txhash = txin.prevout.hash;
2206
0
            const auto it = mapWallet.find(txhash);
2207
0
            if (it != mapWallet.end()) {
2208
0
                const CWalletTx& wtx = it->second;
2209
                // We only need the non_witness_utxo, which is a superset of the witness_utxo.
2210
                //   The signing code will switch to the smaller witness_utxo if this is ok.
2211
0
                input.non_witness_utxo = wtx.tx;
2212
0
            }
2213
0
        }
2214
0
    }
2215
2216
0
    const PrecomputedTransactionData txdata = PrecomputePSBTData(psbtx);
2217
2218
    // Fill in information from ScriptPubKeyMans
2219
0
    for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2220
0
        int n_signed_this_spkm = 0;
2221
0
        const auto error{spk_man->FillPSBT(psbtx, txdata, sighash_type, sign, bip32derivs, &n_signed_this_spkm, finalize)};
2222
0
        if (error) {
2223
0
            return error;
2224
0
        }
2225
2226
0
        if (n_signed) {
2227
0
            (*n_signed) += n_signed_this_spkm;
2228
0
        }
2229
0
    }
2230
2231
0
    RemoveUnnecessaryTransactions(psbtx, sighash_type);
2232
2233
    // Complete if every input is now signed
2234
0
    complete = true;
2235
0
    for (size_t i = 0; i < psbtx.inputs.size(); ++i) {
2236
0
        complete &= PSBTInputSignedAndVerified(psbtx, i, &txdata);
2237
0
    }
2238
2239
0
    return {};
2240
0
}
2241
2242
SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const
2243
0
{
2244
0
    SignatureData sigdata;
2245
0
    CScript script_pub_key = GetScriptForDestination(pkhash);
2246
0
    for (const auto& spk_man_pair : m_spk_managers) {
2247
0
        if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
2248
0
            LOCK(cs_wallet);  // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
2249
0
            return spk_man_pair.second->SignMessage(message, pkhash, str_sig);
2250
0
        }
2251
0
    }
2252
0
    return SigningResult::PRIVATE_KEY_NOT_AVAILABLE;
2253
0
}
2254
2255
OutputType CWallet::TransactionChangeType(const std::optional<OutputType>& change_type, const std::vector<CRecipient>& vecSend) const
2256
0
{
2257
    // If -changetype is specified, always use that change type.
2258
0
    if (change_type) {
2259
0
        return *change_type;
2260
0
    }
2261
2262
    // if m_default_address_type is legacy, use legacy address as change.
2263
0
    if (m_default_address_type == OutputType::LEGACY) {
2264
0
        return OutputType::LEGACY;
2265
0
    }
2266
2267
0
    bool any_tr{false};
2268
0
    bool any_wpkh{false};
2269
0
    bool any_sh{false};
2270
0
    bool any_pkh{false};
2271
2272
0
    for (const auto& recipient : vecSend) {
2273
0
        if (std::get_if<WitnessV1Taproot>(&recipient.dest)) {
2274
0
            any_tr = true;
2275
0
        } else if (std::get_if<WitnessV0KeyHash>(&recipient.dest)) {
2276
0
            any_wpkh = true;
2277
0
        } else if (std::get_if<ScriptHash>(&recipient.dest)) {
2278
0
            any_sh = true;
2279
0
        } else if (std::get_if<PKHash>(&recipient.dest)) {
2280
0
            any_pkh = true;
2281
0
        }
2282
0
    }
2283
2284
0
    const bool has_bech32m_spkman(GetScriptPubKeyMan(OutputType::BECH32M, /*internal=*/true));
2285
0
    if (has_bech32m_spkman && any_tr) {
2286
        // Currently tr is the only type supported by the BECH32M spkman
2287
0
        return OutputType::BECH32M;
2288
0
    }
2289
0
    const bool has_bech32_spkman(GetScriptPubKeyMan(OutputType::BECH32, /*internal=*/true));
2290
0
    if (has_bech32_spkman && any_wpkh) {
2291
        // Currently wpkh is the only type supported by the BECH32 spkman
2292
0
        return OutputType::BECH32;
2293
0
    }
2294
0
    const bool has_p2sh_segwit_spkman(GetScriptPubKeyMan(OutputType::P2SH_SEGWIT, /*internal=*/true));
2295
0
    if (has_p2sh_segwit_spkman && any_sh) {
2296
        // Currently sh_wpkh is the only type supported by the P2SH_SEGWIT spkman
2297
        // As of 2021 about 80% of all SH are wrapping WPKH, so use that
2298
0
        return OutputType::P2SH_SEGWIT;
2299
0
    }
2300
0
    const bool has_legacy_spkman(GetScriptPubKeyMan(OutputType::LEGACY, /*internal=*/true));
2301
0
    if (has_legacy_spkman && any_pkh) {
2302
        // Currently pkh is the only type supported by the LEGACY spkman
2303
0
        return OutputType::LEGACY;
2304
0
    }
2305
2306
0
    if (has_bech32m_spkman) {
2307
0
        return OutputType::BECH32M;
2308
0
    }
2309
0
    if (has_bech32_spkman) {
2310
0
        return OutputType::BECH32;
2311
0
    }
2312
    // else use m_default_address_type for change
2313
0
    return m_default_address_type;
2314
0
}
2315
2316
void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm)
2317
0
{
2318
0
    LOCK(cs_wallet);
2319
0
    WalletLogPrintf("CommitTransaction:\n%s\n", util::RemoveSuffixView(tx->ToString(), "\n"));
2320
2321
    // Add tx to wallet, because if it has change it's also ours,
2322
    // otherwise just for transaction history.
2323
0
    CWalletTx* wtx = AddToWallet(tx, TxStateInactive{}, [&](CWalletTx& wtx, bool new_tx) {
2324
0
        CHECK_NONFATAL(wtx.mapValue.empty());
2325
0
        CHECK_NONFATAL(wtx.vOrderForm.empty());
2326
0
        wtx.mapValue = std::move(mapValue);
2327
0
        wtx.vOrderForm = std::move(orderForm);
2328
0
        wtx.fTimeReceivedIsTxTime = true;
2329
0
        wtx.fFromMe = true;
2330
0
        return true;
2331
0
    });
2332
2333
    // wtx can only be null if the db write failed.
2334
0
    if (!wtx) {
2335
0
        throw std::runtime_error(std::string(__func__) + ": Wallet db error, transaction commit failed");
2336
0
    }
2337
2338
    // Notify that old coins are spent
2339
0
    for (const CTxIn& txin : tx->vin) {
2340
0
        CWalletTx &coin = mapWallet.at(txin.prevout.hash);
2341
0
        coin.MarkDirty();
2342
0
        NotifyTransactionChanged(coin.GetHash(), CT_UPDATED);
2343
0
    }
2344
2345
0
    if (!fBroadcastTransactions) {
2346
        // Don't submit tx to the mempool
2347
0
        return;
2348
0
    }
2349
2350
0
    std::string err_string;
2351
0
    if (!SubmitTxMemoryPoolAndRelay(*wtx, err_string, true)) {
2352
0
        WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string);
2353
        // TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure.
2354
0
    }
2355
0
}
2356
2357
DBErrors CWallet::LoadWallet()
2358
0
{
2359
0
    LOCK(cs_wallet);
2360
2361
0
    Assert(m_spk_managers.empty());
2362
0
    Assert(m_wallet_flags == 0);
2363
0
    DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this);
2364
0
    if (nLoadWalletRet == DBErrors::NEED_REWRITE)
2365
0
    {
2366
0
        if (GetDatabase().Rewrite("\x04pool"))
2367
0
        {
2368
0
            for (const auto& spk_man_pair : m_spk_managers) {
2369
0
                spk_man_pair.second->RewriteDB();
2370
0
            }
2371
0
        }
2372
0
    }
2373
2374
0
    if (m_spk_managers.empty()) {
2375
0
        assert(m_external_spk_managers.empty());
2376
0
        assert(m_internal_spk_managers.empty());
2377
0
    }
2378
2379
0
    return nLoadWalletRet;
2380
0
}
2381
2382
util::Result<void> CWallet::RemoveTxs(std::vector<uint256>& txs_to_remove)
2383
0
{
2384
0
    AssertLockHeld(cs_wallet);
2385
0
    WalletBatch batch(GetDatabase());
2386
0
    if (!batch.TxnBegin()) return util::Error{_("Error starting db txn for wallet transactions removal")};
2387
2388
    // Check for transaction existence and remove entries from disk
2389
0
    using TxIterator = std::unordered_map<uint256, CWalletTx, SaltedTxidHasher>::const_iterator;
2390
0
    std::vector<TxIterator> erased_txs;
2391
0
    bilingual_str str_err;
2392
0
    for (const uint256& hash : txs_to_remove) {
2393
0
        auto it_wtx = mapWallet.find(hash);
2394
0
        if (it_wtx == mapWallet.end()) {
2395
0
            str_err = strprintf(_("Transaction %s does not belong to this wallet"), hash.GetHex());
2396
0
            break;
2397
0
        }
2398
0
        if (!batch.EraseTx(hash)) {
2399
0
            str_err = strprintf(_("Failure removing transaction: %s"), hash.GetHex());
2400
0
            break;
2401
0
        }
2402
0
        erased_txs.emplace_back(it_wtx);
2403
0
    }
2404
2405
    // Roll back removals in case of an error
2406
0
    if (!str_err.empty()) {
2407
0
        batch.TxnAbort();
2408
0
        return util::Error{str_err};
2409
0
    }
2410
2411
    // Dump changes to disk
2412
0
    if (!batch.TxnCommit()) return util::Error{_("Error committing db txn for wallet transactions removal")};
2413
2414
    // Update the in-memory state and notify upper layers about the removals
2415
0
    for (const auto& it : erased_txs) {
2416
0
        const uint256 hash{it->first};
2417
0
        wtxOrdered.erase(it->second.m_it_wtxOrdered);
2418
0
        for (const auto& txin : it->second.tx->vin)
2419
0
            mapTxSpends.erase(txin.prevout);
2420
0
        mapWallet.erase(it);
2421
0
        NotifyTransactionChanged(hash, CT_DELETED);
2422
0
    }
2423
2424
0
    MarkDirty();
2425
2426
0
    return {}; // all good
2427
0
}
2428
2429
bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& new_purpose)
2430
0
{
2431
0
    bool fUpdated = false;
2432
0
    bool is_mine;
2433
0
    std::optional<AddressPurpose> purpose;
2434
0
    {
2435
0
        LOCK(cs_wallet);
2436
0
        std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address);
2437
0
        fUpdated = mi != m_address_book.end() && !mi->second.IsChange();
2438
2439
0
        CAddressBookData& record = mi != m_address_book.end() ? mi->second : m_address_book[address];
2440
0
        record.SetLabel(strName);
2441
0
        is_mine = IsMine(address) != ISMINE_NO;
2442
0
        if (new_purpose) { /* update purpose only if requested */
2443
0
            record.purpose = new_purpose;
2444
0
        }
2445
0
        purpose = record.purpose;
2446
0
    }
2447
2448
0
    const std::string& encoded_dest = EncodeDestination(address);
2449
0
    if (new_purpose && !batch.WritePurpose(encoded_dest, PurposeToString(*new_purpose))) {
2450
0
        WalletLogPrintf("Error: fail to write address book 'purpose' entry\n");
2451
0
        return false;
2452
0
    }
2453
0
    if (!batch.WriteName(encoded_dest, strName)) {
2454
0
        WalletLogPrintf("Error: fail to write address book 'name' entry\n");
2455
0
        return false;
2456
0
    }
2457
2458
    // In very old wallets, address purpose may not be recorded so we derive it from IsMine
2459
0
    NotifyAddressBookChanged(address, strName, is_mine,
2460
0
                             purpose.value_or(is_mine ? AddressPurpose::RECEIVE : AddressPurpose::SEND),
2461
0
                             (fUpdated ? CT_UPDATED : CT_NEW));
2462
0
    return true;
2463
0
}
2464
2465
bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& purpose)
2466
0
{
2467
0
    WalletBatch batch(GetDatabase());
2468
0
    return SetAddressBookWithDB(batch, address, strName, purpose);
2469
0
}
2470
2471
bool CWallet::DelAddressBook(const CTxDestination& address)
2472
0
{
2473
0
    return RunWithinTxn(GetDatabase(), /*process_desc=*/"address book entry removal", [&](WalletBatch& batch){
2474
0
        return DelAddressBookWithDB(batch, address);
2475
0
    });
2476
0
}
2477
2478
bool CWallet::DelAddressBookWithDB(WalletBatch& batch, const CTxDestination& address)
2479
0
{
2480
0
    const std::string& dest = EncodeDestination(address);
2481
0
    {
2482
0
        LOCK(cs_wallet);
2483
        // If we want to delete receiving addresses, we should avoid calling EraseAddressData because it will delete the previously_spent value. Could instead just erase the label so it becomes a change address, and keep the data.
2484
        // NOTE: This isn't a problem for sending addresses because they don't have any data that needs to be kept.
2485
        // When adding new address data, it should be considered here whether to retain or delete it.
