Coverage Report

Created: 2025-05-14 12:32

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/root/bitcoin/src/wallet/wallet.cpp
Line
Count
Source
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <wallet/wallet.h>
7
8
#include <bitcoin-build-config.h> // IWYU pragma: keep
9
#include <addresstype.h>
10
#include <blockfilter.h>
11
#include <chain.h>
12
#include <coins.h>
13
#include <common/args.h>
14
#include <common/messages.h>
15
#include <common/settings.h>
16
#include <common/signmessage.h>
17
#include <common/system.h>
18
#include <consensus/amount.h>
19
#include <consensus/consensus.h>
20
#include <consensus/validation.h>
21
#include <external_signer.h>
22
#include <interfaces/chain.h>
23
#include <interfaces/handler.h>
24
#include <interfaces/wallet.h>
25
#include <kernel/chain.h>
26
#include <kernel/mempool_removal_reason.h>
27
#include <key.h>
28
#include <key_io.h>
29
#include <logging.h>
30
#include <node/types.h>
31
#include <outputtype.h>
32
#include <policy/feerate.h>
33
#include <primitives/block.h>
34
#include <primitives/transaction.h>
35
#include <psbt.h>
36
#include <pubkey.h>
37
#include <random.h>
38
#include <script/descriptor.h>
39
#include <script/interpreter.h>
40
#include <script/script.h>
41
#include <script/sign.h>
42
#include <script/signingprovider.h>
43
#include <script/solver.h>
44
#include <serialize.h>
45
#include <span.h>
46
#include <streams.h>
47
#include <support/allocators/secure.h>
48
#include <support/allocators/zeroafterfree.h>
49
#include <support/cleanse.h>
50
#include <sync.h>
51
#include <tinyformat.h>
52
#include <uint256.h>
53
#include <univalue.h>
54
#include <util/check.h>
55
#include <util/fs.h>
56
#include <util/fs_helpers.h>
57
#include <util/moneystr.h>
58
#include <util/result.h>
59
#include <util/string.h>
60
#include <util/time.h>
61
#include <util/translation.h>
62
#include <wallet/coincontrol.h>
63
#include <wallet/context.h>
64
#include <wallet/crypter.h>
65
#include <wallet/db.h>
66
#include <wallet/external_signer_scriptpubkeyman.h>
67
#include <wallet/scriptpubkeyman.h>
68
#include <wallet/transaction.h>
69
#include <wallet/types.h>
70
#include <wallet/walletdb.h>
71
#include <wallet/walletutil.h>
72
73
#include <algorithm>
74
#include <cassert>
75
#include <condition_variable>
76
#include <exception>
77
#include <optional>
78
#include <stdexcept>
79
#include <thread>
80
#include <tuple>
81
#include <variant>
82
83
struct KeyOriginInfo;
84
85
using common::AmountErrMsg;
86
using common::AmountHighWarn;
87
using common::PSBTError;
88
using interfaces::FoundBlock;
89
using util::ReplaceAll;
90
using util::ToString;
91
92
namespace wallet {
93
94
bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
95
0
{
96
0
    const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
97
0
        if (!setting_value.isArray()) setting_value.setArray();
98
0
        for (const auto& value : setting_value.getValues()) {
99
0
            if (value.isStr() && value.get_str() == wallet_name) return interfaces::SettingsAction::SKIP_WRITE;
100
0
        }
101
0
        setting_value.push_back(wallet_name);
102
0
        return interfaces::SettingsAction::WRITE;
103
0
    };
104
0
    return chain.updateRwSetting("wallet", update_function);
105
0
}
106
107
bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
108
0
{
109
0
    const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
110
0
        if (!setting_value.isArray()) return interfaces::SettingsAction::SKIP_WRITE;
111
0
        common::SettingsValue new_value(common::SettingsValue::VARR);
112
0
        for (const auto& value : setting_value.getValues()) {
113
0
            if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value);
114
0
        }
115
0
        if (new_value.size() == setting_value.size()) return interfaces::SettingsAction::SKIP_WRITE;
116
0
        setting_value = std::move(new_value);
117
0
        return interfaces::SettingsAction::WRITE;
118
0
    };
119
0
    return chain.updateRwSetting("wallet", update_function);
120
0
}
121
122
static void UpdateWalletSetting(interfaces::Chain& chain,
123
                                const std::string& wallet_name,
124
                                std::optional<bool> load_on_startup,
125
                                std::vector<bilingual_str>& warnings)
126
0
{
127
0
    if (!load_on_startup) return;
128
0
    if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) {
129
0
        warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup."));
130
0
    } else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) {
131
0
        warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup."));
132
0
    }
133
0
}
134
135
/**
136
 * Refresh mempool status so the wallet is in an internally consistent state and
137
 * immediately knows the transaction's status: Whether it can be considered
138
 * trusted and is eligible to be abandoned ...
139
 */
140
static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain)
141
0
{
142
0
    if (chain.isInMempool(tx.GetHash())) {
143
0
        tx.m_state = TxStateInMempool();
144
0
    } else if (tx.state<TxStateInMempool>()) {
145
0
        tx.m_state = TxStateInactive();
146
0
    }
147
0
}
148
149
bool AddWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
150
0
{
151
0
    LOCK(context.wallets_mutex);
152
0
    assert(wallet);
153
0
    std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
154
0
    if (i != context.wallets.end()) return false;
155
0
    context.wallets.push_back(wallet);
156
0
    wallet->ConnectScriptPubKeyManNotifiers();
157
0
    wallet->NotifyCanGetAddressesChanged();
158
0
    return true;
159
0
}
160
161
bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings)
162
0
{
163
0
    assert(wallet);
164
165
0
    interfaces::Chain& chain = wallet->chain();
166
0
    std::string name = wallet->GetName();
167
168
    // Unregister with the validation interface which also drops shared pointers.
169
0
    wallet->m_chain_notifications_handler.reset();
170
0
    {
171
0
        LOCK(context.wallets_mutex);
172
0
        std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
173
0
        if (i == context.wallets.end()) return false;
174
0
        context.wallets.erase(i);
175
0
    }
176
    // Notify unload so that upper layers release the shared pointer.
177
0
    wallet->NotifyUnload();
178
179
    // Write the wallet setting
180
0
    UpdateWalletSetting(chain, name, load_on_start, warnings);
181
182
0
    return true;
183
0
}
184
185
bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start)
186
0
{
187
0
    std::vector<bilingual_str> warnings;
188
0
    return RemoveWallet(context, wallet, load_on_start, warnings);
189
0
}
190
191
std::vector<std::shared_ptr<CWallet>> GetWallets(WalletContext& context)
192
0
{
193
0
    LOCK(context.wallets_mutex);
194
0
    return context.wallets;
195
0
}
196
197
std::shared_ptr<CWallet> GetDefaultWallet(WalletContext& context, size_t& count)
198
0
{
199
0
    LOCK(context.wallets_mutex);
200
0
    count = context.wallets.size();
201
0
    return count == 1 ? context.wallets[0] : nullptr;
202
0
}
203
204
std::shared_ptr<CWallet> GetWallet(WalletContext& context, const std::string& name)
205
0
{
206
0
    LOCK(context.wallets_mutex);
207
0
    for (const std::shared_ptr<CWallet>& wallet : context.wallets) {
208
0
        if (wallet->GetName() == name) return wallet;
209
0
    }
210
0
    return nullptr;
211
0
}
212
213
std::unique_ptr<interfaces::Handler> HandleLoadWallet(WalletContext& context, LoadWalletFn load_wallet)
214
0
{
215
0
    LOCK(context.wallets_mutex);
216
0
    auto it = context.wallet_load_fns.emplace(context.wallet_load_fns.end(), std::move(load_wallet));
217
0
    return interfaces::MakeCleanupHandler([&context, it] { LOCK(context.wallets_mutex); context.wallet_load_fns.erase(it); });
218
0
}
219
220
void NotifyWalletLoaded(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
221
0
{
222
0
    LOCK(context.wallets_mutex);
223
0
    for (auto& load_wallet : context.wallet_load_fns) {
224
0
        load_wallet(interfaces::MakeWallet(context, wallet));
225
0
    }
226
0
}
227
228
static GlobalMutex g_loading_wallet_mutex;
229
static GlobalMutex g_wallet_release_mutex;
230
static std::condition_variable g_wallet_release_cv;
231
static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex);
232
static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex);
233
234
// Custom deleter for shared_ptr<CWallet>.
235
static void FlushAndDeleteWallet(CWallet* wallet)
236
0
{
237
0
    const std::string name = wallet->GetName();
238
0
    wallet->WalletLogPrintf("Releasing wallet %s..\n", name);
239
0
    delete wallet;
240
    // Wallet is now released, notify WaitForDeleteWallet, if any.
241
0
    {
242
0
        LOCK(g_wallet_release_mutex);
243
0
        if (g_unloading_wallet_set.erase(name) == 0) {
244
            // WaitForDeleteWallet was not called for this wallet, all done.