2486
0
        if (IsMine(address)) {
2487
0
            WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, PACKAGE_BUGREPORT);
2488
0
            return false;
2489
0
        }
2490
        // Delete data rows associated with this address
2491
0
        if (!batch.EraseAddressData(address)) {
2492
0
            WalletLogPrintf("Error: cannot erase address book entry data\n");
2493
0
            return false;
2494
0
        }
2495
2496
        // Delete purpose entry
2497
0
        if (!batch.ErasePurpose(dest)) {
2498
0
            WalletLogPrintf("Error: cannot erase address book entry purpose\n");
2499
0
            return false;
2500
0
        }
2501
2502
        // Delete name entry
2503
0
        if (!batch.EraseName(dest)) {
2504
0
            WalletLogPrintf("Error: cannot erase address book entry name\n");
2505
0
            return false;
2506
0
        }
2507
2508
        // finally, remove it from the map
2509
0
        m_address_book.erase(address);
2510
0
    }
2511
2512
    // All good, signal changes
2513
0
    NotifyAddressBookChanged(address, "", /*is_mine=*/false, AddressPurpose::SEND, CT_DELETED);
2514
0
    return true;
2515
0
}
2516
2517
size_t CWallet::KeypoolCountExternalKeys() const
2518
0
{
2519
0
    AssertLockHeld(cs_wallet);
2520
2521
0
    auto legacy_spk_man = GetLegacyScriptPubKeyMan();
2522
0
    if (legacy_spk_man) {
2523
0
        return legacy_spk_man->KeypoolCountExternalKeys();
2524
0
    }
2525
2526
0
    unsigned int count = 0;
2527
0
    for (auto spk_man : m_external_spk_managers) {
2528
0
        count += spk_man.second->GetKeyPoolSize();
2529
0
    }
2530
2531
0
    return count;
2532
0
}
2533
2534
unsigned int CWallet::GetKeyPoolSize() const
2535
0
{
2536
0
    AssertLockHeld(cs_wallet);
2537
2538
0
    unsigned int count = 0;
2539
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
2540
0
        count += spk_man->GetKeyPoolSize();
2541
0
    }
2542
0
    return count;
2543
0
}
2544
2545
bool CWallet::TopUpKeyPool(unsigned int kpSize)
2546
0
{
2547
0
    LOCK(cs_wallet);
2548
0
    bool res = true;
2549
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
2550
0
        res &= spk_man->TopUp(kpSize);
2551
0
    }
2552
0
    return res;
2553
0
}
2554
2555
util::Result<CTxDestination> CWallet::GetNewDestination(const OutputType type, const std::string label)
2556
0
{
2557
0
    LOCK(cs_wallet);
2558
0
    auto spk_man = GetScriptPubKeyMan(type, /*internal=*/false);
2559
0
    if (!spk_man) {
2560
0
        return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2561
0
    }
2562
2563
0
    auto op_dest = spk_man->GetNewDestination(type);
2564
0
    if (op_dest) {
2565
0
        SetAddressBook(*op_dest, label, AddressPurpose::RECEIVE);
2566
0
    }
2567
2568
0
    return op_dest;
2569
0
}
2570
2571
util::Result<CTxDestination> CWallet::GetNewChangeDestination(const OutputType type)
2572
0
{
2573
0
    LOCK(cs_wallet);
2574
2575
0
    ReserveDestination reservedest(this, type);
2576
0
    auto op_dest = reservedest.GetReservedDestination(true);
2577
0
    if (op_dest) reservedest.KeepDestination();
2578
2579
0
    return op_dest;
2580
0
}
2581
2582
std::optional<int64_t> CWallet::GetOldestKeyPoolTime() const
2583
0
{
2584
0
    LOCK(cs_wallet);
2585
0
    if (m_spk_managers.empty()) {
2586
0
        return std::nullopt;
2587
0
    }
2588
2589
0
    std::optional<int64_t> oldest_key{std::numeric_limits<int64_t>::max()};
2590
0
    for (const auto& spk_man_pair : m_spk_managers) {
2591
0
        oldest_key = std::min(oldest_key, spk_man_pair.second->GetOldestKeyPoolTime());
2592
0
    }
2593
0
    return oldest_key;
2594
0
}
2595
2596
0
void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) {
2597
0
    for (auto& entry : mapWallet) {
2598
0
        CWalletTx& wtx = entry.second;
2599
0
        if (wtx.m_is_cache_empty) continue;
2600
0
        for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
2601
0
            CTxDestination dst;
2602
0
            if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.count(dst)) {
2603
0
                wtx.MarkDirty();
2604
0
                break;
2605
0
            }
2606
0
        }
2607
0
    }
2608
0
}
2609
2610
void CWallet::ForEachAddrBookEntry(const ListAddrBookFunc& func) const
2611
0
{
2612
0
    AssertLockHeld(cs_wallet);
2613
0
    for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book) {
2614
0
        const auto& entry = item.second;
2615
0
        func(item.first, entry.GetLabel(), entry.IsChange(), entry.purpose);
2616
0
    }
2617
0
}
2618
2619
std::vector<CTxDestination> CWallet::ListAddrBookAddresses(const std::optional<AddrBookFilter>& _filter) const
2620
0
{
2621
0
    AssertLockHeld(cs_wallet);
2622
0
    std::vector<CTxDestination> result;
2623
0
    AddrBookFilter filter = _filter ? *_filter : AddrBookFilter();
2624
0
    ForEachAddrBookEntry([&result, &filter](const CTxDestination& dest, const std::string& label, bool is_change, const std::optional<AddressPurpose>& purpose) {
2625
        // Filter by change
2626
0
        if (filter.ignore_change && is_change) return;
2627
        // Filter by label
2628
0
        if (filter.m_op_label && *filter.m_op_label != label) return;
2629
        // All good
2630
0
        result.emplace_back(dest);
2631
0
    });
2632
0
    return result;
2633
0
}
2634
2635
std::set<std::string> CWallet::ListAddrBookLabels(const std::optional<AddressPurpose> purpose) const
2636
0
{
2637
0
    AssertLockHeld(cs_wallet);
2638
0
    std::set<std::string> label_set;
2639
0
    ForEachAddrBookEntry([&](const CTxDestination& _dest, const std::string& _label,
2640
0
                             bool _is_change, const std::optional<AddressPurpose>& _purpose) {
2641
0
        if (_is_change) return;
2642
0
        if (!purpose || purpose == _purpose) {
2643
0
            label_set.insert(_label);
2644
0
        }
2645
0
    });
2646
0
    return label_set;
2647
0
}
2648
2649
util::Result<CTxDestination> ReserveDestination::GetReservedDestination(bool internal)
2650
0
{
2651
0
    m_spk_man = pwallet->GetScriptPubKeyMan(type, internal);
2652
0
    if (!m_spk_man) {
2653
0
        return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2654
0
    }
2655
2656
0
    if (nIndex == -1) {
2657
0
        CKeyPool keypool;
2658
0
        int64_t index;
2659
0
        auto op_address = m_spk_man->GetReservedDestination(type, internal, index, keypool);
2660
0
        if (!op_address) return op_address;
2661
0
        nIndex = index;
2662
0
        address = *op_address;
2663
0
        fInternal = keypool.fInternal;
2664
0
    }
2665
0
    return address;
2666
0
}
2667
2668
void ReserveDestination::KeepDestination()
2669
0
{
2670
0
    if (nIndex != -1) {
2671
0
        m_spk_man->KeepDestination(nIndex, type);
2672
0
    }
2673
0
    nIndex = -1;
2674
0
    address = CNoDestination();
2675
0
}
2676
2677
void ReserveDestination::ReturnDestination()
2678
0
{
2679
0
    if (nIndex != -1) {
2680
0
        m_spk_man->ReturnDestination(nIndex, fInternal, address);
2681
0
    }
2682
0
    nIndex = -1;
2683
0
    address = CNoDestination();
2684
0
}
2685
2686
util::Result<void> CWallet::DisplayAddress(const CTxDestination& dest)
2687
0
{
2688
0
    CScript scriptPubKey = GetScriptForDestination(dest);
2689
0
    for (const auto& spk_man : GetScriptPubKeyMans(scriptPubKey)) {
2690
0
        auto signer_spk_man = dynamic_cast<ExternalSignerScriptPubKeyMan *>(spk_man);
2691
0
        if (signer_spk_man == nullptr) {
2692
0
            continue;
2693
0
        }
2694
0
        ExternalSigner signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
2695
0
        return signer_spk_man->DisplayAddress(dest, signer);
2696
0
    }
2697
0
    return util::Error{_("There is no ScriptPubKeyManager for this address")};
2698
0
}
2699
2700
bool CWallet::LockCoin(const COutPoint& output, WalletBatch* batch)
2701
0
{
2702
0
    AssertLockHeld(cs_wallet);
2703
0
    setLockedCoins.insert(output);
2704
0
    if (batch) {
2705
0
        return batch->WriteLockedUTXO(output);
2706
0
    }
2707
0
    return true;
2708
0
}
2709
2710
bool CWallet::UnlockCoin(const COutPoint& output, WalletBatch* batch)
2711
0
{
2712
0
    AssertLockHeld(cs_wallet);
2713
0
    bool was_locked = setLockedCoins.erase(output);
2714
0
    if (batch && was_locked) {
2715
0
        return batch->EraseLockedUTXO(output);
2716
0
    }
2717
0
    return true;
2718
0
}
2719
2720
bool CWallet::UnlockAllCoins()
2721
0
{
2722
0
    AssertLockHeld(cs_wallet);
2723
0
    bool success = true;
2724
0
    WalletBatch batch(GetDatabase());
2725
0
    for (auto it = setLockedCoins.begin(); it != setLockedCoins.end(); ++it) {
2726
0
        success &= batch.EraseLockedUTXO(*it);
2727
0
    }
2728
0
    setLockedCoins.clear();
2729
0
    return success;
2730
0
}
2731
2732
bool CWallet::IsLockedCoin(const COutPoint& output) const
2733
0
{
2734
0
    AssertLockHeld(cs_wallet);
2735
0
    return setLockedCoins.count(output) > 0;
2736
0
}
2737
2738
void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const
2739
0
{
2740
0
    AssertLockHeld(cs_wallet);
2741
0
    for (std::set<COutPoint>::iterator it = setLockedCoins.begin();
2742
0
         it != setLockedCoins.end(); it++) {
2743
0
        COutPoint outpt = (*it);
2744
0
        vOutpts.push_back(outpt);
2745
0
    }
2746
0
}
2747
2748
/** @} */ // end of Actions
2749
2750
0
void CWallet::GetKeyBirthTimes(std::map<CKeyID, int64_t>& mapKeyBirth) const {
2751
0
    AssertLockHeld(cs_wallet);
2752
0
    mapKeyBirth.clear();
2753
2754
    // map in which we'll infer heights of other keys
2755
0
    std::map<CKeyID, const TxStateConfirmed*> mapKeyFirstBlock;
2756
0
    TxStateConfirmed max_confirm{uint256{}, /*height=*/-1, /*index=*/-1};
2757
0
    max_confirm.confirmed_block_height = GetLastBlockHeight() > 144 ? GetLastBlockHeight() - 144 : 0; // the tip can be reorganized; use a 144-block safety margin
2758
0
    CHECK_NONFATAL(chain().findAncestorByHeight(GetLastBlockHash(), max_confirm.confirmed_block_height, FoundBlock().hash(max_confirm.confirmed_block_hash)));
2759
2760
0
    {
2761
0
        LegacyScriptPubKeyMan* spk_man = GetLegacyScriptPubKeyMan();
2762
0
        assert(spk_man != nullptr);
2763
0
        LOCK(spk_man->cs_KeyStore);
2764
2765
        // get birth times for keys with metadata
2766
0
        for (const auto& entry : spk_man->mapKeyMetadata) {
2767
0
            if (entry.second.nCreateTime) {
2768
0
                mapKeyBirth[entry.first] = entry.second.nCreateTime;
2769
0
            }
2770
0
        }
2771
2772
        // Prepare to infer birth heights for keys without metadata
2773
0
        for (const CKeyID &keyid : spk_man->GetKeys()) {
2774
0
            if (mapKeyBirth.count(keyid) == 0)
2775
0
                mapKeyFirstBlock[keyid] = &max_confirm;
2776
0
        }
2777
2778
        // if there are no such keys, we're done
2779
0
        if (mapKeyFirstBlock.empty())
2780
0
            return;
2781
2782
        // find first block that affects those keys, if there are any left
2783
0
        for (const auto& entry : mapWallet) {
2784
            // iterate over all wallet transactions...
2785
0
            const CWalletTx &wtx = entry.second;
2786
0
            if (auto* conf = wtx.state<TxStateConfirmed>()) {
2787
                // ... which are already in a block
2788
0
                for (const CTxOut &txout : wtx.tx->vout) {
2789
                    // iterate over all their outputs
2790
0
                    for (const auto &keyid : GetAffectedKeys(txout.scriptPubKey, *spk_man)) {
2791
                        // ... and all their affected keys
2792
0
                        auto rit = mapKeyFirstBlock.find(keyid);
2793
0
                        if (rit != mapKeyFirstBlock.end() && conf->confirmed_block_height < rit->second->confirmed_block_height) {
2794
0
                            rit->second = conf;
2795
0
                        }
2796
0
                    }
2797
0
                }
2798
0
            }
2799
0
        }
2800
0
    }
2801
2802
    // Extract block timestamps for those keys
2803
0
    for (const auto& entry : mapKeyFirstBlock) {
2804
0
        int64_t block_time;
2805
0
        CHECK_NONFATAL(chain().findBlock(entry.second->confirmed_block_hash, FoundBlock().time(block_time)));
2806
0
        mapKeyBirth[entry.first] = block_time - TIMESTAMP_WINDOW; // block times can be 2h off
2807
0
    }
2808
0
}
2809
2810
/**
2811
 * Compute smart timestamp for a transaction being added to the wallet.
2812
 *
2813
 * Logic:
2814
 * - If sending a transaction, assign its timestamp to the current time.
2815
 * - If receiving a transaction outside a block, assign its timestamp to the
2816
 *   current time.
2817
 * - If receiving a transaction during a rescanning process, assign all its
2818
 *   (not already known) transactions' timestamps to the block time.
2819
 * - If receiving a block with a future timestamp, assign all its (not already
2820
 *   known) transactions' timestamps to the current time.
2821
 * - If receiving a block with a past timestamp, before the most recent known
2822
 *   transaction (that we care about), assign all its (not already known)
2823
 *   transactions' timestamps to the same timestamp as that most-recent-known
2824
 *   transaction.