245
0
            return;
246
0
        }
247
0
    }
248
0
    g_wallet_release_cv.notify_all();
249
0
}
250
251
void WaitForDeleteWallet(std::shared_ptr<CWallet>&& wallet)
252
0
{
253
    // Mark wallet for unloading.
254
0
    const std::string name = wallet->GetName();
255
0
    {
256
0
        LOCK(g_wallet_release_mutex);
257
0
        g_unloading_wallet_set.insert(name);
258
        // Do not expect to be the only one removing this wallet.
259
        // Multiple threads could simultaneously be waiting for deletion.
260
0
    }
261
262
    // Time to ditch our shared_ptr and wait for FlushAndDeleteWallet call.
263
0
    wallet.reset();
264
0
    {
265
0
        WAIT_LOCK(g_wallet_release_mutex, lock);
266
0
        while (g_unloading_wallet_set.count(name) == 1) {
267
0
            g_wallet_release_cv.wait(lock);
268
0
        }
269
0
    }
270
0
}
271
272
namespace {
273
std::shared_ptr<CWallet> LoadWalletInternal(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
274
0
{
275
0
    try {
276
0
        std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
277
0
        if (!database) {
278
0
            error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
279
0
            return nullptr;
280
0
        }
281
282
0
        context.chain->initMessage(_("Loading wallet…"));
283
0
        std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), options.create_flags, error, warnings);
284
0
        if (!wallet) {
285
0
            error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error;
286
0
            status = DatabaseStatus::FAILED_LOAD;
287
0
            return nullptr;
288
0
        }
289
290
        // Legacy wallets are being deprecated, warn if the loaded wallet is legacy
291
0
        if (!wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
292
0
            warnings.emplace_back(_("Wallet loaded successfully. The legacy wallet type is being deprecated and support for creating and opening legacy wallets will be removed in the future. Legacy wallets can be migrated to a descriptor wallet with migratewallet."));
293
0
        }
294
295
0
        NotifyWalletLoaded(context, wallet);
296
0
        AddWallet(context, wallet);
297
0
        wallet->postInitProcess();
298
299
        // Write the wallet setting
300
0
        UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
301
302
0
        return wallet;
303
0
    } catch (const std::runtime_error& e) {
304
0
        error = Untranslated(e.what());
305
0
        status = DatabaseStatus::FAILED_LOAD;
306
0
        return nullptr;
307
0
    }
308
0
}
309
310
class FastWalletRescanFilter
311
{
312
public:
313
0
    FastWalletRescanFilter(const CWallet& wallet) : m_wallet(wallet)
314
0
    {
315
        // create initial filter with scripts from all ScriptPubKeyMans
316
0
        for (auto spkm : m_wallet.GetAllScriptPubKeyMans()) {
317
0
            auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(spkm)};
318
0
            assert(desc_spkm != nullptr);
319
0
            AddScriptPubKeys(desc_spkm);
320
            // save each range descriptor's end for possible future filter updates
321
0
            if (desc_spkm->IsHDEnabled()) {
322
0
                m_last_range_ends.emplace(desc_spkm->GetID(), desc_spkm->GetEndRange());
323
0
            }
324
0
        }
325
0
    }
326
327
    void UpdateIfNeeded()
328
0
    {
329
        // repopulate filter with new scripts if top-up has happened since last iteration
330
0
        for (const auto& [desc_spkm_id, last_range_end] : m_last_range_ends) {
331
0
            auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(m_wallet.GetScriptPubKeyMan(desc_spkm_id))};
332
0
            assert(desc_spkm != nullptr);
333
0
            int32_t current_range_end{desc_spkm->GetEndRange()};
334
0
            if (current_range_end > last_range_end) {
335
0
                AddScriptPubKeys(desc_spkm, last_range_end);
336
0
                m_last_range_ends.at(desc_spkm->GetID()) = current_range_end;
337
0
            }
338
0
        }
339
0
    }
340
341
    std::optional<bool> MatchesBlock(const uint256& block_hash) const
342
0
    {
343
0
        return m_wallet.chain().blockFilterMatchesAny(BlockFilterType::BASIC, block_hash, m_filter_set);
344
0
    }
345
346
private:
347
    const CWallet& m_wallet;
348
    /** Map for keeping track of each range descriptor's last seen end range.
349
      * This information is used to detect whether new addresses were derived
350
      * (that is, if the current end range is larger than the saved end range)
351
      * after processing a block and hence a filter set update is needed to
352
      * take possible keypool top-ups into account.
353
      */
354
    std::map<uint256, int32_t> m_last_range_ends;
355
    GCSFilter::ElementSet m_filter_set;
356
357
    void AddScriptPubKeys(const DescriptorScriptPubKeyMan* desc_spkm, int32_t last_range_end = 0)
358
0
    {
359
0
        for (const auto& script_pub_key : desc_spkm->GetScriptPubKeys(last_range_end)) {
360
0
            m_filter_set.emplace(script_pub_key.begin(), script_pub_key.end());
361
0
        }
362
0
    }
363
};
364
} // namespace
365
366
std::shared_ptr<CWallet> LoadWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
367
0
{
368
0
    auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name));
369
0
    if (!result.second) {
370
0
        error = Untranslated("Wallet already loading.");
371
0
        status = DatabaseStatus::FAILED_LOAD;
372
0
        return nullptr;
373
0
    }
374
0
    auto wallet = LoadWalletInternal(context, name, load_on_start, options, status, error, warnings);
375
0
    WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first));
376
0
    return wallet;
377
0
}
378
379
std::shared_ptr<CWallet> CreateWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
380
0
{
381
0
    uint64_t wallet_creation_flags = options.create_flags;
382
0
    const SecureString& passphrase = options.create_passphrase;
383
384
0
    if (wallet_creation_flags & WALLET_FLAG_DESCRIPTORS) options.require_format = DatabaseFormat::SQLITE;
385
0
    else {
386
0
        error = Untranslated("Legacy wallets can no longer be created");
387
0
        status = DatabaseStatus::FAILED_CREATE;
388
0
        return nullptr;
389
0
    }
390
391
    // Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted
392
0
    bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET);
393
394
    // Born encrypted wallets need to be created blank first.
395
0
    if (!passphrase.empty()) {
396
0
        wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET;
397
0
    }
398
399
    // Private keys must be disabled for an external signer wallet
400
0
    if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
401
0
        error = Untranslated("Private keys must be disabled when using an external signer");
402
0
        status = DatabaseStatus::FAILED_CREATE;
403
0
        return nullptr;
404
0
    }
405
406
    // Descriptor support must be enabled for an external signer wallet
407
0
    if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS)) {
408
0
        error = Untranslated("Descriptor support must be enabled when using an external signer");
409
0
        status = DatabaseStatus::FAILED_CREATE;
410
0
        return nullptr;
411
0
    }
412
413
    // Do not allow a passphrase when private keys are disabled
414
0
    if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
415
0
        error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled.");
416
0
        status = DatabaseStatus::FAILED_CREATE;
417
0
        return nullptr;
418
0
    }
419
420
    // Wallet::Verify will check if we're trying to create a wallet with a duplicate name.
421
0
    std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
422
0
    if (!database) {
423
0
        error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
424
0
        status = DatabaseStatus::FAILED_VERIFY;
425
0
        return nullptr;
426
0
    }
427
428
    // Make the wallet
429
0
    context.chain->initMessage(_("Loading wallet…"));
430
0
    std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), wallet_creation_flags, error, warnings);
431
0
    if (!wallet) {
432
0
        error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error;
433
0
        status = DatabaseStatus::FAILED_CREATE;
434
0
        return nullptr;
435
0
    }
436
437
    // Encrypt the wallet
438
0
    if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
439
0
        if (!wallet->EncryptWallet(passphrase)) {
440
0
            error = Untranslated("Error: Wallet created but failed to encrypt.");
441
0
            status = DatabaseStatus::FAILED_ENCRYPT;
442
0
            return nullptr;
443
0
        }
444
0
        if (!create_blank) {
445
            // Unlock the wallet
446
0
            if (!wallet->Unlock(passphrase)) {
447
0
                error = Untranslated("Error: Wallet was encrypted but could not be unlocked");
448
0
                status = DatabaseStatus::FAILED_ENCRYPT;
449
0
                return nullptr;
450
0
            }
451
452
            // Set a seed for the wallet
453
0
            {
454
0
                LOCK(wallet->cs_wallet);
455
0
                if (wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
456
0
                    wallet->SetupDescriptorScriptPubKeyMans();
457
0
                } else {
458
0
                    for (auto spk_man : wallet->GetActiveScriptPubKeyMans()) {
459
0
                        if (!spk_man->SetupGeneration()) {
460
0
                            error = Untranslated("Unable to generate initial keys");
461
0
                            status = DatabaseStatus::FAILED_CREATE;
462
0
                            return nullptr;
463
0
                        }
464
0
                    }
465
0
                }
466
0
            }
467
468
            // Relock the wallet
469
0
            wallet->Lock();
470
0
        }
471
0
    }
472
473
0
    NotifyWalletLoaded(context, wallet);
474
0
    AddWallet(context, wallet);
475
0
    wallet->postInitProcess();
476
477
    // Write the wallet settings
478
0
    UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
479
480
    // Legacy wallets are being deprecated, warn if a newly created wallet is legacy
481
0
    if (!(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS)) {
482
0
        warnings.emplace_back(_("Wallet created successfully. The legacy wallet type is being deprecated and support for creating and opening legacy wallets will be removed in the future."));
483
0
    }
484
485
0
    status = DatabaseStatus::SUCCESS;
486
0
    return wallet;
487
0
}
488
489
// Re-creates wallet from the backup file by renaming and moving it into the wallet's directory.
490
// If 'load_after_restore=true', the wallet object will be fully initialized and appended to the context.
491
std::shared_ptr<CWallet> RestoreWallet(WalletContext& context, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings, bool load_after_restore)
492
0
{
493
0
    DatabaseOptions options;
494
0
    ReadDatabaseArgs(*context.args, options);
495
0
    options.require_existing = true;
496
497
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name));
498
0
    auto wallet_file = wallet_path / "wallet.dat";
499
0
    std::shared_ptr<CWallet> wallet;
500
501
0
    try {
502
0
        if (!fs::exists(backup_file)) {
503
0
            error = Untranslated("Backup file does not exist");
504
0
            status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE;
505
0
            return nullptr;
506
0
        }
507
508
0
        if (fs::exists(wallet_path) || !TryCreateDirectories(wallet_path)) {
509
0
            error = Untranslated(strprintf("Failed to create database path '%s'. Database already exists.", fs::PathToString(wallet_path)));
510
0
            status = DatabaseStatus::FAILED_ALREADY_EXISTS;
511
0
            return nullptr;
512
0
        }
513
514
0
        fs::copy_file(backup_file, wallet_file, fs::copy_options::none);
515
516
0
        if (load_after_restore) {
517
0
            wallet = LoadWallet(context, wallet_name, load_on_start, options, status, error, warnings);
518
0
        }
519
0
    } catch (const std::exception& e) {
520
0
        assert(!wallet);
521
0
        if (!error.empty()) error += Untranslated("\n");
522
0
        error += Untranslated(strprintf("Unexpected exception: %s", e.what()));
523
0
    }
524
525
    // Remove created wallet path only when loading fails
526
0
    if (load_after_restore && !wallet) {
527
0
        fs::remove_all(wallet_path);
528
0
    }
529
530
0
    return wallet;
531
0
}
532
533
/** @defgroup mapWallet
534
 *
535
 * @{
536
 */
537
538
const CWalletTx* CWallet::GetWalletTx(const uint256& hash) const
539
0
{
540
0
    AssertLockHeld(cs_wallet);
541
0
    const auto it = mapWallet.find(hash);
542
0
    if (it == mapWallet.end())
543
0
        return nullptr;
544
0
    return &(it->second);
545
0
}
546
547
void CWallet::UpgradeDescriptorCache()
548
0
{
549
0
    if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) {
550
0
        return;
551
0
    }
552
553
0
    for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) {
554
0
        DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
555
0
        desc_spkm->UpgradeDescriptorCache();
556
0
    }
557
0
    SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
558
0
}
559
560
/* Given a wallet passphrase string and an unencrypted master key, determine the proper key
561
 * derivation parameters (should take at least 100ms) and encrypt the master key. */
562
static bool EncryptMasterKey(const SecureString& wallet_passphrase, const CKeyingMaterial& plain_master_key, CMasterKey& master_key)
563
0
{
564
0
    constexpr MillisecondsDouble target{100};
565
0
    auto start{SteadyClock::now()};
566
0
    CCrypter crypter;
567
568
0
    crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod);
569
0
    master_key.nDeriveIterations = static_cast<unsigned int>(master_key.nDeriveIterations * target / (SteadyClock::now() - start));
570
571
0
    start = SteadyClock::now();
572
0
    crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod);
573
0
    master_key.nDeriveIterations = (master_key.nDeriveIterations + static_cast<unsigned int>(master_key.nDeriveIterations * target / (SteadyClock::now() - start))) / 2;
574
575
0
    if (master_key.nDeriveIterations < CMasterKey::DEFAULT_DERIVE_ITERATIONS) {
576
0
        master_key.nDeriveIterations = CMasterKey::DEFAULT_DERIVE_ITERATIONS;
577
0
    }
578
579
0
    if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
580
0
        return false;
581
0
    }
582
0
    if (!crypter.Encrypt(plain_master_key, master_key.vchCryptedKey)) {
583
0
        return false;
584
0
    }
585
586
0
    return true;
587
0
}
588
589
static bool DecryptMasterKey(const SecureString& wallet_passphrase, const CMasterKey& master_key, CKeyingMaterial& plain_master_key)
590
0
{
591
0
    CCrypter crypter;
592
0
    if (!crypter.SetKeyFromPassphrase(wallet_passphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
593
0
        return false;
594
0
    }
595
0
    if (!crypter.Decrypt(master_key.vchCryptedKey, plain_master_key)) {
596
0
        return false;
597
0
    }
598
599
0
    return true;
600
0
}
601
602
bool CWallet::Unlock(const SecureString& strWalletPassphrase)
603
0
{
604
0
    CKeyingMaterial plain_master_key;
605
606
0
    {
607
0
        LOCK(cs_wallet);
608
0
        for (const auto& [_, master_key] : mapMasterKeys)
609
0
        {
610
0
            if (!DecryptMasterKey(strWalletPassphrase, master_key, plain_master_key)) {
611
0
                continue; // try another master key
612
0
            }
613
0
            if (Unlock(plain_master_key)) {
614
                // Now that we've unlocked, upgrade the descriptor cache
615
0
                UpgradeDescriptorCache();
616
0
                return true;
617
0
            }
618
0
        }
619
0
    }
620
0
    return false;
621
0
}
622
623
bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase)
624
0
{
625
0
    bool fWasLocked = IsLocked();
626
627
0
    {
628
0
        LOCK2(m_relock_mutex, cs_wallet);
629
0
        Lock();
630
631
0
        CKeyingMaterial plain_master_key;
632
0
        for (auto& [master_key_id, master_key] : mapMasterKeys)
633
0
        {
634
0
            if (!DecryptMasterKey(strOldWalletPassphrase, master_key, plain_master_key)) {
635
0
                return false;
636
0
            }
637
0
            if (Unlock(plain_master_key))
638
0
            {
639
0
                if (!EncryptMasterKey(strNewWalletPassphrase, plain_master_key, master_key)) {
640
0
                    return false;
641
0
                }
642
0
                WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", master_key.nDeriveIterations);
643
644
0
                WalletBatch(GetDatabase()).WriteMasterKey(master_key_id, master_key);
645
0
                if (fWasLocked)
646
0
                    Lock();
647
0
                return true;
648
0
            }
649
0
        }
650
0
    }
651
652
0
    return false;
653
0
}
654
655
void CWallet::chainStateFlushed(ChainstateRole role, const CBlockLocator& loc)
656
0
{
657
    // Don't update the best block until the chain is attached so that in case of a shutdown,
658
    // the rescan will be restarted at next startup.
659
0
    if (m_attaching_chain || role == ChainstateRole::BACKGROUND) {
660
0
        return;
661
0
    }
662
0
    WalletBatch batch(GetDatabase());
663
0
    batch.WriteBestBlock(loc);
664
0
}
665
666
void CWallet::SetMinVersion(enum WalletFeature nVersion, WalletBatch* batch_in)
667
0
{
668
0
    LOCK(cs_wallet);
669
0
    if (nWalletVersion >= nVersion)
670
0
        return;
671
0
    WalletLogPrintf("Setting minversion to %d\n", nVersion);
672
0
    nWalletVersion = nVersion;
673
674
0
    {
675
0
        WalletBatch* batch = batch_in ? batch_in : new WalletBatch(GetDatabase());
676
0
        if (nWalletVersion > 40000)
677
0
            batch->WriteMinVersion(nWalletVersion);
678
0
        if (!batch_in)
679
0
            delete batch;
680
0
    }
681
0
}
682
683
std::set<uint256> CWallet::GetConflicts(const uint256& txid) const
684
0
{
685
0
    std::set<uint256> result;
686
0
    AssertLockHeld(cs_wallet);
687
688
0
    const auto it = mapWallet.find(txid);
689
0
    if (it == mapWallet.end())
690
0
        return result;
691
0
    const CWalletTx& wtx = it->second;
692
693
0
    std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
694
695
0
    for (const CTxIn& txin : wtx.tx->vin)
696
0
    {
697
0
        if (mapTxSpends.count(txin.prevout) <= 1)
698
0
            continue;  // No conflict if zero or one spends
699
0
        range = mapTxSpends.equal_range(txin.prevout);
700
0
        for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it)
701
0
            result.insert(_it->second);
702
0
    }
703
0
    return result;
704
0
}
705
706
bool CWallet::HasWalletSpend(const CTransactionRef& tx) const
707
0
{
708
0
    AssertLockHeld(cs_wallet);
709
0
    const Txid& txid = tx->GetHash();
710
0
    for (unsigned int i = 0; i < tx->vout.size(); ++i) {
711
0
        if (IsSpent(COutPoint(txid, i))) {
712
0
            return true;
713
0
        }
714
0
    }
715
0
    return false;
716
0
}
717
718
void CWallet::Close()
719
0
{
720
0
    GetDatabase().Close();
721
0
}
722
723
void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range)
724
0
{
725
    // We want all the wallet transactions in range to have the same metadata as
726
    // the oldest (smallest nOrderPos).