2825
 * - If receiving a block with a past timestamp, but after the most recent known
2826
 *   transaction, assign all its (not already known) transactions' timestamps to
2827
 *   the block time.
2828
 *
2829
 * For more information see CWalletTx::nTimeSmart,
2830
 * https://bitcointalk.org/?topic=54527, or
2831
 * https://github.com/bitcoin/bitcoin/pull/1393.
2832
 */
2833
unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const
2834
0
{
2835
0
    std::optional<uint256> block_hash;
2836
0
    if (auto* conf = wtx.state<TxStateConfirmed>()) {
2837
0
        block_hash = conf->confirmed_block_hash;
2838
0
    } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
2839
0
        block_hash = conf->conflicting_block_hash;
2840
0
    }
2841
2842
0
    unsigned int nTimeSmart = wtx.nTimeReceived;
2843
0
    if (block_hash) {
2844
0
        int64_t blocktime;
2845
0
        int64_t block_max_time;
2846
0
        if (chain().findBlock(*block_hash, FoundBlock().time(blocktime).maxTime(block_max_time))) {
2847
0
            if (rescanning_old_block) {
2848
0
                nTimeSmart = block_max_time;
2849
0
            } else {
2850
0
                int64_t latestNow = wtx.nTimeReceived;
2851
0
                int64_t latestEntry = 0;
2852
2853
                // Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future
2854
0
                int64_t latestTolerated = latestNow + 300;
2855
0
                const TxItems& txOrdered = wtxOrdered;
2856
0
                for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) {
2857
0
                    CWalletTx* const pwtx = it->second;
2858
0
                    if (pwtx == &wtx) {
2859
0
                        continue;
2860
0
                    }
2861
0
                    int64_t nSmartTime;
2862
0
                    nSmartTime = pwtx->nTimeSmart;
2863
0
                    if (!nSmartTime) {
2864
0
                        nSmartTime = pwtx->nTimeReceived;
2865
0
                    }
2866
0
                    if (nSmartTime <= latestTolerated) {
2867
0
                        latestEntry = nSmartTime;
2868
0
                        if (nSmartTime > latestNow) {
2869
0
                            latestNow = nSmartTime;
2870
0
                        }
2871
0
                        break;
2872
0
                    }
2873
0
                }
2874
2875
0
                nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow));
2876
0
            }
2877
0
        } else {
2878
0
            WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), block_hash->ToString());
2879
0
        }
2880
0
    }
2881
0
    return nTimeSmart;
2882
0
}
2883
2884
bool CWallet::SetAddressPreviouslySpent(WalletBatch& batch, const CTxDestination& dest, bool used)
2885
0
{
2886
0
    if (std::get_if<CNoDestination>(&dest))
2887
0
        return false;
2888
2889
0
    if (!used) {
2890
0
        if (auto* data{common::FindKey(m_address_book, dest)}) data->previously_spent = false;
2891
0
        return batch.WriteAddressPreviouslySpent(dest, false);
2892
0
    }
2893
2894
0
    LoadAddressPreviouslySpent(dest);
2895
0
    return batch.WriteAddressPreviouslySpent(dest, true);
2896
0
}
2897
2898
void CWallet::LoadAddressPreviouslySpent(const CTxDestination& dest)
2899
0
{
2900
0
    m_address_book[dest].previously_spent = true;
2901
0
}
2902
2903
void CWallet::LoadAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& request)
2904
0
{
2905
0
    m_address_book[dest].receive_requests[id] = request;
2906
0
}
2907
2908
bool CWallet::IsAddressPreviouslySpent(const CTxDestination& dest) const
2909
0
{
2910
0
    if (auto* data{common::FindKey(m_address_book, dest)}) return data->previously_spent;
2911
0
    return false;
2912
0
}
2913
2914
std::vector<std::string> CWallet::GetAddressReceiveRequests() const
2915
0
{
2916
0
    std::vector<std::string> values;
2917
0
    for (const auto& [dest, entry] : m_address_book) {
2918
0
        for (const auto& [id, request] : entry.receive_requests) {
2919
0
            values.emplace_back(request);
2920
0
        }
2921
0
    }
2922
0
    return values;
2923
0
}
2924
2925
bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value)
2926
0
{
2927
0
    if (!batch.WriteAddressReceiveRequest(dest, id, value)) return false;
2928
0
    m_address_book[dest].receive_requests[id] = value;
2929
0
    return true;
2930
0
}
2931
2932
bool CWallet::EraseAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id)
2933
0
{
2934
0
    if (!batch.EraseAddressReceiveRequest(dest, id)) return false;
2935
0
    m_address_book[dest].receive_requests.erase(id);
2936
0
    return true;
2937
0
}
2938
2939
static util::Result<fs::path> GetWalletPath(const std::string& name)
2940
0
{
2941
    // Do some checking on wallet path. It should be either a:
2942
    //
2943
    // 1. Path where a directory can be created.
2944
    // 2. Path to an existing directory.
2945
    // 3. Path to a symlink to a directory.
2946
    // 4. For backwards compatibility, the name of a data file in -walletdir.
2947
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(name));
2948
0
    fs::file_type path_type = fs::symlink_status(wallet_path).type();
2949
0
    if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory ||
2950
0
          (path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) ||
2951
0
          (path_type == fs::file_type::regular && fs::PathFromString(name).filename() == fs::PathFromString(name)))) {
2952
0
        return util::Error{Untranslated(strprintf(
2953
0
              "Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and "
2954
0
              "database/log.?????????? files can be stored, a location where such a directory could be created, "
2955
0
              "or (for backwards compatibility) the name of an existing data file in -walletdir (%s)",
2956
0
              name, fs::quoted(fs::PathToString(GetWalletDir()))))};
2957
0
    }
2958
0
    return wallet_path;
2959
0
}
2960
2961
std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string)
2962
0
{
2963
0
    const auto& wallet_path = GetWalletPath(name);
2964
0
    if (!wallet_path) {
2965
0
        error_string = util::ErrorString(wallet_path);
2966
0
        status = DatabaseStatus::FAILED_BAD_PATH;
2967
0
        return nullptr;
2968
0
    }
2969
0
    return MakeDatabase(*wallet_path, options, status, error_string);
2970
0
}
2971
2972
std::shared_ptr<CWallet> CWallet::Create(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings)
2973
0
{
2974
0
    interfaces::Chain* chain = context.chain;
2975
0
    ArgsManager& args = *Assert(context.args);
2976
0
    const std::string& walletFile = database->Filename();
2977
2978
0
    const auto start{SteadyClock::now()};
2979
    // TODO: Can't use std::make_shared because we need a custom deleter but
2980
    // should be possible to use std::allocate_shared.
2981
0
    std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
2982
0
    walletInstance->m_keypool_size = std::max(args.GetIntArg("-keypool", DEFAULT_KEYPOOL_SIZE), int64_t{1});
2983
0
    walletInstance->m_notify_tx_changed_script = args.GetArg("-walletnotify", "");
2984
2985
    // Load wallet
2986
0
    bool rescan_required = false;
2987
0
    DBErrors nLoadWalletRet = walletInstance->LoadWallet();
2988
0
    if (nLoadWalletRet != DBErrors::LOAD_OK) {
2989
0
        if (nLoadWalletRet == DBErrors::CORRUPT) {
2990
0
            error = strprintf(_("Error loading %s: Wallet corrupted"), walletFile);
2991
0
            return nullptr;
2992
0
        }
2993
0
        else if (nLoadWalletRet == DBErrors::NONCRITICAL_ERROR)
2994
0
        {
2995
0
            warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"
2996
0
                                           " or address metadata may be missing or incorrect."),
2997
0
                walletFile));
2998
0
        }
2999
0
        else if (nLoadWalletRet == DBErrors::TOO_NEW) {
3000
0
            error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), walletFile, PACKAGE_NAME);
3001
0
            return nullptr;
3002
0
        }
3003
0
        else if (nLoadWalletRet == DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED) {
3004
0
            error = strprintf(_("Error loading %s: External signer wallet being loaded without external signer support compiled"), walletFile);
3005
0
            return nullptr;
3006
0
        }
3007
0
        else if (nLoadWalletRet == DBErrors::NEED_REWRITE)
3008
0
        {
3009
0
            error = strprintf(_("Wallet needed to be rewritten: restart %s to complete"), PACKAGE_NAME);
3010
0
            return nullptr;
3011
0
        } else if (nLoadWalletRet == DBErrors::NEED_RESCAN) {
3012
0
            warnings.push_back(strprintf(_("Error reading %s! Transaction data may be missing or incorrect."
3013
0
                                           " Rescanning wallet."), walletFile));
3014
0
            rescan_required = true;
3015
0
        } else if (nLoadWalletRet == DBErrors::UNKNOWN_DESCRIPTOR) {
3016
0
            error = strprintf(_("Unrecognized descriptor found. Loading wallet %s\n\n"
3017
0
                                "The wallet might had been created on a newer version.\n"
3018
0
                                "Please try running the latest software version.\n"), walletFile);
3019
0
            return nullptr;
3020
0
        } else if (nLoadWalletRet == DBErrors::UNEXPECTED_LEGACY_ENTRY) {
3021
0
            error = strprintf(_("Unexpected legacy entry in descriptor wallet found. Loading wallet %s\n\n"
3022
0
                                "The wallet might have been tampered with or created with malicious intent.\n"), walletFile);
3023
0
            return nullptr;
3024
0
        } else {
3025
0
            error = strprintf(_("Error loading %s"), walletFile);
3026
0
            return nullptr;
3027
0
        }
3028
0
    }
3029
3030
    // This wallet is in its first run if there are no ScriptPubKeyMans and it isn't blank or no privkeys
3031
0
    const bool fFirstRun = walletInstance->m_spk_managers.empty() &&
3032
0
                     !walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) &&
3033
0
                     !walletInstance->IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET);
3034
0
    if (fFirstRun)
3035
0
    {
3036
        // ensure this wallet.dat can only be opened by clients supporting HD with chain split and expects no default key
3037
0
        walletInstance->SetMinVersion(FEATURE_LATEST);
3038
3039
0
        walletInstance->InitWalletFlags(wallet_creation_flags);
3040
3041
        // Only create LegacyScriptPubKeyMan when not descriptor wallet
3042
0
        if (!walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3043
0
            walletInstance->SetupLegacyScriptPubKeyMan();
3044
0
        }
3045
3046
0
        if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) || !(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) {
3047
0
            LOCK(walletInstance->cs_wallet);
3048
0
            if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3049
0
                walletInstance->SetupDescriptorScriptPubKeyMans();
3050
                // SetupDescriptorScriptPubKeyMans already calls SetupGeneration for us so we don't need to call SetupGeneration separately
3051
0
            } else {
3052
                // Legacy wallets need SetupGeneration here.
3053
0
                for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
3054
0
                    if (!spk_man->SetupGeneration()) {
3055
0
                        error = _("Unable to generate initial keys");
3056
0
                        return nullptr;
3057
0
                    }
3058
0
                }
3059
0
            }
3060
0
        }
3061
3062
0
        if (chain) {
3063
0
            walletInstance->chainStateFlushed(ChainstateRole::NORMAL, chain->getTipLocator());
3064
0
        }
3065
0
    } else if (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS) {
3066
        // Make it impossible to disable private keys after creation
3067
0
        error = strprintf(_("Error loading %s: Private keys can only be disabled during creation"), walletFile);
3068
0
        return nullptr;
3069
0
    } else if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
3070
0
        for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
3071
0
            if (spk_man->HavePrivateKeys()) {
3072
0
                warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));
3073
0
                break;
3074
0
            }
3075
0
        }
3076
0
    }
3077
3078
0
    if (!args.GetArg("-addresstype", "").empty()) {
3079
0
        std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-addresstype", ""));
3080
0
        if (!parsed) {
3081
0
            error = strprintf(_("Unknown address type '%s'"), args.GetArg("-addresstype", ""));
3082
0
            return nullptr;
3083
0
        }
3084
0
        walletInstance->m_default_address_type = parsed.value();
3085
0
    }
3086
3087
0
    if (!args.GetArg("-changetype", "").empty()) {
3088
0
        std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-changetype", ""));
3089
0
        if (!parsed) {
3090
0
            error = strprintf(_("Unknown change type '%s'"), args.GetArg("-changetype", ""));
3091
0
            return nullptr;
3092
0
        }
3093
0
        walletInstance->m_default_change_type = parsed.value();
3094
0
    }
3095
3096
0
    if (args.IsArgSet("-mintxfee")) {
3097
0
        std::optional<CAmount> min_tx_fee = ParseMoney(args.GetArg("-mintxfee", ""));
3098
0
        if (!min_tx_fee) {
3099
0
            error = AmountErrMsg("mintxfee", args.GetArg("-mintxfee", ""));
3100
0
            return nullptr;
3101
0
        } else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
3102
0
            warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") +
3103
0
                               _("This is the minimum transaction fee you pay on every transaction."));
3104
0
        }
3105
3106
0
        walletInstance->m_min_fee = CFeeRate{min_tx_fee.value()};
3107
0
    }
3108
3109
0
    if (args.IsArgSet("-maxapsfee")) {
3110
0
        const std::string max_aps_fee{args.GetArg("-maxapsfee", "")};
3111
0
        if (max_aps_fee == "-1") {
3112
0
            walletInstance->m_max_aps_fee = -1;
3113
0
        } else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) {
3114
0
            if (max_fee.value() > HIGH_APS_FEE) {
3115
0
                warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") +
3116
0
                                  _("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection."));
3117
0
            }
3118
0
            walletInstance->m_max_aps_fee = max_fee.value();
3119
0
        } else {
3120
0
            error = AmountErrMsg("maxapsfee", max_aps_fee);
3121
0
            return nullptr;
3122
0
        }
3123
0
    }
3124
3125
0
    if (args.IsArgSet("-fallbackfee")) {
3126
0
        std::optional<CAmount> fallback_fee = ParseMoney(args.GetArg("-fallbackfee", ""));
3127
0
        if (!fallback_fee) {
3128
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-fallbackfee", args.GetArg("-fallbackfee", ""));
3129
0
            return nullptr;
3130
0
        } else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) {
3131
0
            warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") +
3132
0
                               _("This is the transaction fee you may pay when fee estimates are not available."));
3133
0
        }
3134
0
        walletInstance->m_fallback_fee = CFeeRate{fallback_fee.value()};
3135
0
    }
3136
3137
    // Disable fallback fee in case value was set to 0, enable if non-null value
3138
0
    walletInstance->m_allow_fallback_fee = walletInstance->m_fallback_fee.GetFeePerK() != 0;
3139
3140
0
    if (args.IsArgSet("-discardfee")) {
3141
0
        std::optional<CAmount> discard_fee = ParseMoney(args.GetArg("-discardfee", ""));
3142
0
        if (!discard_fee) {
3143
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-discardfee", args.GetArg("-discardfee", ""));
3144
0
            return nullptr;
3145
0
        } else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) {
3146
0
            warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") +
3147
0
                               _("This is the transaction fee you may discard if change is smaller than dust at this level"));
3148
0
        }
3149
0
        walletInstance->m_discard_rate = CFeeRate{discard_fee.value()};
3150
0
    }
3151
3152
0
    if (args.IsArgSet("-paytxfee")) {
3153
0
        std::optional<CAmount> pay_tx_fee = ParseMoney(args.GetArg("-paytxfee", ""));
3154
0
        if (!pay_tx_fee) {
3155
0
            error = AmountErrMsg("paytxfee", args.GetArg("-paytxfee", ""));
3156
0
            return nullptr;
3157
0
        } else if (pay_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
3158
0
            warnings.push_back(AmountHighWarn("-paytxfee") + Untranslated(" ") +
3159
0
                               _("This is the transaction fee you will pay if you send a transaction."));
3160
0
        }
3161
3162
0
        walletInstance->m_pay_tx_fee = CFeeRate{pay_tx_fee.value(), 1000};
3163
3164
0
        if (chain && walletInstance->m_pay_tx_fee < chain->relayMinFee()) {
3165
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least %s)"),
3166
0
                "-paytxfee", args.GetArg("-paytxfee", ""), chain->relayMinFee().ToString());
3167
0
            return nullptr;
3168
0
        }
3169
0
    }
3170
3171
0
    if (args.IsArgSet("-maxtxfee")) {
3172
0
        std::optional<CAmount> max_fee = ParseMoney(args.GetArg("-maxtxfee", ""));
3173
0
        if (!max_fee) {
3174
0
            error = AmountErrMsg("maxtxfee", args.GetArg("-maxtxfee", ""));
3175
0
            return nullptr;
3176
0
        } else if (max_fee.value() > HIGH_MAX_TX_FEE) {
3177
0
            warnings.push_back(strprintf(_("%s is set very high! Fees this large could be paid on a single transaction."), "-maxtxfee"));
3178
0
        }
3179
3180
0
        if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) {
3181
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),
3182
0
                "-maxtxfee", args.GetArg("-maxtxfee", ""), chain->relayMinFee().ToString());
3183
0
            return nullptr;
3184
0
        }
3185
3186
0
        walletInstance->m_default_max_tx_fee = max_fee.value();
3187
0
    }
3188
3189
0
    if (args.IsArgSet("-consolidatefeerate")) {
3190
0
        if (std::optional<CAmount> consolidate_feerate = ParseMoney(args.GetArg("-consolidatefeerate", ""))) {
3191
0
            walletInstance->m_consolidate_feerate = CFeeRate(*consolidate_feerate);
3192
0
        } else {
3193
0
            error = AmountErrMsg("consolidatefeerate", args.GetArg("-consolidatefeerate", ""));
3194
0
            return nullptr;
3195
0
        }
3196
0
    }
3197
3198
0
    if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB) {
3199
0
        warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") +
3200
0
                           _("The wallet will avoid paying less than the minimum relay fee."));
3201
0
    }
3202
3203
0
    walletInstance->m_confirm_target = args.GetIntArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET);
3204
0
    walletInstance->m_spend_zero_conf_change = args.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE);
3205
0
    walletInstance->m_signal_rbf = args.GetBoolArg("-walletrbf", DEFAULT_WALLET_RBF);
3206
3207
0
    walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3208
3209
    // Try to top up keypool. No-op if the wallet is locked.
3210
0
    walletInstance->TopUpKeyPool();
3211
3212
    // Cache the first key time
3213
0
    std::optional<int64_t> time_first_key;
3214
0
    for (auto spk_man : walletInstance->GetAllScriptPubKeyMans()) {
3215
0
        int64_t time = spk_man->GetTimeFirstKey();
3216
0
        if (!time_first_key || time < *time_first_key) time_first_key = time;
3217
0
    }
3218
0
    if (time_first_key) walletInstance->MaybeUpdateBirthTime(*time_first_key);
3219
3220
0
    if (chain && !AttachChain(walletInstance, *chain, rescan_required, error, warnings)) {
3221
0
        walletInstance->m_chain_notifications_handler.reset(); // Reset this pointer so that the wallet will actually be unloaded
3222
0
        return nullptr;
3223
0
    }
3224
3225
0
    {
3226
0
        LOCK(walletInstance->cs_wallet);
3227
0
        walletInstance->SetBroadcastTransactions(args.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST));
3228
0
        walletInstance->WalletLogPrintf("setKeyPool.size() = %u\n",      walletInstance->GetKeyPoolSize());
3229
0
        walletInstance->WalletLogPrintf("mapWallet.size() = %u\n",       walletInstance->mapWallet.size());
3230
0
        walletInstance->WalletLogPrintf("m_address_book.size() = %u\n",  walletInstance->m_address_book.size());
3231
0
    }
3232
3233
0
    return walletInstance;
3234
0
}
3235
3236
bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, const bool rescan_required, bilingual_str& error, std::vector<bilingual_str>& warnings)
3237
0
{
3238
0
    LOCK(walletInstance->cs_wallet);
3239
    // allow setting the chain if it hasn't been set already but prevent changing it
3240
0
    assert(!walletInstance->m_chain || walletInstance->m_chain == &chain);
3241
0
    walletInstance->m_chain = &chain;
3242
3243
    // Unless allowed, ensure wallet files are not reused across chains:
3244
0
    if (!gArgs.GetBoolArg("-walletcrosschain", DEFAULT_WALLETCROSSCHAIN)) {
3245
0
        WalletBatch batch(walletInstance->GetDatabase());
3246
0
        CBlockLocator locator;
3247
0
        if (batch.ReadBestBlock(locator) && locator.vHave.size() > 0 && chain.getHeight()) {
3248
            // Wallet is assumed to be from another chain, if genesis block in the active
3249
            // chain differs from the genesis block known to the wallet.
3250
0
            if (chain.getBlockHash(0) != locator.vHave.back()) {
3251
0
                error = Untranslated("Wallet files should not be reused across chains. Restart bitcoind with -walletcrosschain to override.");
3252
0
                return false;
3253
0
            }
3254
0
        }
3255
0
    }
3256
3257
    // Register wallet with validationinterface. It's done before rescan to avoid
3258
    // missing block connections between end of rescan and validation subscribing.
3259
    // Because of wallet lock being hold, block connection notifications are going to
3260
    // be pending on the validation-side until lock release. It's likely to have
3261
    // block processing duplicata (if rescan block range overlaps with notification one)
3262
    // but we guarantee at least than wallet state is correct after notifications delivery.
3263
    // However, chainStateFlushed notifications are ignored until the rescan is finished
3264
    // so that in case of a shutdown event, the rescan will be repeated at the next start.
3265
    // This is temporary until rescan and notifications delivery are unified under same
3266
    // interface.
3267
0
    walletInstance->m_attaching_chain = true; //ignores chainStateFlushed notifications
3268
0
    walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance);
3269
3270
    // If rescan_required = true, rescan_height remains equal to 0
3271
0
    int rescan_height = 0;
3272
0
    if (!rescan_required)
3273
0
    {
3274
0
        WalletBatch batch(walletInstance->GetDatabase());
3275
0
        CBlockLocator locator;
3276
0
        if (batch.ReadBestBlock(locator)) {
3277
0
            if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) {
3278
0
                rescan_height = *fork_height;
3279
0
            }
3280
0
        }
3281
0
    }
3282
3283
0
    const std::optional<int> tip_height = chain.getHeight();
3284
0
    if (tip_height) {
3285
0
        walletInstance->m_last_block_processed = chain.getBlockHash(*tip_height);
3286
0
        walletInstance->m_last_block_processed_height = *tip_height;
3287
0
    } else {
3288
0
        walletInstance->m_last_block_processed.SetNull();
3289
0
        walletInstance->m_last_block_processed_height = -1;
3290
0
    }
3291
3292
0
    if (tip_height && *tip_height != rescan_height)
3293
0
    {
3294
        // No need to read and scan block if block was created before
3295
        // our wallet birthday (as adjusted for block time variability)
3296
0
        std::optional<int64_t> time_first_key = walletInstance->m_birth_time.load();
3297
0
        if (time_first_key) {
3298
0
            FoundBlock found = FoundBlock().height(rescan_height);
3299
0
            chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, found);
3300
0
            if (!found.found) {
3301
                // We were unable to find a block that had a time more recent than our earliest timestamp
3302
                // or a height higher than the wallet was synced to, indicating that the wallet is newer than the
3303
                // current chain tip. Skip rescanning in this case.
3304
0
                rescan_height = *tip_height;
3305
0
            }
3306
0
        }
3307
3308
        // Technically we could execute the code below in any case, but performing the
3309
        // `while` loop below can make startup very slow, so only check blocks on disk
3310
        // if necessary.
3311
0
        if (chain.havePruned() || chain.hasAssumedValidChain()) {
3312
0
            int block_height = *tip_height;
3313
0
            while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) {
3314
0
                --block_height;
3315
0
            }
3316
3317
0
            if (rescan_height != block_height) {
3318
                // We can't rescan beyond blocks we don't have data for, stop and throw an error.
3319
                // This might happen if a user uses an old wallet within a pruned node
3320
                // or if they ran -disablewallet for a longer time, then decided to re-enable
3321
                // Exit early and print an error.
3322
                // It also may happen if an assumed-valid chain is in use and therefore not
3323
                // all block data is available.
3324
                // If a block is pruned after this check, we will load the wallet,
3325
                // but fail the rescan with a generic error.
3326
3327
0
                error = chain.havePruned() ?
3328
0
                     _("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of pruned node)") :
3329
0
                     strprintf(_(
3330
0
                        "Error loading wallet. Wallet requires blocks to be downloaded, "
3331
0
                        "and software does not currently support loading wallets while "
3332
0
                        "blocks are being downloaded out of order when using assumeutxo "
3333
0
                        "snapshots. Wallet should be able to load successfully after "
3334
0
                        "node sync reaches height %s"), block_height);
3335
0
                return false;
3336
0
            }
3337
0
        }
3338
3339
0
        chain.initMessage(_("Rescanning…").translated);
3340
0
        walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height);
3341
3342
0
        {
3343
0
            WalletRescanReserver reserver(*walletInstance);
3344
0
            if (!reserver.reserve() || (ScanResult::SUCCESS != walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, /*max_height=*/{}, reserver, /*fUpdate=*/true, /*save_progress=*/true).status)) {
3345
0
                error = _("Failed to rescan the wallet during initialization");
3346
0
                return false;
3347
0
            }
3348
0
        }
3349
0
        walletInstance->m_attaching_chain = false;
3350
0
        walletInstance->chainStateFlushed(ChainstateRole::NORMAL, chain.getTipLocator());
3351
0
        walletInstance->GetDatabase().IncrementUpdateCounter();
3352
0
    }
3353
0
    walletInstance->m_attaching_chain = false;
3354
3355
0
    return true;
3356
0
}
3357
3358
const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const
3359
0
{
3360
0
    const auto& address_book_it = m_address_book.find(dest);
3361
0
    if (address_book_it == m_address_book.end()) return nullptr;
3362
0
    if ((!allow_change) && address_book_it->second.IsChange()) {
3363
0
        return nullptr;
3364
0
    }
3365
0
    return &address_book_it->second;
3366
0
}
3367
3368
bool CWallet::UpgradeWallet(int version, bilingual_str& error)
3369
0
{
3370
0
    int prev_version = GetVersion();
3371
0
    if (version == 0) {
3372
0
        WalletLogPrintf("Performing wallet upgrade to %i\n", FEATURE_LATEST);
3373
0
        version = FEATURE_LATEST;
3374
0
    } else {
3375
0
        WalletLogPrintf("Allowing wallet upgrade up to %i\n", version);
3376
0
    }
3377
0
    if (version < prev_version) {
3378
0
        error = strprintf(_("Cannot downgrade wallet from version %i to version %i. Wallet version unchanged."), prev_version, version);
3379
0
        return false;
3380
0
    }
3381
3382
0
    LOCK(cs_wallet);
3383
3384
    // Do not upgrade versions to any version between HD_SPLIT and FEATURE_PRE_SPLIT_KEYPOOL unless already supporting HD_SPLIT
3385
0
    if (!CanSupportFeature(FEATURE_HD_SPLIT) && version >= FEATURE_HD_SPLIT && version < FEATURE_PRE_SPLIT_KEYPOOL) {
3386
0
        error = strprintf(_("Cannot upgrade a non HD split wallet from version %i to version %i without upgrading to support pre-split keypool. Please use version %i or no version specified."), prev_version, version, FEATURE_PRE_SPLIT_KEYPOOL);
3387
0
        return false;
3388
0
    }
3389
3390
    // Permanently upgrade to the version
3391
0
    SetMinVersion(GetClosestWalletFeature(version));
3392
3393
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
3394
0
        if (!spk_man->Upgrade(prev_version, version, error)) {
3395
0
            return false;
3396
0
        }
3397
0
    }
3398
0
    return true;
3399
0
}
3400
3401
void CWallet::postInitProcess()
3402
0
{
3403
    // Add wallet transactions that aren't already in a block to mempool
3404
    // Do this here as mempool requires genesis block to be loaded
3405
0
    ResubmitWalletTransactions(/*relay=*/false, /*force=*/true);
3406
3407
    // Update wallet transactions with current mempool transactions.