727
    // So: find smallest nOrderPos:
728
729
0
    int nMinOrderPos = std::numeric_limits<int>::max();
730
0
    const CWalletTx* copyFrom = nullptr;
731
0
    for (TxSpends::iterator it = range.first; it != range.second; ++it) {
732
0
        const CWalletTx* wtx = &mapWallet.at(it->second);
733
0
        if (wtx->nOrderPos < nMinOrderPos) {
734
0
            nMinOrderPos = wtx->nOrderPos;
735
0
            copyFrom = wtx;
736
0
        }
737
0
    }
738
739
0
    if (!copyFrom) {
740
0
        return;
741
0
    }
742
743
    // Now copy data from copyFrom to rest:
744
0
    for (TxSpends::iterator it = range.first; it != range.second; ++it)
745
0
    {
746
0
        const uint256& hash = it->second;
747
0
        CWalletTx* copyTo = &mapWallet.at(hash);
748
0
        if (copyFrom == copyTo) continue;
749
0
        assert(copyFrom && "Oldest wallet transaction in range assumed to have been found.");
750
0
        if (!copyFrom->IsEquivalentTo(*copyTo)) continue;
751
0
        copyTo->mapValue = copyFrom->mapValue;
752
0
        copyTo->vOrderForm = copyFrom->vOrderForm;
753
        // fTimeReceivedIsTxTime not copied on purpose
754
        // nTimeReceived not copied on purpose
755
0
        copyTo->nTimeSmart = copyFrom->nTimeSmart;
756
0
        copyTo->fFromMe = copyFrom->fFromMe;
757
        // nOrderPos not copied on purpose
758
        // cached members not copied on purpose
759
0
    }
760
0
}
761
762
/**
763
 * Outpoint is spent if any non-conflicted transaction
764
 * spends it:
765
 */
766
bool CWallet::IsSpent(const COutPoint& outpoint) const
767
0
{
768
0
    std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
769
0
    range = mapTxSpends.equal_range(outpoint);
770
771
0
    for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
772
0
        const uint256& wtxid = it->second;
773
0
        const auto mit = mapWallet.find(wtxid);
774
0
        if (mit != mapWallet.end()) {
775
0
            const auto& wtx = mit->second;
776
0
            if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted())
777
0
                return true; // Spent
778
0
        }
779
0
    }
780
0
    return false;
781
0
}
782
783
void CWallet::AddToSpends(const COutPoint& outpoint, const uint256& wtxid, WalletBatch* batch)
784
0
{
785
0
    mapTxSpends.insert(std::make_pair(outpoint, wtxid));
786
787
0
    if (batch) {
788
0
        UnlockCoin(outpoint, batch);
789
0
    } else {
790
0
        WalletBatch temp_batch(GetDatabase());
791
0
        UnlockCoin(outpoint, &temp_batch);
792
0
    }
793
794
0
    std::pair<TxSpends::iterator, TxSpends::iterator> range;
795
0
    range = mapTxSpends.equal_range(outpoint);
796
0
    SyncMetaData(range);
797
0
}
798
799
800
void CWallet::AddToSpends(const CWalletTx& wtx, WalletBatch* batch)
801
0
{
802
0
    if (wtx.IsCoinBase()) // Coinbases don't spend anything!
803
0
        return;
804
805
0
    for (const CTxIn& txin : wtx.tx->vin)
806
0
        AddToSpends(txin.prevout, wtx.GetHash(), batch);
807
0
}
808
809
bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
810
0
{
811
0
    if (IsCrypted())
812
0
        return false;
813
814
0
    CKeyingMaterial plain_master_key;
815
816
0
    plain_master_key.resize(WALLET_CRYPTO_KEY_SIZE);
817
0
    GetStrongRandBytes(plain_master_key);
818
819
0
    CMasterKey master_key;
820
821
0
    master_key.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE);
822
0
    GetStrongRandBytes(master_key.vchSalt);
823
824
0
    if (!EncryptMasterKey(strWalletPassphrase, plain_master_key, master_key)) {
825
0
        return false;
826
0
    }
827
0
    WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", master_key.nDeriveIterations);
828
829
0
    {
830
0
        LOCK2(m_relock_mutex, cs_wallet);
831
0
        mapMasterKeys[++nMasterKeyMaxID] = master_key;
832
0
        WalletBatch* encrypted_batch = new WalletBatch(GetDatabase());
833
0
        if (!encrypted_batch->TxnBegin()) {
834
0
            delete encrypted_batch;
835
0
            encrypted_batch = nullptr;
836
0
            return false;
837
0
        }
838
0
        encrypted_batch->WriteMasterKey(nMasterKeyMaxID, master_key);
839
840
0
        for (const auto& spk_man_pair : m_spk_managers) {
841
0
            auto spk_man = spk_man_pair.second.get();
842
0
            if (!spk_man->Encrypt(plain_master_key, encrypted_batch)) {
843
0
                encrypted_batch->TxnAbort();
844
0
                delete encrypted_batch;
845
0
                encrypted_batch = nullptr;
846
                // We now probably have half of our keys encrypted in memory, and half not...
847
                // die and let the user reload the unencrypted wallet.
848
0
                assert(false);
849
0
            }
850
0
        }
851
852
        // Encryption was introduced in version 0.4.0
853
0
        SetMinVersion(FEATURE_WALLETCRYPT, encrypted_batch);
854
855
0
        if (!encrypted_batch->TxnCommit()) {
856
0
            delete encrypted_batch;
857
0
            encrypted_batch = nullptr;
858
            // We now have keys encrypted in memory, but not on disk...
859
            // die to avoid confusion and let the user reload the unencrypted wallet.
860
0
            assert(false);
861
0
        }
862
863
0
        delete encrypted_batch;
864
0
        encrypted_batch = nullptr;
865
866
0
        Lock();
867
0
        Unlock(strWalletPassphrase);
868
869
        // If we are using descriptors, make new descriptors with a new seed
870
0
        if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) && !IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
871
0
            SetupDescriptorScriptPubKeyMans();
872
0
        }
873
0
        Lock();
874
875
        // Need to completely rewrite the wallet file; if we don't, the database might keep
876
        // bits of the unencrypted private key in slack space in the database file.
877
0
        GetDatabase().Rewrite();
878
0
    }
879
0
    NotifyStatusChanged(this);
880
881
0
    return true;
882
0
}
883
884
DBErrors CWallet::ReorderTransactions()
885
0
{
886
0
    LOCK(cs_wallet);
887
0
    WalletBatch batch(GetDatabase());
888
889
    // Old wallets didn't have any defined order for transactions
890
    // Probably a bad idea to change the output of this
891
892
    // First: get all CWalletTx into a sorted-by-time multimap.
893
0
    typedef std::multimap<int64_t, CWalletTx*> TxItems;
894
0
    TxItems txByTime;
895
896
0
    for (auto& entry : mapWallet)
897
0
    {
898
0
        CWalletTx* wtx = &entry.second;
899
0
        txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx));
900
0
    }
901
902
0
    nOrderPosNext = 0;
903
0
    std::vector<int64_t> nOrderPosOffsets;
904
0
    for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it)
905
0
    {
906
0
        CWalletTx *const pwtx = (*it).second;
907
0
        int64_t& nOrderPos = pwtx->nOrderPos;
908
909
0
        if (nOrderPos == -1)
910
0
        {
911
0
            nOrderPos = nOrderPosNext++;
912
0
            nOrderPosOffsets.push_back(nOrderPos);
913
914
0
            if (!batch.WriteTx(*pwtx))
915
0
                return DBErrors::LOAD_FAIL;
916
0
        }
917
0
        else
918
0
        {
919
0
            int64_t nOrderPosOff = 0;
920
0
            for (const int64_t& nOffsetStart : nOrderPosOffsets)
921
0
            {
922
0
                if (nOrderPos >= nOffsetStart)
923
0
                    ++nOrderPosOff;
924
0
            }
925
0
            nOrderPos += nOrderPosOff;
926
0
            nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1);
927
928
0
            if (!nOrderPosOff)
929
0
                continue;
930
931
            // Since we're changing the order, write it back
932
0
            if (!batch.WriteTx(*pwtx))
933
0
                return DBErrors::LOAD_FAIL;
934
0
        }
935
0
    }
936
0
    batch.WriteOrderPosNext(nOrderPosNext);
937
938
0
    return DBErrors::LOAD_OK;
939
0
}
940
941
int64_t CWallet::IncOrderPosNext(WalletBatch* batch)
942
0
{
943
0
    AssertLockHeld(cs_wallet);
944
0
    int64_t nRet = nOrderPosNext++;
945
0
    if (batch) {
946
0
        batch->WriteOrderPosNext(nOrderPosNext);
947
0
    } else {
948
0
        WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext);
949
0
    }
950
0
    return nRet;
951
0
}
952
953
void CWallet::MarkDirty()
954
0
{
955
0
    {
956
0
        LOCK(cs_wallet);
957
0
        for (std::pair<const uint256, CWalletTx>& item : mapWallet)
958
0
            item.second.MarkDirty();
959
0
    }
960
0
}
961
962
bool CWallet::MarkReplaced(const uint256& originalHash, const uint256& newHash)
963
0
{
964
0
    LOCK(cs_wallet);
965
966
0
    auto mi = mapWallet.find(originalHash);
967
968
    // There is a bug if MarkReplaced is not called on an existing wallet transaction.