3408
0
    WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
3409
0
}
3410
3411
bool CWallet::BackupWallet(const std::string& strDest) const
3412
0
{
3413
0
    if (m_chain) {
3414
0
        CBlockLocator loc;
3415
0
        WITH_LOCK(cs_wallet, chain().findBlock(m_last_block_processed, FoundBlock().locator(loc)));
3416
0
        if (!loc.IsNull()) {
3417
0
            WalletBatch batch(GetDatabase());
3418
0
            batch.WriteBestBlock(loc);
3419
0
        }
3420
0
    }
3421
0
    return GetDatabase().Backup(strDest);
3422
0
}
3423
3424
CKeyPool::CKeyPool()
3425
0
{
3426
0
    nTime = GetTime();
3427
0
    fInternal = false;
3428
0
    m_pre_split = false;
3429
0
}
3430
3431
CKeyPool::CKeyPool(const CPubKey& vchPubKeyIn, bool internalIn)
3432
0
{
3433
0
    nTime = GetTime();
3434
0
    vchPubKey = vchPubKeyIn;
3435
0
    fInternal = internalIn;
3436
0
    m_pre_split = false;
3437
0
}
3438
3439
int CWallet::GetTxDepthInMainChain(const CWalletTx& wtx) const
3440
0
{
3441
0
    AssertLockHeld(cs_wallet);
3442
0
    if (auto* conf = wtx.state<TxStateConfirmed>()) {
3443
0
        assert(conf->confirmed_block_height >= 0);
3444
0
        return GetLastBlockHeight() - conf->confirmed_block_height + 1;
3445
0
    } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
3446
0
        assert(conf->conflicting_block_height >= 0);
3447
0
        return -1 * (GetLastBlockHeight() - conf->conflicting_block_height + 1);
3448
0
    } else {
3449
0
        return 0;
3450
0
    }
3451
0
}
3452
3453
int CWallet::GetTxBlocksToMaturity(const CWalletTx& wtx) const
3454
0
{
3455
0
    AssertLockHeld(cs_wallet);
3456
3457
0
    if (!wtx.IsCoinBase()) {
3458
0
        return 0;
3459
0
    }
3460
0
    int chain_depth = GetTxDepthInMainChain(wtx);
3461
0
    assert(chain_depth >= 0); // coinbase tx should not be conflicted
3462
0
    return std::max(0, (COINBASE_MATURITY+1) - chain_depth);
3463
0
}
3464
3465
bool CWallet::IsTxImmatureCoinBase(const CWalletTx& wtx) const
3466
0
{
3467
0
    AssertLockHeld(cs_wallet);
3468
3469
    // note GetBlocksToMaturity is 0 for non-coinbase tx
3470
0
    return GetTxBlocksToMaturity(wtx) > 0;
3471
0
}
3472
3473
bool CWallet::IsCrypted() const
3474
0
{
3475
0
    return HasEncryptionKeys();
3476
0
}
3477
3478
bool CWallet::IsLocked() const
3479
0
{
3480
0
    if (!IsCrypted()) {
3481
0
        return false;
3482
0
    }
3483
0
    LOCK(cs_wallet);
3484
0
    return vMasterKey.empty();
3485
0
}
3486
3487
bool CWallet::Lock()
3488
0
{
3489
0
    if (!IsCrypted())
3490
0
        return false;
3491
3492
0
    {
3493
0
        LOCK2(m_relock_mutex, cs_wallet);
3494
0
        if (!vMasterKey.empty()) {
3495
0
            memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type));
3496
0
            vMasterKey.clear();
3497
0
        }
3498
0
    }
3499
3500
0
    NotifyStatusChanged(this);
3501
0
    return true;
3502
0
}
3503
3504
bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn)
3505
0
{
3506
0
    {
3507
0
        LOCK(cs_wallet);
3508
0
        for (const auto& spk_man_pair : m_spk_managers) {
3509
0
            if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn)) {
3510
0
                return false;
3511
0
            }
3512
0
        }
3513
0
        vMasterKey = vMasterKeyIn;
3514
0
    }
3515
0
    NotifyStatusChanged(this);
3516
0
    return true;
3517
0
}
3518
3519
std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const
3520
0
{
3521
0
    std::set<ScriptPubKeyMan*> spk_mans;
3522
0
    for (bool internal : {false, true}) {
3523
0
        for (OutputType t : OUTPUT_TYPES) {
3524
0
            auto spk_man = GetScriptPubKeyMan(t, internal);
3525
0
            if (spk_man) {
3526
0
                spk_mans.insert(spk_man);
3527
0
            }
3528
0
        }
3529
0
    }
3530
0
    return spk_mans;
3531
0
}
3532
3533
bool CWallet::IsActiveScriptPubKeyMan(const ScriptPubKeyMan& spkm) const
3534
0
{
3535
0
    for (const auto& [_, ext_spkm] : m_external_spk_managers) {
3536
0
        if (ext_spkm == &spkm) return true;
3537
0
    }
3538
0
    for (const auto& [_, int_spkm] : m_internal_spk_managers) {
3539
0
        if (int_spkm == &spkm) return true;
3540
0
    }
3541
0
    return false;
3542
0
}
3543
3544
std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const
3545
0
{
3546
0
    std::set<ScriptPubKeyMan*> spk_mans;
3547
0
    for (const auto& spk_man_pair : m_spk_managers) {
3548
0
        spk_mans.insert(spk_man_pair.second.get());
3549
0
    }
3550
0
    return spk_mans;
3551
0
}
3552
3553
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const OutputType& type, bool internal) const
3554
0
{
3555
0
    const std::map<OutputType, ScriptPubKeyMan*>& spk_managers = internal ? m_internal_spk_managers : m_external_spk_managers;
3556
0
    std::map<OutputType, ScriptPubKeyMan*>::const_iterator it = spk_managers.find(type);
3557
0
    if (it == spk_managers.end()) {
3558
0
        return nullptr;
3559
0
    }
3560
0
    return it->second;
3561
0
}
3562
3563
std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script) const
3564
0
{
3565
0
    std::set<ScriptPubKeyMan*> spk_mans;
3566
3567
    // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3568
0
    const auto& it = m_cached_spks.find(script);
3569
0
    if (it != m_cached_spks.end()) {
3570
0
        spk_mans.insert(it->second.begin(), it->second.end());
3571
0
    }
3572
0
    SignatureData sigdata;
3573
0
    Assume(std::all_of(spk_mans.begin(), spk_mans.end(), [&script, &sigdata](ScriptPubKeyMan* spkm) { return spkm->CanProvide(script, sigdata); }));
3574
3575
    // Legacy wallet
3576
0
    LegacyScriptPubKeyMan* spkm = GetLegacyScriptPubKeyMan();
3577
0
    if (spkm && spkm->CanProvide(script, sigdata)) spk_mans.insert(spkm);
3578
3579
0
    return spk_mans;
3580
0
}
3581
3582
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const
3583
0
{
3584
0
    if (m_spk_managers.count(id) > 0) {
3585
0
        return m_spk_managers.at(id).get();
3586
0
    }
3587
0
    return nullptr;
3588
0
}
3589
3590
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const
3591
0
{
3592
0
    SignatureData sigdata;
3593
0
    return GetSolvingProvider(script, sigdata);
3594
0
}
3595
3596
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const
3597
0
{
3598
    // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3599
0
    const auto& it = m_cached_spks.find(script);
3600
0
    if (it != m_cached_spks.end()) {
3601
        // All spkms for a given script must already be able to make a SigningProvider for the script, so just return the first one.
3602
0
        Assume(it->second.at(0)->CanProvide(script, sigdata));
3603
0
        return it->second.at(0)->GetSolvingProvider(script);
3604
0
    }
3605
3606
    // Legacy wallet
3607
0
    LegacyScriptPubKeyMan* spkm = GetLegacyScriptPubKeyMan();
3608
0
    if (spkm && spkm->CanProvide(script, sigdata)) return spkm->GetSolvingProvider(script);
3609
3610
0
    return nullptr;
3611
0
}
3612
3613
std::vector<WalletDescriptor> CWallet::GetWalletDescriptors(const CScript& script) const
3614
0
{
3615
0
    std::vector<WalletDescriptor> descs;
3616
0
    for (const auto spk_man: GetScriptPubKeyMans(script)) {
3617
0
        if (const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man)) {
3618
0
            LOCK(desc_spk_man->cs_desc_man);
3619
0
            descs.push_back(desc_spk_man->GetWalletDescriptor());
3620
0
        }
3621
0
    }
3622
0
    return descs;
3623
0
}
3624
3625
LegacyScriptPubKeyMan* CWallet::GetLegacyScriptPubKeyMan() const
3626
0
{
3627
0
    if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3628
0
        return nullptr;
3629
0
    }
3630
    // Legacy wallets only have one ScriptPubKeyMan which is a LegacyScriptPubKeyMan.
3631
    // Everything in m_internal_spk_managers and m_external_spk_managers point to the same legacyScriptPubKeyMan.
3632
0
    auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3633
0
    if (it == m_internal_spk_managers.end()) return nullptr;
3634
0
    return dynamic_cast<LegacyScriptPubKeyMan*>(it->second);
3635
0
}
3636
3637
LegacyDataSPKM* CWallet::GetLegacyDataSPKM() const
3638
0
{
3639
0
    if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3640
0
        return nullptr;
3641
0
    }
3642
0
    auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3643
0
    if (it == m_internal_spk_managers.end()) return nullptr;
3644
0
    return dynamic_cast<LegacyDataSPKM*>(it->second);
3645
0
}
3646
3647
LegacyScriptPubKeyMan* CWallet::GetOrCreateLegacyScriptPubKeyMan()
3648
0
{
3649
0
    SetupLegacyScriptPubKeyMan();
3650
0
    return GetLegacyScriptPubKeyMan();
3651
0
}
3652
3653
void CWallet::AddScriptPubKeyMan(const uint256& id, std::unique_ptr<ScriptPubKeyMan> spkm_man)
3654
0
{
3655
    // Add spkm_man to m_spk_managers before calling any method
3656
    // that might access it.
3657
0
    const auto& spkm = m_spk_managers[id] = std::move(spkm_man);
3658
3659
    // Update birth time if needed
3660
0
    MaybeUpdateBirthTime(spkm->GetTimeFirstKey());
3661
0
}
3662
3663
LegacyDataSPKM* CWallet::GetOrCreateLegacyDataSPKM()
3664
0
{
3665
0
    SetupLegacyScriptPubKeyMan();
3666
0
    return GetLegacyDataSPKM();
3667
0
}
3668
3669
void CWallet::SetupLegacyScriptPubKeyMan()
3670
0
{
3671
0
    if (!m_internal_spk_managers.empty() || !m_external_spk_managers.empty() || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3672
0
        return;
3673
0
    }
3674
3675
0
    std::unique_ptr<ScriptPubKeyMan> spk_manager = m_database->Format() == "bdb_ro" ?
3676
0
        std::make_unique<LegacyDataSPKM>(*this) :
3677
0
        std::make_unique<LegacyScriptPubKeyMan>(*this, m_keypool_size);
3678
3679
0
    for (const auto& type : LEGACY_OUTPUT_TYPES) {
3680
0
        m_internal_spk_managers[type] = spk_manager.get();
3681
0
        m_external_spk_managers[type] = spk_manager.get();
3682
0
    }
3683
0
    uint256 id = spk_manager->GetID();
3684
0
    AddScriptPubKeyMan(id, std::move(spk_manager));
3685
0
}
3686
3687
bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const
3688
0
{
3689
0
    LOCK(cs_wallet);
3690
0
    return cb(vMasterKey);
3691
0
}
3692
3693
bool CWallet::HasEncryptionKeys() const
3694
0
{
3695
0
    return !mapMasterKeys.empty();
3696
0
}
3697
3698
void CWallet::ConnectScriptPubKeyManNotifiers()
3699
0
{
3700
0
    for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
3701
0
        spk_man->NotifyWatchonlyChanged.connect(NotifyWatchonlyChanged);
3702
0
        spk_man->NotifyCanGetAddressesChanged.connect(NotifyCanGetAddressesChanged);
3703
0
        spk_man->NotifyFirstKeyTimeChanged.connect(std::bind(&CWallet::MaybeUpdateBirthTime, this, std::placeholders::_2));
3704
0
    }
3705
0
}
3706
3707
DescriptorScriptPubKeyMan& CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc)
3708
0
{
3709
0
    DescriptorScriptPubKeyMan* spk_manager;
3710
0
    if (IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3711
0
        spk_manager = new ExternalSignerScriptPubKeyMan(*this, desc, m_keypool_size);
3712
0
    } else {
3713
0
        spk_manager = new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size);
3714
0
    }
3715
0
    AddScriptPubKeyMan(id, std::unique_ptr<ScriptPubKeyMan>(spk_manager));
3716
0
    return *spk_manager;
3717
0
}
3718
3719
DescriptorScriptPubKeyMan& CWallet::SetupDescriptorScriptPubKeyMan(WalletBatch& batch, const CExtKey& master_key, const OutputType& output_type, bool internal)
3720
0
{
3721
0
    AssertLockHeld(cs_wallet);
3722
0
    auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, m_keypool_size));
3723
0
    if (IsCrypted()) {
3724
0
        if (IsLocked()) {
3725
0
            throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors");
3726
0
        }
3727
0
        if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, &batch)) {
3728
0
            throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors");
3729
0
        }
3730
0
    }
3731
0
    spk_manager->SetupDescriptorGeneration(batch, master_key, output_type, internal);
3732
0
    DescriptorScriptPubKeyMan* out = spk_manager.get();
3733
0
    uint256 id = spk_manager->GetID();
3734
0
    AddScriptPubKeyMan(id, std::move(spk_manager));
3735
0
    AddActiveScriptPubKeyManWithDb(batch, id, output_type, internal);
3736
0
    return *out;
3737
0
}
3738
3739
void CWallet::SetupDescriptorScriptPubKeyMans(const CExtKey& master_key)
3740
0
{
3741
0
    AssertLockHeld(cs_wallet);
3742
3743
    // Create single batch txn
3744
0
    WalletBatch batch(GetDatabase());
3745
0
    if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors setup");
3746
3747
0
    for (bool internal : {false, true}) {
3748
0
        for (OutputType t : OUTPUT_TYPES) {
3749
0
            SetupDescriptorScriptPubKeyMan(batch, master_key, t, internal);
3750
0
        }
3751
0
    }
3752
3753
    // Ensure information is committed to disk
3754
0
    if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors setup");
3755
0
}
3756
3757
void CWallet::SetupDescriptorScriptPubKeyMans()
3758
0
{
3759
0
    AssertLockHeld(cs_wallet);
3760
3761
0
    if (!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3762
        // Make a seed
3763
0
        CKey seed_key = GenerateRandomKey();
3764
0
        CPubKey seed = seed_key.GetPubKey();
3765
0
        assert(seed_key.VerifyPubKey(seed));
3766
3767
        // Get the extended key
3768
0
        CExtKey master_key;
3769
0
        master_key.SetSeed(seed_key);
3770
3771
0
        SetupDescriptorScriptPubKeyMans(master_key);
3772
0
    } else {
3773
0
        ExternalSigner signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
3774
3775
        // TODO: add account parameter
3776
0
        int account = 0;
3777
0
        UniValue signer_res = signer.GetDescriptors(account);
3778
3779
0
        if (!signer_res.isObject()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
3780
3781
0
        WalletBatch batch(GetDatabase());
3782
0
        if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors import");
3783
3784
0
        for (bool internal : {false, true}) {
3785
0
            const UniValue& descriptor_vals = signer_res.find_value(internal ? "internal" : "receive");
3786
0
            if (!descriptor_vals.isArray()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
3787
0
            for (const UniValue& desc_val : descriptor_vals.get_array().getValues()) {
3788
0
                const std::string& desc_str = desc_val.getValStr();
3789
0
                FlatSigningProvider keys;
3790
0
                std::string desc_error;
3791
0
                auto descs = Parse(desc_str, keys, desc_error, false);
3792
0
                if (descs.empty()) {
3793
0
                    throw std::runtime_error(std::string(__func__) + ": Invalid descriptor \"" + desc_str + "\" (" + desc_error + ")");
3794
0
                }
3795
0
                auto& desc = descs.at(0);
3796
0
                if (!desc->GetOutputType()) {
3797
0
                    continue;
3798
0
                }
3799
0
                OutputType t =  *desc->GetOutputType();
3800
0
                auto spk_manager = std::unique_ptr<ExternalSignerScriptPubKeyMan>(new ExternalSignerScriptPubKeyMan(*this, m_keypool_size));
3801
0
                spk_manager->SetupDescriptor(batch, std::move(desc));
3802
0
                uint256 id = spk_manager->GetID();
3803
0
                AddScriptPubKeyMan(id, std::move(spk_manager));
3804
0
                AddActiveScriptPubKeyManWithDb(batch, id, t, internal);
3805
0
            }
3806
0
        }
3807
3808
        // Ensure imported descriptors are committed to disk
3809
0
        if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors import");
3810
0
    }
3811
0
}
3812
3813
void CWallet::AddActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3814
0
{
3815
0
    WalletBatch batch(GetDatabase());
3816
0
    return AddActiveScriptPubKeyManWithDb(batch, id, type, internal);
3817
0
}
3818
3819
void CWallet::AddActiveScriptPubKeyManWithDb(WalletBatch& batch, uint256 id, OutputType type, bool internal)
3820
0
{
3821
0
    if (!batch.WriteActiveScriptPubKeyMan(static_cast<uint8_t>(type), id, internal)) {
3822
0
        throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed");
3823
0
    }
3824
0
    LoadActiveScriptPubKeyMan(id, type, internal);
3825
0
}
3826
3827
void CWallet::LoadActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3828
0
{
3829
    // Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets.
3830
    // Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types.
3831
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3832
3833
0
    WalletLogPrintf("Setting spkMan to active: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3834
0
    auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3835
0
    auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers;
3836
0
    auto spk_man = m_spk_managers.at(id).get();
3837
0
    spk_mans[type] = spk_man;
3838
3839
0
    const auto it = spk_mans_other.find(type);
3840
0
    if (it != spk_mans_other.end() && it->second == spk_man) {
3841
0
        spk_mans_other.erase(type);
3842
0
    }
3843
3844
0
    NotifyCanGetAddressesChanged();
3845
0
}
3846
3847
void CWallet::DeactivateScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3848
0
{
3849
0
    auto spk_man = GetScriptPubKeyMan(type, internal);
3850
0
    if (spk_man != nullptr && spk_man->GetID() == id) {
3851
0
        WalletLogPrintf("Deactivate spkMan: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3852
0
        WalletBatch batch(GetDatabase());
3853
0
        if (!batch.EraseActiveScriptPubKeyMan(static_cast<uint8_t>(type), internal)) {
3854
0
            throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed");
3855
0
        }
3856
3857
0
        auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3858
0
        spk_mans.erase(type);
3859
0
    }
3860
3861
0
    NotifyCanGetAddressesChanged();
3862
0
}
3863
3864
bool CWallet::IsLegacy() const
3865
0
{
3866
0
    return !IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS);
3867
0
}
3868
3869
DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const
3870
0
{
3871
0
    for (auto& spk_man_pair : m_spk_managers) {
3872
        // Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match
3873
0
        DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair.second.get());
3874
0
        if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) {
3875
0
            return spk_manager;
3876
0
        }
3877
0
    }
3878
3879
0
    return nullptr;
3880
0
}
3881
3882
std::optional<bool> CWallet::IsInternalScriptPubKeyMan(ScriptPubKeyMan* spk_man) const
3883
0
{
3884
    // Legacy script pubkey man can't be either external or internal
3885
0
    if (IsLegacy()) {
3886
0
        return std::nullopt;
3887
0
    }
3888
3889
    // only active ScriptPubKeyMan can be internal
3890
0
    if (!GetActiveScriptPubKeyMans().count(spk_man)) {
3891
0
        return std::nullopt;
3892
0
    }
3893
3894
0
    const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man);
3895
0
    if (!desc_spk_man) {
3896
0
        throw std::runtime_error(std::string(__func__) + ": unexpected ScriptPubKeyMan type.");
3897
0
    }
3898
3899
0
    LOCK(desc_spk_man->cs_desc_man);
3900
0
    const auto& type = desc_spk_man->GetWalletDescriptor().descriptor->GetOutputType();
3901
0
    assert(type.has_value());
3902
3903
0
    return GetScriptPubKeyMan(*type, /* internal= */ true) == desc_spk_man;
3904
0
}
3905
3906
ScriptPubKeyMan* CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal)
3907
0
{
3908
0
    AssertLockHeld(cs_wallet);
3909
3910
0
    if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3911
0
        WalletLogPrintf("Cannot add WalletDescriptor to a non-descriptor wallet\n");
3912
0
        return nullptr;
3913
0
    }
3914
3915
0
    auto spk_man = GetDescriptorScriptPubKeyMan(desc);
3916
0
    if (spk_man) {
3917
0
        WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString());
3918
0
        spk_man->UpdateWalletDescriptor(desc);
3919
0
    } else {
3920
0
        auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size));
3921
0
        spk_man = new_spk_man.get();
3922
3923
        // Save the descriptor to memory
3924
0
        uint256 id = new_spk_man->GetID();
3925
0
        AddScriptPubKeyMan(id, std::move(new_spk_man));
3926
0
    }
3927
3928
    // Add the private keys to the descriptor
3929
0
    for (const auto& entry : signing_provider.keys) {
3930
0
        const CKey& key = entry.second;
3931
0
        spk_man->AddDescriptorKey(key, key.GetPubKey());
3932
0
    }
3933
3934
    // Top up key pool, the manager will generate new scriptPubKeys internally
3935
0
    if (!spk_man->TopUp()) {
3936
0
        WalletLogPrintf("Could not top up scriptPubKeys\n");
3937
0
        return nullptr;
3938
0
    }
3939
3940
    // Apply the label if necessary
3941
    // Note: we disable labels for ranged descriptors
3942
0
    if (!desc.descriptor->IsRange()) {
3943
0
        auto script_pub_keys = spk_man->GetScriptPubKeys();
3944
0
        if (script_pub_keys.empty()) {
3945
0
            WalletLogPrintf("Could not generate scriptPubKeys (cache is empty)\n");
3946
0
            return nullptr;
3947
0
        }
3948
3949
0
        if (!internal) {
3950
0
            for (const auto& script : script_pub_keys) {
3951
0
                CTxDestination dest;
3952
0
                if (ExtractDestination(script, dest)) {
3953
0
                    SetAddressBook(dest, label, AddressPurpose::RECEIVE);
3954
0
                }
3955
0
            }
3956
0
        }
3957
0
    }
3958
3959
    // Save the descriptor to DB
3960
0
    spk_man->WriteDescriptor();
3961
3962
0
    return spk_man;
3963
0
}
3964
3965
bool CWallet::MigrateToSQLite(bilingual_str& error)
3966
0
{
3967
0
    AssertLockHeld(cs_wallet);
3968
3969
0
    WalletLogPrintf("Migrating wallet storage database from BerkeleyDB to SQLite.\n");
3970
3971
0
    if (m_database->Format() == "sqlite") {
3972
0
        error = _("Error: This wallet already uses SQLite");
3973
0
        return false;
3974
0
    }
3975
3976
    // Get all of the records for DB type migration
3977
0
    std::unique_ptr<DatabaseBatch> batch = m_database->MakeBatch();
3978
0
    std::unique_ptr<DatabaseCursor> cursor = batch->GetNewCursor();
3979
0
    std::vector<std::pair<SerializeData, SerializeData>> records;
3980
0
    if (!cursor) {
3981
0
        error = _("Error: Unable to begin reading all records in the database");
3982
0
        return false;
3983
0
    }
3984
0
    DatabaseCursor::Status status = DatabaseCursor::Status::FAIL;
3985
0
    while (true) {
3986
0
        DataStream ss_key{};
3987
0
        DataStream ss_value{};
3988
0
        status = cursor->Next(ss_key, ss_value);
3989
0
        if (status != DatabaseCursor::Status::MORE) {
3990
0
            break;
3991
0
        }
3992
0
        SerializeData key(ss_key.begin(), ss_key.end());
3993
0
        SerializeData value(ss_value.begin(), ss_value.end());
3994
0
        records.emplace_back(key, value);
3995
0
    }
3996
0
    cursor.reset();
3997
0
    batch.reset();
3998
0
    if (status != DatabaseCursor::Status::DONE) {
3999
0
        error = _("Error: Unable to read all records in the database");
4000
0
        return false;
4001
0
    }
4002
4003
    // Close this database and delete the file
4004
0
    fs::path db_path = fs::PathFromString(m_database->Filename());
4005
0
    m_database->Close();
4006
0
    fs::remove(db_path);
4007
4008
    // Generate the path for the location of the migrated wallet
4009
    // Wallets that are plain files rather than wallet directories will be migrated to be wallet directories.
4010
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(m_name));
4011
4012
    // Make new DB
4013
0
    DatabaseOptions opts;
4014
0
    opts.require_create = true;
4015
0
    opts.require_format = DatabaseFormat::SQLITE;
4016
0
    DatabaseStatus db_status;
4017
0
    std::unique_ptr<WalletDatabase> new_db = MakeDatabase(wallet_path, opts, db_status, error);
4018
0
    assert(new_db); // This is to prevent doing anything further with this wallet. The original file was deleted, but a backup exists.