969
0
    assert(mi != mapWallet.end());
970
971
0
    CWalletTx& wtx = (*mi).second;
972
973
    // Ensure for now that we're not overwriting data
974
0
    assert(wtx.mapValue.count("replaced_by_txid") == 0);
975
976
0
    wtx.mapValue["replaced_by_txid"] = newHash.ToString();
977
978
    // Refresh mempool status without waiting for transactionRemovedFromMempool or transactionAddedToMempool
979
0
    RefreshMempoolStatus(wtx, chain());
980
981
0
    WalletBatch batch(GetDatabase());
982
983
0
    bool success = true;
984
0
    if (!batch.WriteTx(wtx)) {
985
0
        WalletLogPrintf("%s: Updating batch tx %s failed\n", __func__, wtx.GetHash().ToString());
986
0
        success = false;
987
0
    }
988
989
0
    NotifyTransactionChanged(originalHash, CT_UPDATED);
990
991
0
    return success;
992
0
}
993
994
void CWallet::SetSpentKeyState(WalletBatch& batch, const uint256& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations)
995
0
{
996
0
    AssertLockHeld(cs_wallet);
997
0
    const CWalletTx* srctx = GetWalletTx(hash);
998
0
    if (!srctx) return;
999
1000
0
    CTxDestination dst;
1001
0
    if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) {
1002
0
        if (IsMine(dst)) {
1003
0
            if (used != IsAddressPreviouslySpent(dst)) {
1004
0
                if (used) {
1005
0
                    tx_destinations.insert(dst);
1006
0
                }
1007
0
                SetAddressPreviouslySpent(batch, dst, used);
1008
0
            }
1009
0
        }
1010
0
    }
1011
0
}
1012
1013
bool CWallet::IsSpentKey(const CScript& scriptPubKey) const
1014
0
{
1015
0
    AssertLockHeld(cs_wallet);
1016
0
    CTxDestination dest;
1017
0
    if (!ExtractDestination(scriptPubKey, dest)) {
1018
0
        return false;
1019
0
    }
1020
0
    if (IsAddressPreviouslySpent(dest)) {
1021
0
        return true;
1022
0
    }
1023
0
    return false;
1024
0
}
1025
1026
CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const TxState& state, const UpdateWalletTxFn& update_wtx, bool rescanning_old_block)
1027
0
{
1028
0
    LOCK(cs_wallet);
1029
1030
0
    WalletBatch batch(GetDatabase());
1031
1032
0
    uint256 hash = tx->GetHash();
1033
1034
0
    if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
1035
        // Mark used destinations
1036
0
        std::set<CTxDestination> tx_destinations;
1037
1038
0
        for (const CTxIn& txin : tx->vin) {
1039
0
            const COutPoint& op = txin.prevout;
1040
0
            SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations);
1041
0
        }
1042
1043
0
        MarkDestinationsDirty(tx_destinations);
1044
0
    }
1045
1046
    // Inserts only if not already there, returns tx inserted or tx found
1047
0
    auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(tx, state));
1048
0
    CWalletTx& wtx = (*ret.first).second;
1049
0
    bool fInsertedNew = ret.second;
1050
0
    bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew);
1051
0
    if (fInsertedNew) {
1052
0
        wtx.nTimeReceived = GetTime();
1053
0
        wtx.nOrderPos = IncOrderPosNext(&batch);
1054
0
        wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1055
0
        wtx.nTimeSmart = ComputeTimeSmart(wtx, rescanning_old_block);
1056
0
        AddToSpends(wtx, &batch);
1057
1058
        // Update birth time when tx time is older than it.
1059
0
        MaybeUpdateBirthTime(wtx.GetTxTime());
1060
0
    }
1061
1062
0
    if (!fInsertedNew)
1063
0
    {
1064
0
        if (state.index() != wtx.m_state.index()) {
1065
0
            wtx.m_state = state;
1066
0
            fUpdated = true;
1067
0
        } else {
1068
0
            assert(TxStateSerializedIndex(wtx.m_state) == TxStateSerializedIndex(state));
1069
0
            assert(TxStateSerializedBlockHash(wtx.m_state) == TxStateSerializedBlockHash(state));
1070
0
        }
1071
        // If we have a witness-stripped version of this transaction, and we
1072
        // see a new version with a witness, then we must be upgrading a pre-segwit
1073
        // wallet.  Store the new version of the transaction with the witness,
1074
        // as the stripped-version must be invalid.
1075
        // TODO: Store all versions of the transaction, instead of just one.
1076
0
        if (tx->HasWitness() && !wtx.tx->HasWitness()) {
1077
0
            wtx.SetTx(tx);
1078
0
            fUpdated = true;
1079
0
        }
1080
0
    }
1081
1082
    // Mark inactive coinbase transactions and their descendants as abandoned
1083
0
    if (wtx.IsCoinBase() && wtx.isInactive()) {
1084
0
        std::vector<CWalletTx*> txs{&wtx};
1085
1086
0
        TxStateInactive inactive_state = TxStateInactive{/*abandoned=*/true};
1087
1088
0
        while (!txs.empty()) {
1089
0
            CWalletTx* desc_tx = txs.back();
1090
0
            txs.pop_back();
1091
0
            desc_tx->m_state = inactive_state;
1092
            // Break caches since we have changed the state
1093
0
            desc_tx->MarkDirty();
1094
0
            batch.WriteTx(*desc_tx);
1095
0
            MarkInputsDirty(desc_tx->tx);
1096
0
            for (unsigned int i = 0; i < desc_tx->tx->vout.size(); ++i) {
1097
0
                COutPoint outpoint(desc_tx->GetHash(), i);
1098
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(outpoint);
1099
0
                for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
1100
0
                    const auto wit = mapWallet.find(it->second);
1101
0
                    if (wit != mapWallet.end()) {
1102
0
                        txs.push_back(&wit->second);
1103
0
                    }
1104
0
                }
1105
0
            }
1106
0
        }
1107
0
    }
1108
1109
    //// debug print
1110
0
    WalletLogPrintf("AddToWallet %s  %s%s %s\n", hash.ToString(), (fInsertedNew ? "new" : ""), (fUpdated ? "update" : ""), TxStateString(state));
1111
1112
    // Write to disk
1113
0
    if (fInsertedNew || fUpdated)
1114
0
        if (!batch.WriteTx(wtx))
1115
0
            return nullptr;
1116
1117
    // Break debit/credit balance caches:
1118
0
    wtx.MarkDirty();
1119
1120
    // Notify UI of new or updated transaction
1121
0
    NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED);
1122
1123
0
#if HAVE_SYSTEM
1124
    // notify an external script when a wallet transaction comes in or is updated
1125
0
    std::string strCmd = m_notify_tx_changed_script;
1126
1127
0
    if (!strCmd.empty())
1128
0
    {
1129
0
        ReplaceAll(strCmd, "%s", hash.GetHex());
1130
0
        if (auto* conf = wtx.state<TxStateConfirmed>())
1131
0
        {
1132
0
            ReplaceAll(strCmd, "%b", conf->confirmed_block_hash.GetHex());
1133
0
            ReplaceAll(strCmd, "%h", ToString(conf->confirmed_block_height));
1134
0
        } else {
1135
0
            ReplaceAll(strCmd, "%b", "unconfirmed");
1136
0
            ReplaceAll(strCmd, "%h", "-1");
1137
0
        }
1138
0
#ifndef WIN32
1139
        // Substituting the wallet name isn't currently supported on windows
1140
        // because windows shell escaping has not been implemented yet:
1141
        // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
1142
        // A few ways it could be implemented in the future are described in:
1143
        // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
1144
0
        ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
1145
0
#endif
1146
0
        std::thread t(runCommand, strCmd);
1147
0
        t.detach(); // thread runs free
1148
0
    }
1149
0
#endif
1150
1151
0
    return &wtx;
1152
0
}
1153
1154
bool CWallet::LoadToWallet(const uint256& hash, const UpdateWalletTxFn& fill_wtx)
1155
0
{
1156
0
    const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(nullptr, TxStateInactive{}));
1157
0
    CWalletTx& wtx = ins.first->second;
1158
0
    if (!fill_wtx(wtx, ins.second)) {
1159
0
        return false;
1160
0
    }
1161
    // If wallet doesn't have a chain (e.g when using bitcoin-wallet tool),
1162
    // don't bother to update txn.