4019
0
    m_database.reset();
4020
0
    m_database = std::move(new_db);
4021
4022
    // Write existing records into the new DB
4023
0
    batch = m_database->MakeBatch();
4024
0
    bool began = batch->TxnBegin();
4025
0
    assert(began); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
4026
0
    for (const auto& [key, value] : records) {
4027
0
        if (!batch->Write(Span{key}, Span{value})) {
4028
0
            batch->TxnAbort();
4029
0
            m_database->Close();
4030
0
            fs::remove(m_database->Filename());
4031
0
            assert(false); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
4032
0
        }
4033
0
    }
4034
0
    bool committed = batch->TxnCommit();
4035
0
    assert(committed); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
4036
0
    return true;
4037
0
}
4038
4039
std::optional<MigrationData> CWallet::GetDescriptorsForLegacy(bilingual_str& error) const
4040
0
{
4041
0
    AssertLockHeld(cs_wallet);
4042
4043
0
    LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
4044
0
    if (!Assume(legacy_spkm)) {
4045
        // This shouldn't happen
4046
0
        error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));
4047
0
        return std::nullopt;
4048
0
    }
4049
4050
0
    std::optional<MigrationData> res = legacy_spkm->MigrateToDescriptor();
4051
0
    if (res == std::nullopt) {
4052
0
        error = _("Error: Unable to produce descriptors for this legacy wallet. Make sure to provide the wallet's passphrase if it is encrypted.");
4053
0
        return std::nullopt;
4054
0
    }
4055
0
    return res;
4056
0
}
4057
4058
bool CWallet::ApplyMigrationData(MigrationData& data, bilingual_str& error)
4059
0
{
4060
0
    AssertLockHeld(cs_wallet);
4061
4062
0
    LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
4063
0
    if (!Assume(legacy_spkm)) {
4064
        // This shouldn't happen
4065
0
        error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));
4066
0
        return false;
4067
0
    }
4068
4069
    // Get all invalid or non-watched scripts that will not be migrated
4070
0
    std::set<CTxDestination> not_migrated_dests;
4071
0
    for (const auto& script : legacy_spkm->GetNotMineScriptPubKeys()) {
4072
0
        CTxDestination dest;
4073
0
        if (ExtractDestination(script, dest)) not_migrated_dests.emplace(dest);
4074
0
    }
4075
4076
0
    Assume(!m_cached_spks.empty());
4077
4078
0
    for (auto& desc_spkm : data.desc_spkms) {
4079
0
        if (m_spk_managers.count(desc_spkm->GetID()) > 0) {
4080
0
            error = _("Error: Duplicate descriptors created during migration. Your wallet may be corrupted.");
4081
0
            return false;
4082
0
        }
4083
0
        uint256 id = desc_spkm->GetID();
4084
0
        AddScriptPubKeyMan(id, std::move(desc_spkm));
4085
0
    }
4086
4087
    // Remove the LegacyScriptPubKeyMan from disk
4088
0
    if (!legacy_spkm->DeleteRecords()) {
4089
0
        return false;
4090
0
    }
4091
4092
    // Remove the LegacyScriptPubKeyMan from memory
4093
0
    m_spk_managers.erase(legacy_spkm->GetID());
4094
0
    m_external_spk_managers.clear();
4095
0
    m_internal_spk_managers.clear();
4096
4097
    // Setup new descriptors
4098
0
    SetWalletFlag(WALLET_FLAG_DESCRIPTORS);
4099
0
    if (!IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
4100
        // Use the existing master key if we have it
4101
0
        if (data.master_key.key.IsValid()) {
4102
0
            SetupDescriptorScriptPubKeyMans(data.master_key);
4103
0
        } else {
4104
            // Setup with a new seed if we don't.
4105
0
            SetupDescriptorScriptPubKeyMans();
4106
0
        }
4107
0
    }
4108
4109
    // Get best block locator so that we can copy it to the watchonly and solvables
4110
0
    CBlockLocator best_block_locator;
4111
0
    if (!WalletBatch(GetDatabase()).ReadBestBlock(best_block_locator)) {
4112
0
        error = _("Error: Unable to read wallet's best block locator record");
4113
0
        return false;
4114
0
    }
4115
4116
    // Check if the transactions in the wallet are still ours. Either they belong here, or they belong in the watchonly wallet.
4117
    // We need to go through these in the tx insertion order so that lookups to spends works.
4118
0
    std::vector<uint256> txids_to_delete;
4119
0
    std::unique_ptr<WalletBatch> watchonly_batch;
4120
0
    if (data.watchonly_wallet) {
4121
0
        watchonly_batch = std::make_unique<WalletBatch>(data.watchonly_wallet->GetDatabase());
4122
        // Copy the next tx order pos to the watchonly wallet
4123
0
        LOCK(data.watchonly_wallet->cs_wallet);
4124
0
        data.watchonly_wallet->nOrderPosNext = nOrderPosNext;
4125
0
        watchonly_batch->WriteOrderPosNext(data.watchonly_wallet->nOrderPosNext);
4126
        // Write the best block locator to avoid rescanning on reload
4127
0
        if (!watchonly_batch->WriteBestBlock(best_block_locator)) {
4128
0
            error = _("Error: Unable to write watchonly wallet best block locator record");
4129
0
            return false;
4130
0
        }
4131
0
    }
4132
0
    if (data.solvable_wallet) {
4133
        // Write the best block locator to avoid rescanning on reload
4134
0
        if (!WalletBatch(data.solvable_wallet->GetDatabase()).WriteBestBlock(best_block_locator)) {
4135
0
            error = _("Error: Unable to write solvable wallet best block locator record");
4136
0
            return false;
4137
0
        }
4138
0
    }
4139
0
    for (const auto& [_pos, wtx] : wtxOrdered) {
4140
        // Check it is the watchonly wallet's
4141
        // solvable_wallet doesn't need to be checked because transactions for those scripts weren't being watched for
4142
0
        bool is_mine = IsMine(*wtx->tx) || IsFromMe(*wtx->tx);
4143
0
        if (data.watchonly_wallet) {
4144
0
            LOCK(data.watchonly_wallet->cs_wallet);
4145
0
            if (data.watchonly_wallet->IsMine(*wtx->tx) || data.watchonly_wallet->IsFromMe(*wtx->tx)) {
4146
                // Add to watchonly wallet
4147
0
                const uint256& hash = wtx->GetHash();
4148
0
                const CWalletTx& to_copy_wtx = *wtx;
4149
0
                if (!data.watchonly_wallet->LoadToWallet(hash, [&](CWalletTx& ins_wtx, bool new_tx) EXCLUSIVE_LOCKS_REQUIRED(data.watchonly_wallet->cs_wallet) {
4150
0
                    if (!new_tx) return false;
4151
0
                    ins_wtx.SetTx(to_copy_wtx.tx);
4152
0
                    ins_wtx.CopyFrom(to_copy_wtx);
4153
0
                    return true;
4154
0
                })) {
4155
0
                    error = strprintf(_("Error: Could not add watchonly tx %s to watchonly wallet"), wtx->GetHash().GetHex());
4156
0
                    return false;
4157
0
                }
4158
0
                watchonly_batch->WriteTx(data.watchonly_wallet->mapWallet.at(hash));
4159
                // Mark as to remove from the migrated wallet only if it does not also belong to it
4160
0
                if (!is_mine) {
4161
0
                    txids_to_delete.push_back(hash);
4162
0
                }
4163
0
                continue;
4164
0
            }
4165
0
        }
4166
0
        if (!is_mine) {
4167
            // Both not ours and not in the watchonly wallet
4168
0
            error = strprintf(_("Error: Transaction %s in wallet cannot be identified to belong to migrated wallets"), wtx->GetHash().GetHex());
4169
0
            return false;
4170
0
        }
4171
0
    }
4172
0
    watchonly_batch.reset(); // Flush
4173
    // Do the removes
4174
0
    if (txids_to_delete.size() > 0) {
4175
0
        if (auto res = RemoveTxs(txids_to_delete); !res) {
4176
0
            error = _("Error: Could not delete watchonly transactions. ") + util::ErrorString(res);
4177
0
            return false;
4178
0
        }
4179
0
    }
4180
4181
    // Pair external wallets with their corresponding db handler
4182
0
    std::vector<std::pair<std::shared_ptr<CWallet>, std::unique_ptr<WalletBatch>>> wallets_vec;
4183
0
    for (const auto& ext_wallet : {data.watchonly_wallet, data.solvable_wallet}) {
4184
0
        if (!ext_wallet) continue;
4185
4186
0
        std::unique_ptr<WalletBatch> batch = std::make_unique<WalletBatch>(ext_wallet->GetDatabase());
4187
0
        if (!batch->TxnBegin()) {
4188
0
            error = strprintf(_("Error: database transaction cannot be executed for wallet %s"), ext_wallet->GetName());
4189
0
            return false;
4190
0
        }
4191
0
        wallets_vec.emplace_back(ext_wallet, std::move(batch));
4192
0
    }
4193
4194
    // Write address book entry to disk
4195
0
    auto func_store_addr = [](WalletBatch& batch, const CTxDestination& dest, const CAddressBookData& entry) {
4196
0
        auto address{EncodeDestination(dest)};
4197
0
        if (entry.purpose) batch.WritePurpose(address, PurposeToString(*entry.purpose));
4198
0
        if (entry.label) batch.WriteName(address, *entry.label);
4199
0
        for (const auto& [id, request] : entry.receive_requests) {
4200
0
            batch.WriteAddressReceiveRequest(dest, id, request);
4201
0
        }
4202
0
        if (entry.previously_spent) batch.WriteAddressPreviouslySpent(dest, true);
4203
0
    };
4204
4205
    // Check the address book data in the same way we did for transactions
4206
0
    std::vector<CTxDestination> dests_to_delete;
4207
0
    for (const auto& [dest, record] : m_address_book) {
4208
        // Ensure "receive" entries that are no longer part of the original wallet are transferred to another wallet
4209
        // Entries for everything else ("send") will be cloned to all wallets.
4210
0
        bool require_transfer = record.purpose == AddressPurpose::RECEIVE && !IsMine(dest);
4211
0
        bool copied = false;
4212
0
        for (auto& [wallet, batch] : wallets_vec) {
4213
0
            LOCK(wallet->cs_wallet);
4214
0
            if (require_transfer && !wallet->IsMine(dest)) continue;
4215
4216
            // Copy the entire address book entry
4217
0
            wallet->m_address_book[dest] = record;
4218
0
            func_store_addr(*batch, dest, record);
4219
4220
0
            copied = true;
4221
            // Only delete 'receive' records that are no longer part of the original wallet
4222
0
            if (require_transfer) {
4223
0
                dests_to_delete.push_back(dest);
4224
0
                break;
4225
0
            }
4226
0
        }
4227
4228
        // Fail immediately if we ever found an entry that was ours and cannot be transferred
4229
        // to any of the created wallets (watch-only, solvable).
4230
        // Means that no inferred descriptor maps to the stored entry. Which mustn't happen.
4231
0
        if (require_transfer && !copied) {
4232
4233
            // Skip invalid/non-watched scripts that will not be migrated
4234
0
            if (not_migrated_dests.count(dest) > 0) {
4235
0
                dests_to_delete.push_back(dest);
4236
0
                continue;
4237
0
            }
4238
4239
0
            error = _("Error: Address book data in wallet cannot be identified to belong to migrated wallets");
4240
0
            return false;
4241
0
        }
4242
0
    }
4243
4244
    // Persist external wallets address book entries
4245
0
    for (auto& [wallet, batch] : wallets_vec) {
4246
0
        if (!batch->TxnCommit()) {
4247
0
            error = strprintf(_("Error: address book copy failed for wallet %s"), wallet->GetName());
4248
0
            return false;
4249
0
        }
4250
0
    }
4251
4252
    // Remove the things to delete in this wallet
4253
0
    WalletBatch local_wallet_batch(GetDatabase());
4254
0
    local_wallet_batch.TxnBegin();
4255
0
    if (dests_to_delete.size() > 0) {
4256
0
        for (const auto& dest : dests_to_delete) {
4257
0
            if (!DelAddressBookWithDB(local_wallet_batch, dest)) {
4258
0
                error = _("Error: Unable to remove watchonly address book data");
4259
0
                return false;
4260
0
            }
4261
0
        }
4262
0
    }
4263
0
    local_wallet_batch.TxnCommit();
4264
4265
    // Connect the SPKM signals
4266
0
    ConnectScriptPubKeyManNotifiers();
4267
0
    NotifyCanGetAddressesChanged();
4268
4269
0
    WalletLogPrintf("Wallet migration complete.\n");
4270
4271
0
    return true;
4272
0
}
4273
4274
bool CWallet::CanGrindR() const
4275
0
{
4276
0
    return !IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER);
4277
0
}
4278
4279
bool DoMigration(CWallet& wallet, WalletContext& context, bilingual_str& error, MigrationResult& res) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet)
4280
0
{
4281
0
    AssertLockHeld(wallet.cs_wallet);
4282
4283
    // Get all of the descriptors from the legacy wallet
4284
0
    std::optional<MigrationData> data = wallet.GetDescriptorsForLegacy(error);
4285
0
    if (data == std::nullopt) return false;
4286
4287
    // Create the watchonly and solvable wallets if necessary
4288
0
    if (data->watch_descs.size() > 0 || data->solvable_descs.size() > 0) {
4289
0
        DatabaseOptions options;
4290
0
        options.require_existing = false;
4291
0
        options.require_create = true;
4292
0
        options.require_format = DatabaseFormat::SQLITE;
4293
4294
0
        WalletContext empty_context;
4295
0
        empty_context.args = context.args;
4296
4297
        // Make the wallets
4298
0
        options.create_flags = WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET | WALLET_FLAG_DESCRIPTORS;
4299
0
        if (wallet.IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
4300
0
            options.create_flags |= WALLET_FLAG_AVOID_REUSE;
4301
0
        }
4302
0
        if (wallet.IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
4303
0
            options.create_flags |= WALLET_FLAG_KEY_ORIGIN_METADATA;
4304
0
        }
4305
0
        if (data->watch_descs.size() > 0) {
4306
0
            wallet.WalletLogPrintf("Making a new watchonly wallet containing the watched scripts\n");
4307
4308
0
            DatabaseStatus status;
4309
0
            std::vector<bilingual_str> warnings;
4310
0
            std::string wallet_name = wallet.GetName() + "_watchonly";
4311
0
            std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4312
0
            if (!database) {
4313
0
                error = strprintf(_("Wallet file creation failed: %s"), error);
4314
0
                return false;
4315
0
            }
4316
4317
0
            data->watchonly_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4318
0
            if (!data->watchonly_wallet) {
4319
0
                error = _("Error: Failed to create new watchonly wallet");
4320
0
                return false;
4321
0
            }
4322
0
            res.watchonly_wallet = data->watchonly_wallet;
4323
0
            LOCK(data->watchonly_wallet->cs_wallet);
4324
4325
            // Parse the descriptors and add them to the new wallet
4326
0
            for (const auto& [desc_str, creation_time] : data->watch_descs) {
4327
                // Parse the descriptor
4328
0
                FlatSigningProvider keys;
4329
0
                std::string parse_err;
4330
0
                std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4331
0
                assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4332
0
                assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
4333
4334
                // Add to the wallet
4335
0
                WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
4336
0
                data->watchonly_wallet->AddWalletDescriptor(w_desc, keys, "", false);
4337
0
            }
4338
4339
            // Add the wallet to settings
4340
0
            UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4341
0
        }
4342
0
        if (data->solvable_descs.size() > 0) {
4343
0
            wallet.WalletLogPrintf("Making a new watchonly wallet containing the unwatched solvable scripts\n");
4344
4345
0
            DatabaseStatus status;
4346
0
            std::vector<bilingual_str> warnings;
4347
0
            std::string wallet_name = wallet.GetName() + "_solvables";
4348
0
            std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4349
0
            if (!database) {
4350
0
                error = strprintf(_("Wallet file creation failed: %s"), error);
4351
0
                return false;
4352
0
            }
4353
4354
0
            data->solvable_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4355
0
            if (!data->solvable_wallet) {
4356
0
                error = _("Error: Failed to create new watchonly wallet");
4357
0
                return false;
4358
0
            }
4359
0
            res.solvables_wallet = data->solvable_wallet;
4360
0
            LOCK(data->solvable_wallet->cs_wallet);
4361
4362
            // Parse the descriptors and add them to the new wallet
4363
0
            for (const auto& [desc_str, creation_time] : data->solvable_descs) {
4364
                // Parse the descriptor
4365
0
                FlatSigningProvider keys;
4366
0
                std::string parse_err;
4367
0
                std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4368
0
                assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4369
0
                assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
4370
4371
                // Add to the wallet
4372
0
                WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
4373
0
                data->solvable_wallet->AddWalletDescriptor(w_desc, keys, "", false);
4374
0
            }
4375
4376
            // Add the wallet to settings
4377
0
            UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4378
0
        }
4379
0
    }
4380
4381
    // Add the descriptors to wallet, remove LegacyScriptPubKeyMan, and cleanup txs and address book data
4382
0
    if (!wallet.ApplyMigrationData(*data, error)) {
4383
0
        return false;
4384
0
    }
4385
0
    return true;
4386
0
}
4387
4388
util::Result<MigrationResult> MigrateLegacyToDescriptor(const std::string& wallet_name, const SecureString& passphrase, WalletContext& context)
4389
0
{
4390
0
    MigrationResult res;
4391
0
    bilingual_str error;
4392
0
    std::vector<bilingual_str> warnings;
4393
4394
    // If the wallet is still loaded, unload it so that nothing else tries to use it while we're changing it
4395
0
    bool was_loaded = false;
4396
0
    if (auto wallet = GetWallet(context, wallet_name)) {
4397
0
        if (wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4398
0
            return util::Error{_("Error: This wallet is already a descriptor wallet")};
4399
0
        }
4400
4401
        // Flush chain state before unloading wallet
4402
0
        CBlockLocator locator;
4403
0
        WITH_LOCK(wallet->cs_wallet, context.chain->findBlock(wallet->GetLastBlockHash(), FoundBlock().locator(locator)));
4404
0
        if (!locator.IsNull()) wallet->chainStateFlushed(ChainstateRole::NORMAL, locator);
4405
4406
0
        if (!RemoveWallet(context, wallet, /*load_on_start=*/std::nullopt, warnings)) {
4407
0
            return util::Error{_("Unable to unload the wallet before migrating")};
4408
0
        }
4409
0
        WaitForDeleteWallet(std::move(wallet));
4410
0
        was_loaded = true;
4411
0
    } else {
4412
        // Check if the wallet is BDB
4413
0
        const auto& wallet_path = GetWalletPath(wallet_name);
4414
0
        if (!wallet_path) {
4415
0
            return util::Error{util::ErrorString(wallet_path)};
4416
0
        }
4417
0
        if (!IsBDBFile(BDBDataFile(*wallet_path))) {
4418
0
            return util::Error{_("Error: This wallet is already a descriptor wallet")};
4419
0
        }
4420
0
    }
4421
4422
    // Load the wallet but only in the context of this function.
4423
    // No signals should be connected nor should anything else be aware of this wallet
4424
0
    WalletContext empty_context;
4425
0
    empty_context.args = context.args;
4426
0
    DatabaseOptions options;
4427
0
    options.require_existing = true;
4428
0
    options.require_format = DatabaseFormat::BERKELEY_RO;
4429
0
    DatabaseStatus status;
4430
0
    std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4431
0
    if (!database) {
4432
0
        return util::Error{Untranslated("Wallet file verification failed.") + Untranslated(" ") + error};
4433
0
    }
4434
4435
    // Make the local wallet
4436
0
    std::shared_ptr<CWallet> local_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4437
0
    if (!local_wallet) {
4438
0
        return util::Error{Untranslated("Wallet loading failed.") + Untranslated(" ") + error};
4439
0
    }
4440
4441
    // Helper to reload as normal for some of our exit scenarios
4442
0
    const auto& reload_wallet = [&](std::shared_ptr<CWallet>& to_reload) {
4443
        // Reset options.require_format as wallets of any format may be reloaded.
4444
0
        options.require_format = std::nullopt;
4445
0
        assert(to_reload.use_count() == 1);
4446
0
        std::string name = to_reload->GetName();
4447
0
        to_reload.reset();
4448
0
        to_reload = LoadWallet(context, name, /*load_on_start=*/std::nullopt, options, status, error, warnings);
4449
0
        return to_reload != nullptr;
4450
0
    };
4451
4452
    // Before anything else, check if there is something to migrate.
4453
0
    if (local_wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4454
0
        if (was_loaded) {
4455
0
            reload_wallet(local_wallet);
4456
0
        }
4457
0
        return util::Error{_("Error: This wallet is already a descriptor wallet")};
4458
0
    }
4459
4460
    // Make a backup of the DB
4461
0
    fs::path this_wallet_dir = fs::absolute(fs::PathFromString(local_wallet->GetDatabase().Filename())).parent_path();
4462
0
    fs::path backup_filename = fs::PathFromString(strprintf("%s_%d.legacy.bak", (wallet_name.empty() ? "default_wallet" : wallet_name), GetTime()));
4463
0
    fs::path backup_path = this_wallet_dir / backup_filename;
4464
0
    if (!local_wallet->BackupWallet(fs::PathToString(backup_path))) {
4465
0
        if (was_loaded) {
4466
0
            reload_wallet(local_wallet);
4467
0
        }
4468
0
        return util::Error{_("Error: Unable to make a backup of your wallet")};
4469
0
    }
4470
0
    res.backup_path = backup_path;
4471
4472
0
    bool success = false;
4473
4474
    // Unlock the wallet if needed
4475
0
    if (local_wallet->IsLocked() && !local_wallet->Unlock(passphrase)) {
4476
0
        if (was_loaded) {
4477
0
            reload_wallet(local_wallet);
4478
0
        }
4479
0
        if (passphrase.find('\0') == std::string::npos) {
4480
0
            return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase was not provided or was incorrect.")};
4481
0
        } else {
4482
0
            return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase entered was incorrect. "
4483
0
                                            "The passphrase contains a null character (ie - a zero byte). "
4484
0
                                            "If this passphrase was set with a version of this software prior to 25.0, "
4485
0
                                            "please try again with only the characters up to — but not including — "
4486
0
                                            "the first null character.")};
4487
0
        }
4488
0
    }
4489
4490
0
    {
4491
0
        LOCK(local_wallet->cs_wallet);
4492
        // First change to using SQLite
4493
0
        if (!local_wallet->MigrateToSQLite(error)) return util::Error{error};
4494
4495
        // Do the migration of keys and scripts for non-blank wallets, and cleanup if it fails
4496
0
        success = local_wallet->IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET);
4497
0
        if (!success) {
4498
0
            success = DoMigration(*local_wallet, context, error, res);
4499
0
        } else {
4500
            // Make sure that descriptors flag is actually set
4501
0
            local_wallet->SetWalletFlag(WALLET_FLAG_DESCRIPTORS);
4502
0
        }
4503
0
    }
4504
4505
    // In case of reloading failure, we need to remember the wallet dirs to remove
4506
    // Set is used as it may be populated with the same wallet directory paths multiple times,
4507
    // both before and after reloading. This ensures the set is complete even if one of the wallets
4508
    // fails to reload.
4509
0
    std::set<fs::path> wallet_dirs;
4510
0
    if (success) {
4511
        // Migration successful, unload all wallets locally, then reload them.
4512
        // Reload the main wallet
4513
0
        wallet_dirs.insert(fs::PathFromString(local_wallet->GetDatabase().Filename()).parent_path());
4514
0
        success = reload_wallet(local_wallet);
4515
0
        res.wallet = local_wallet;
4516
0
        res.wallet_name = wallet_name;
4517
0
        if (success && res.watchonly_wallet) {
4518
            // Reload watchonly
4519
0
            wallet_dirs.insert(fs::PathFromString(res.watchonly_wallet->GetDatabase().Filename()).parent_path());
4520
0
            success = reload_wallet(res.watchonly_wallet);
4521
0
        }
4522
0
        if (success && res.solvables_wallet) {
4523
            // Reload solvables
4524
0
            wallet_dirs.insert(fs::PathFromString(res.solvables_wallet->GetDatabase().Filename()).parent_path());
4525
0
            success = reload_wallet(res.solvables_wallet);
4526
0
        }
4527
0
    }
4528
0
    if (!success) {
4529
        // Migration failed, cleanup
4530
        // Copy the backup to the actual wallet dir
4531
0
        fs::path temp_backup_location = fsbridge::AbsPathJoin(GetWalletDir(), backup_filename);
4532
0
        fs::copy_file(backup_path, temp_backup_location, fs::copy_options::none);
4533
4534
        // Make list of wallets to cleanup
4535
0
        std::vector<std::shared_ptr<CWallet>> created_wallets;
4536
0
        if (local_wallet) created_wallets.push_back(std::move(local_wallet));
4537
0
        if (res.watchonly_wallet) created_wallets.push_back(std::move(res.watchonly_wallet));
4538
0
        if (res.solvables_wallet) created_wallets.push_back(std::move(res.solvables_wallet));
4539
4540
        // Get the directories to remove after unloading
4541
0
        for (std::shared_ptr<CWallet>& w : created_wallets) {
4542
0
            wallet_dirs.emplace(fs::PathFromString(w->GetDatabase().Filename()).parent_path());
4543
0
        }
4544
4545
        // Unload the wallets
4546
0
        for (std::shared_ptr<CWallet>& w : created_wallets) {
4547
0
            if (w->HaveChain()) {
4548
                // Unloading for wallets that were loaded for normal use
4549
0
                if (!RemoveWallet(context, w, /*load_on_start=*/false)) {
4550
0
                    error += _("\nUnable to cleanup failed migration");
4551
0
                    return util::Error{error};
4552
0
                }
4553
0
                WaitForDeleteWallet(std::move(w));
4554
0
            } else {
4555
                // Unloading for wallets in local context
4556
0
                assert(w.use_count() == 1);
4557
0
                w.reset();
4558
0
            }
4559
0
        }
4560
4561
        // Delete the wallet directories
4562
0
        for (const fs::path& dir : wallet_dirs) {
4563
0
            fs::remove_all(dir);
4564
0
        }
4565
4566
        // Restore the backup
4567
0
        DatabaseStatus status;
4568
0
        std::vector<bilingual_str> warnings;
4569
0
        if (!RestoreWallet(context, temp_backup_location, wallet_name, /*load_on_start=*/std::nullopt, status, error, warnings)) {
4570
0
            error += _("\nUnable to restore backup of wallet.");
4571
0
            return util::Error{error};
4572
0
        }
4573
4574
        // Move the backup to the wallet dir
4575
0
        fs::copy_file(temp_backup_location, backup_path, fs::copy_options::none);
4576
0
        fs::remove(temp_backup_location);
4577
4578
0
        return util::Error{error};
4579
0
    }
4580
0
    return res;
4581
0
}
4582
4583
void CWallet::CacheNewScriptPubKeys(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4584
0
{
4585
0
    for (const auto& script : spks) {
4586
0
        m_cached_spks[script].push_back(spkm);
4587
0
    }
4588
0
}
4589
4590
void CWallet::TopUpCallback(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4591
0
{
4592
    // Update scriptPubKey cache
4593
0
    CacheNewScriptPubKeys(spks, spkm);
4594
0
}
4595
4596
std::set<CExtPubKey> CWallet::GetActiveHDPubKeys() const
4597
0
{
4598
0
    AssertLockHeld(cs_wallet);
4599
4600
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4601
4602
0
    std::set<CExtPubKey> active_xpubs;
4603
0
    for (const auto& spkm : GetActiveScriptPubKeyMans()) {
4604
0
        const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4605
0
        assert(desc_spkm);
4606
0
        LOCK(desc_spkm->cs_desc_man);
4607
0
        WalletDescriptor w_desc = desc_spkm->GetWalletDescriptor();
4608
4609
0
        std::set<CPubKey> desc_pubkeys;
4610
0
        std::set<CExtPubKey> desc_xpubs;
4611
0
        w_desc.descriptor->GetPubKeys(desc_pubkeys, desc_xpubs);
4612
0
        active_xpubs.merge(std::move(desc_xpubs));
4613
0
    }
4614
0
    return active_xpubs;
4615
0
}
4616
4617
std::optional<CKey> CWallet::GetKey(const CKeyID& keyid) const
4618
0
{
4619
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4620
4621
0
    for (const auto& spkm : GetAllScriptPubKeyMans()) {
4622
0
        const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4623
0
        assert(desc_spkm);
4624
0
        LOCK(desc_spkm->cs_desc_man);
4625
0
        if (std::optional<CKey> key = desc_spkm->GetKey(keyid)) {
4626
0
            return key;
4627
0
        }
4628
0
    }
4629
0
    return std::nullopt;
4630
0
}
4631
} // namespace wallet