1163
0
    if (HaveChain()) {
1164
0
      wtx.updateState(chain());
1165
0
    }
1166
0
    if (/* insertion took place */ ins.second) {
1167
0
        wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1168
0
    }
1169
0
    AddToSpends(wtx);
1170
0
    for (const CTxIn& txin : wtx.tx->vin) {
1171
0
        auto it = mapWallet.find(txin.prevout.hash);
1172
0
        if (it != mapWallet.end()) {
1173
0
            CWalletTx& prevtx = it->second;
1174
0
            if (auto* prev = prevtx.state<TxStateBlockConflicted>()) {
1175
0
                MarkConflicted(prev->conflicting_block_hash, prev->conflicting_block_height, wtx.GetHash());
1176
0
            }
1177
0
        }
1178
0
    }
1179
1180
    // Update birth time when tx time is older than it.
1181
0
    MaybeUpdateBirthTime(wtx.GetTxTime());
1182
1183
0
    return true;
1184
0
}
1185
1186
bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, const SyncTxState& state, bool fUpdate, bool rescanning_old_block)
1187
0
{
1188
0
    const CTransaction& tx = *ptx;
1189
0
    {
1190
0
        AssertLockHeld(cs_wallet);
1191
1192
0
        if (auto* conf = std::get_if<TxStateConfirmed>(&state)) {
1193
0
            for (const CTxIn& txin : tx.vin) {
1194
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout);
1195
0
                while (range.first != range.second) {
1196
0
                    if (range.first->second != tx.GetHash()) {
1197
0
                        WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), conf->confirmed_block_hash.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n);
1198
0
                        MarkConflicted(conf->confirmed_block_hash, conf->confirmed_block_height, range.first->second);
1199
0
                    }
1200
0
                    range.first++;
1201
0
                }
1202
0
            }
1203
0
        }
1204
1205
0
        bool fExisted = mapWallet.count(tx.GetHash()) != 0;
1206
0
        if (fExisted && !fUpdate) return false;
1207
0
        if (fExisted || IsMine(tx) || IsFromMe(tx))
1208
0
        {
1209
            /* Check if any keys in the wallet keypool that were supposed to be unused
1210
             * have appeared in a new transaction. If so, remove those keys from the keypool.
1211
             * This can happen when restoring an old wallet backup that does not contain
1212
             * the mostly recently created transactions from newer versions of the wallet.
1213
             */
1214
1215
            // loop though all outputs
1216
0
            for (const CTxOut& txout: tx.vout) {
1217
0
                for (const auto& spk_man : GetScriptPubKeyMans(txout.scriptPubKey)) {
1218
0
                    for (auto &dest : spk_man->MarkUnusedAddresses(txout.scriptPubKey)) {
1219
                        // If internal flag is not defined try to infer it from the ScriptPubKeyMan
1220
0
                        if (!dest.internal.has_value()) {
1221
0
                            dest.internal = IsInternalScriptPubKeyMan(spk_man);
1222
0
                        }
1223
1224
                        // skip if can't determine whether it's a receiving address or not
1225
0
                        if (!dest.internal.has_value()) continue;
1226
1227
                        // If this is a receiving address and it's not in the address book yet
1228
                        // (e.g. it wasn't generated on this node or we're restoring from backup)
1229
                        // add it to the address book for proper transaction accounting
1230
0
                        if (!*dest.internal && !FindAddressBookEntry(dest.dest, /* allow_change= */ false)) {
1231
0
                            SetAddressBook(dest.dest, "", AddressPurpose::RECEIVE);
1232
0
                        }
1233
0
                    }
1234
0
                }
1235
0
            }
1236
1237
            // Block disconnection override an abandoned tx as unconfirmed
1238
            // which means user may have to call abandontransaction again
1239
0
            TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKS8_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKS9_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKSA_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
1240
0
            CWalletTx* wtx = AddToWallet(MakeTransactionRef(tx), tx_state, /*update_wtx=*/nullptr, rescanning_old_block);
1241
0
            if (!wtx) {
1242
                // Can only be nullptr if there was a db write error (missing db, read-only db or a db engine internal writing error).
1243
                // As we only store arriving transaction in this process, and we don't want an inconsistent state, let's throw an error.
1244
0
                throw std::runtime_error("DB error adding transaction to wallet, write failed");
1245
0
            }
1246
0
            return true;
1247
0
        }
1248
0
    }
1249
0
    return false;
1250
0
}
1251
1252
bool CWallet::TransactionCanBeAbandoned(const uint256& hashTx) const
1253
0
{
1254
0
    LOCK(cs_wallet);
1255
0
    const CWalletTx* wtx = GetWalletTx(hashTx);
1256
0
    return wtx && !wtx->isAbandoned() && GetTxDepthInMainChain(*wtx) == 0 && !wtx->InMempool();
1257
0
}
1258
1259
void CWallet::MarkInputsDirty(const CTransactionRef& tx)
1260
0
{
1261
0
    for (const CTxIn& txin : tx->vin) {
1262
0
        auto it = mapWallet.find(txin.prevout.hash);
1263
0
        if (it != mapWallet.end()) {
1264
0
            it->second.MarkDirty();
1265
0
        }
1266
0
    }
1267
0
}
1268
1269
bool CWallet::AbandonTransaction(const uint256& hashTx)
1270
0
{
1271
0
    LOCK(cs_wallet);
1272
0
    auto it = mapWallet.find(hashTx);
1273
0
    assert(it != mapWallet.end());
1274
0
    return AbandonTransaction(it->second);
1275
0
}
1276
1277
bool CWallet::AbandonTransaction(CWalletTx& tx)
1278
0
{
1279
    // Can't mark abandoned if confirmed or in mempool
1280
0
    if (GetTxDepthInMainChain(tx) != 0 || tx.InMempool()) {
1281
0
        return false;
1282
0
    }
1283
1284
0
    auto try_updating_state = [](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1285
        // If the orig tx was not in block/mempool, none of its spends can be.
1286
0
        assert(!wtx.isConfirmed());
1287
0
        assert(!wtx.InMempool());
1288
        // If already conflicted or abandoned, no need to set abandoned
1289
0
        if (!wtx.isBlockConflicted() && !wtx.isAbandoned()) {
1290
0
            wtx.m_state = TxStateInactive{/*abandoned=*/true};
1291
0
            return TxUpdate::NOTIFY_CHANGED;
1292
0
        }
1293
0
        return TxUpdate::UNCHANGED;
1294
0
    };
1295
1296
    // Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too.
1297
    // States are not permanent, so these transactions can become unabandoned if they are re-added to the
1298
    // mempool, or confirmed in a block, or conflicted.
1299
    // Note: If the reorged coinbase is re-added to the main chain, the descendants that have not had their
1300
    // states change will remain abandoned and will require manual broadcast if the user wants them.
1301
1302
0
    RecursiveUpdateTxState(tx.GetHash(), try_updating_state);
1303
1304
0
    return true;
1305
0
}
1306
1307
void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const uint256& hashTx)
1308
0
{
1309
0
    LOCK(cs_wallet);
1310
1311
    // If number of conflict confirms cannot be determined, this means
1312
    // that the block is still unknown or not yet part of the main chain,
1313
    // for example when loading the wallet during a reindex. Do nothing in that
1314
    // case.
1315
0
    if (m_last_block_processed_height < 0 || conflicting_height < 0) {
1316
0
        return;
1317
0
    }
1318
0
    int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1;
1319
0
    if (conflictconfirms >= 0)
1320
0
        return;
1321
1322
0
    auto try_updating_state = [&](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1323
0
        if (conflictconfirms < GetTxDepthInMainChain(wtx)) {
1324
            // Block is 'more conflicted' than current confirm; update.
1325
            // Mark transaction as conflicted with this block.
1326
0
            wtx.m_state = TxStateBlockConflicted{hashBlock, conflicting_height};
1327
0
            return TxUpdate::CHANGED;
1328
0
        }
1329
0
        return TxUpdate::UNCHANGED;
1330
0
    };
1331
1332
    // Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too.
1333
0
    RecursiveUpdateTxState(hashTx, try_updating_state);
1334
1335
0
}
1336
1337
0
void CWallet::RecursiveUpdateTxState(const uint256& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1338
0
    WalletBatch batch(GetDatabase());
1339
0
    RecursiveUpdateTxState(&batch, tx_hash, try_updating_state);
1340
0
}
1341
1342
0
void CWallet::RecursiveUpdateTxState(WalletBatch* batch, const uint256& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1343
0
    std::set<uint256> todo;
1344
0
    std::set<uint256> done;
1345
1346
0
    todo.insert(tx_hash);
1347
1348
0
    while (!todo.empty()) {
1349
0
        uint256 now = *todo.begin();
1350
0
        todo.erase(now);
1351
0
        done.insert(now);
1352
0
        auto it = mapWallet.find(now);
1353
0
        assert(it != mapWallet.end());
1354
0
        CWalletTx& wtx = it->second;
1355
1356
0
        TxUpdate update_state = try_updating_state(wtx);
1357
0
        if (update_state != TxUpdate::UNCHANGED) {
1358
0
            wtx.MarkDirty();
1359
0
            if (batch) batch->WriteTx(wtx);
1360
            // Iterate over all its outputs, and update those tx states as well (if applicable)
1361
0
            for (unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
1362
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(COutPoint(Txid::FromUint256(now), i));
1363
0
                for (TxSpends::const_iterator iter = range.first; iter != range.second; ++iter) {
1364
0
                    if (!done.count(iter->second)) {
1365
0
                        todo.insert(iter->second);
1366
0
                    }
1367
0
                }
1368
0
            }
1369
1370
0
            if (update_state == TxUpdate::NOTIFY_CHANGED) {
1371
0
                NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED);
1372
0
            }
1373
1374
            // If a transaction changes its tx state, that usually changes the balance
1375
            // available of the outputs it spends. So force those to be recomputed
1376
0
            MarkInputsDirty(wtx.tx);
1377
0
        }
1378
0
    }
1379
0
}
1380
1381
void CWallet::SyncTransaction(const CTransactionRef& ptx, const SyncTxState& state, bool update_tx, bool rescanning_old_block)
1382
0
{
1383
0
    if (!AddToWalletIfInvolvingMe(ptx, state, update_tx, rescanning_old_block))
1384
0
        return; // Not one of ours
1385
1386
    // If a transaction changes 'conflicted' state, that changes the balance
1387
    // available of the outputs it spends. So force those to be
1388
    // recomputed, also:
1389
0
    MarkInputsDirty(ptx);
1390
0
}
1391
1392
0
void CWallet::transactionAddedToMempool(const CTransactionRef& tx) {
1393
0
    LOCK(cs_wallet);
1394
0
    SyncTransaction(tx, TxStateInMempool{});
1395
1396
0
    auto it = mapWallet.find(tx->GetHash());
1397
0
    if (it != mapWallet.end()) {
1398
0
        RefreshMempoolStatus(it->second, chain());
1399
0
    }
1400
1401
0
    const Txid& txid = tx->GetHash();
1402
1403
0
    for (const CTxIn& tx_in : tx->vin) {
1404
        // For each wallet transaction spending this prevout..
1405
0
        for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1406
0
            const uint256& spent_id = range.first->second;
1407
            // Skip the recently added tx
1408
0
            if (spent_id == txid) continue;
1409
0
            RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1410
0
                return wtx.mempool_conflicts.insert(txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1411
0
            });
1412
0
        }
1413
0
    }
1414
0
}
1415
1416
0
void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason) {
1417
0
    LOCK(cs_wallet);
1418
0
    auto it = mapWallet.find(tx->GetHash());
1419
0
    if (it != mapWallet.end()) {
1420
0
        RefreshMempoolStatus(it->second, chain());
1421
0
    }
1422
    // Handle transactions that were removed from the mempool because they
1423
    // conflict with transactions in a newly connected block.
1424
0
    if (reason == MemPoolRemovalReason::CONFLICT) {
1425
        // Trigger external -walletnotify notifications for these transactions.
1426
        // Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons:
1427
        //
1428
        // 1. The transactionRemovedFromMempool callback does not currently
1429
        //    provide the conflicting block's hash and height, and for backwards
1430
        //    compatibility reasons it may not be not safe to store conflicted
1431
        //    wallet transactions with a null block hash. See
1432
        //    https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993.
1433
        // 2. For most of these transactions, the wallet's internal conflict
1434
        //    detection in the blockConnected handler will subsequently call
1435
        //    MarkConflicted and update them with CONFLICTED status anyway. This
1436
        //    applies to any wallet transaction that has inputs spent in the
1437
        //    block, or that has ancestors in the wallet with inputs spent by
1438
        //    the block.
1439
        // 3. Longstanding behavior since the sync implementation in
1440
        //    https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync
1441
        //    implementation before that was to mark these transactions
1442
        //    unconfirmed rather than conflicted.
1443
        //
1444
        // Nothing described above should be seen as an unchangeable requirement
1445
        // when improving this code in the future. The wallet's heuristics for
1446
        // distinguishing between conflicted and unconfirmed transactions are
1447
        // imperfect, and could be improved in general, see
1448
        // https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking
1449
0
        SyncTransaction(tx, TxStateInactive{});
1450
0
    }
1451
1452
0
    const Txid& txid = tx->GetHash();
1453
1454
0
    for (const CTxIn& tx_in : tx->vin) {
1455
        // Iterate over all wallet transactions spending txin.prev
1456
        // and recursively mark them as no longer conflicting with
1457
        // txid
1458
0
        for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1459
0
            const uint256& spent_id = range.first->second;
1460
1461
0
            RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1462
0
                return wtx.mempool_conflicts.erase(txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1463
0
            });
1464
0
        }
1465
0
    }
1466
0
}
1467
1468
void CWallet::blockConnected(ChainstateRole role, const interfaces::BlockInfo& block)
1469
0
{
1470
0
    if (role == ChainstateRole::BACKGROUND) {
1471
0
        return;
1472
0
    }
1473
0
    assert(block.data);
1474
0
    LOCK(cs_wallet);
1475
1476
0
    m_last_block_processed_height = block.height;
1477
0
    m_last_block_processed = block.hash;
1478
1479
    // No need to scan block if it was created before the wallet birthday.
1480
    // Uses chain max time and twice the grace period to adjust time for block time variability.
1481
0
    if (block.chain_time_max < m_birth_time.load() - (TIMESTAMP_WINDOW * 2)) return;
1482
1483
    // Scan block
1484
0
    for (size_t index = 0; index < block.data->vtx.size(); index++) {
1485
0
        SyncTransaction(block.data->vtx[index], TxStateConfirmed{block.hash, block.height, static_cast<int>(index)});
1486
0
        transactionRemovedFromMempool(block.data->vtx[index], MemPoolRemovalReason::BLOCK);
1487
0
    }
1488
0
}
1489
1490
void CWallet::blockDisconnected(const interfaces::BlockInfo& block)
1491
0
{
1492
0
    assert(block.data);
1493
0
    LOCK(cs_wallet);
1494
1495
    // At block disconnection, this will change an abandoned transaction to
1496
    // be unconfirmed, whether or not the transaction is added back to the mempool.
1497
    // User may have to call abandontransaction again. It may be addressed in the
1498
    // future with a stickier abandoned state or even removing abandontransaction call.
1499
0
    m_last_block_processed_height = block.height - 1;
1500
0
    m_last_block_processed = *Assert(block.prev_hash);
1501
1502
0
    int disconnect_height = block.height;
1503
1504
0
    for (size_t index = 0; index < block.data->vtx.size(); index++) {
1505
0
        const CTransactionRef& ptx = block.data->vtx[index];
1506
        // Coinbase transactions are not only inactive but also abandoned,
1507
        // meaning they should never be relayed standalone via the p2p protocol.
1508
0
        SyncTransaction(ptx, TxStateInactive{/*abandoned=*/index == 0});
1509
1510
0
        for (const CTxIn& tx_in : ptx->vin) {
1511
            // No other wallet transactions conflicted with this transaction
1512
0
            if (mapTxSpends.count(tx_in.prevout) < 1) continue;
1513
1514
0
            std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(tx_in.prevout);
1515
1516
            // For all of the spends that conflict with this transaction
1517
0
            for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) {
1518
0
                CWalletTx& wtx = mapWallet.find(_it->second)->second;
1519
1520
0
                if (!wtx.isBlockConflicted()) continue;
1521
1522
0
                auto try_updating_state = [&](CWalletTx& tx) {
1523
0
                    if (!tx.isBlockConflicted()) return TxUpdate::UNCHANGED;
1524
0
                    if (tx.state<TxStateBlockConflicted>()->conflicting_block_height >= disconnect_height) {
1525
0
                        tx.m_state = TxStateInactive{};
1526
0
                        return TxUpdate::CHANGED;
1527
0
                    }
1528
0
                    return TxUpdate::UNCHANGED;
1529
0
                };
1530
1531
0
                RecursiveUpdateTxState(wtx.tx->GetHash(), try_updating_state);
1532
0
            }
1533
0
        }
1534
0
    }
1535
0
}
1536
1537
void CWallet::updatedBlockTip()
1538
0
{
1539
0
    m_best_block_time = GetTime();
1540
0
}
1541
1542
0
void CWallet::BlockUntilSyncedToCurrentChain() const {
1543
0
    AssertLockNotHeld(cs_wallet);
1544
    // Skip the queue-draining stuff if we know we're caught up with
1545
    // chain().Tip(), otherwise put a callback in the validation interface queue and wait
1546
    // for the queue to drain enough to execute it (indicating we are caught up
1547
    // at least with the time we entered this function).
1548
0
    uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed);
1549
0
    chain().waitForNotificationsIfTipChanged(last_block_hash);
1550
0
}
1551
1552
// Note that this function doesn't distinguish between a 0-valued input,
1553
// and a not-"is mine" (according to the filter) input.
1554
CAmount CWallet::GetDebit(const CTxIn &txin, const isminefilter& filter) const
1555
0
{
1556
0
    {
1557
0
        LOCK(cs_wallet);
1558
0
        const auto mi = mapWallet.find(txin.prevout.hash);
1559
0
        if (mi != mapWallet.end())
1560
0
        {
1561
0
            const CWalletTx& prev = (*mi).second;
1562
0
            if (txin.prevout.n < prev.tx->vout.size())
1563
0
                if (IsMine(prev.tx->vout[txin.prevout.n]) & filter)
1564
0
                    return prev.tx->vout[txin.prevout.n].nValue;
1565
0
        }
1566
0
    }
1567
0
    return 0;
1568
0
}
1569
1570
isminetype CWallet::IsMine(const CTxOut& txout) const
1571
0
{
1572
0
    AssertLockHeld(cs_wallet);
1573
0
    return IsMine(txout.scriptPubKey);
1574
0
}
1575
1576
isminetype CWallet::IsMine(const CTxDestination& dest) const
1577
0
{
1578
0
    AssertLockHeld(cs_wallet);
1579
0
    return IsMine(GetScriptForDestination(dest));
1580
0
}
1581
1582
isminetype CWallet::IsMine(const CScript& script) const
1583
0
{
1584
0
    AssertLockHeld(cs_wallet);
1585
1586
    // Search the cache so that IsMine is called only on the relevant SPKMs instead of on everything in m_spk_managers
1587
0
    const auto& it = m_cached_spks.find(script);
1588
0
    if (it != m_cached_spks.end()) {
1589
0
        isminetype res = ISMINE_NO;
1590
0
        for (const auto& spkm : it->second) {
1591
0
            res = std::max(res, spkm->IsMine(script));
1592
0
        }
1593
0
        Assume(res == ISMINE_SPENDABLE);
1594
0
        return res;
1595
0
    }
1596
1597
0
    return ISMINE_NO;
1598
0
}
1599
1600
bool CWallet::IsMine(const CTransaction& tx) const
1601
0
{
1602
0
    AssertLockHeld(cs_wallet);
1603
0
    for (const CTxOut& txout : tx.vout)
1604
0
        if (IsMine(txout))
1605
0
            return true;
1606
0
    return false;
1607
0
}
1608
1609
isminetype CWallet::IsMine(const COutPoint& outpoint) const
1610
0
{
1611
0
    AssertLockHeld(cs_wallet);
1612
0
    auto wtx = GetWalletTx(outpoint.hash);
1613
0
    if (!wtx) {
1614
0
        return ISMINE_NO;
1615
0
    }
1616
0
    if (outpoint.n >= wtx->tx->vout.size()) {
1617
0
        return ISMINE_NO;
1618
0
    }
1619
0
    return IsMine(wtx->tx->vout[outpoint.n]);
1620
0
}
1621
1622
bool CWallet::IsFromMe(const CTransaction& tx) const
1623
0
{
1624
0
    return (GetDebit(tx, ISMINE_ALL) > 0);
1625
0
}
1626
1627
CAmount CWallet::GetDebit(const CTransaction& tx, const isminefilter& filter) const
1628
0
{
1629
0
    CAmount nDebit = 0;
1630
0
    for (const CTxIn& txin : tx.vin)
1631
0
    {
1632
0
        nDebit += GetDebit(txin, filter);
1633
0
        if (!MoneyRange(nDebit))
1634
0
            throw std::runtime_error(std::string(__func__) + ": value out of range");
1635
0
    }
1636
0
    return nDebit;
1637
0
}
1638
1639
bool CWallet::IsHDEnabled() const
1640
0
{
1641
    // All Active ScriptPubKeyMans must be HD for this to be true
1642
0
    bool result = false;
1643
0
    for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
1644
0
        if (!spk_man->IsHDEnabled()) return false;
1645
0
        result = true;
1646
0
    }
1647
0
    return result;
1648
0
}
1649
1650
bool CWallet::CanGetAddresses(bool internal) const
1651
0
{
1652
0
    LOCK(cs_wallet);
1653
0
    if (m_spk_managers.empty()) return false;
1654
0
    for (OutputType t : OUTPUT_TYPES) {
1655
0
        auto spk_man = GetScriptPubKeyMan(t, internal);
1656
0
        if (spk_man && spk_man->CanGetAddresses(internal)) {
1657
0
            return true;
1658
0
        }
1659
0
    }
1660
0
    return false;
1661
0
}
1662
1663
void CWallet::SetWalletFlag(uint64_t flags)
1664
0
{
1665
0
    WalletBatch batch(GetDatabase());
1666
0
    return SetWalletFlagWithDB(batch, flags);
1667
0
}
1668
1669
void CWallet::SetWalletFlagWithDB(WalletBatch& batch, uint64_t flags)
1670
0
{
1671
0
    LOCK(cs_wallet);
1672
0
    m_wallet_flags |= flags;
1673
0
    if (!batch.WriteWalletFlags(m_wallet_flags))
1674
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1675
0
}
1676
1677
void CWallet::UnsetWalletFlag(uint64_t flag)
1678
0
{
1679
0
    WalletBatch batch(GetDatabase());
1680
0
    UnsetWalletFlagWithDB(batch, flag);
1681
0
}
1682
1683
void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag)
1684
0
{
1685
0
    LOCK(cs_wallet);
1686
0
    m_wallet_flags &= ~flag;
1687
0
    if (!batch.WriteWalletFlags(m_wallet_flags))
1688
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1689
0
}
1690
1691
void CWallet::UnsetBlankWalletFlag(WalletBatch& batch)
1692
0
{
1693
0
    UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET);
1694
0
}
1695
1696
bool CWallet::IsWalletFlagSet(uint64_t flag) const
1697
0
{
1698
0
    return (m_wallet_flags & flag);
1699
0
}
1700
1701
bool CWallet::LoadWalletFlags(uint64_t flags)
1702
0
{
1703
0
    LOCK(cs_wallet);
1704
0
    if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) {
1705
        // contains unknown non-tolerable wallet flags
1706
0
        return false;
1707
0
    }
1708
0
    m_wallet_flags = flags;
1709
1710
0
    return true;
1711
0
}
1712
1713
void CWallet::InitWalletFlags(uint64_t flags)
1714
0
{
1715
0
    LOCK(cs_wallet);
1716
1717
    // We should never be writing unknown non-tolerable wallet flags
1718
0
    assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32));
1719
    // This should only be used once, when creating a new wallet - so current flags are expected to be blank
1720
0
    assert(m_wallet_flags == 0);
1721
1722
0
    if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) {
1723
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1724
0
    }
1725
1726
0
    if (!LoadWalletFlags(flags)) assert(false);
1727
0
}
1728
1729
void CWallet::MaybeUpdateBirthTime(int64_t time)
1730
0
{
1731
0
    int64_t birthtime = m_birth_time.load();
1732
0
    if (time < birthtime) {
1733
0
        m_birth_time = time;
1734
0
    }
1735
0
}
1736
1737
/**
1738
 * Scan active chain for relevant transactions after importing keys. This should
1739
 * be called whenever new keys are added to the wallet, with the oldest key
1740
 * creation time.
1741
 *
1742
 * @return Earliest timestamp that could be successfully scanned from. Timestamp
1743
 * returned will be higher than startTime if relevant blocks could not be read.
1744
 */
1745
int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update)
1746
0
{
1747
    // Find starting block. May be null if nCreateTime is greater than the
1748
    // highest blockchain timestamp, in which case there is nothing that needs
1749
    // to be scanned.
1750
0
    int start_height = 0;
1751
0
    uint256 start_block;
1752
0
    bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height));
1753
0
    WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);
1754
1755
0
    if (start) {
1756
        // TODO: this should take into account failure by ScanResult::USER_ABORT
1757
0
        ScanResult result = ScanForWalletTransactions(start_block, start_height, /*max_height=*/{}, reserver, /*fUpdate=*/update, /*save_progress=*/false);
1758
0
        if (result.status == ScanResult::FAILURE) {
1759
0
            int64_t time_max;
1760
0
            CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max)));
1761
0
            return time_max + TIMESTAMP_WINDOW + 1;
1762
0
        }
1763
0
    }
1764
0
    return startTime;
1765
0
}
1766
1767
/**
1768
 * Scan the block chain (starting in start_block) for transactions
1769
 * from or to us. If fUpdate is true, found transactions that already
1770
 * exist in the wallet will be updated. If max_height is not set, the
1771
 * mempool will be scanned as well.
1772
 *
1773
 * @param[in] start_block Scan starting block. If block is not on the active
1774
 *                        chain, the scan will return SUCCESS immediately.
1775
 * @param[in] start_height Height of start_block
1776
 * @param[in] max_height  Optional max scanning height. If unset there is
1777
 *                        no maximum and scanning can continue to the tip
1778
 *
1779
 * @return ScanResult returning scan information and indicating success or
1780
 *         failure. Return status will be set to SUCCESS if scan was
1781
 *         successful. FAILURE if a complete rescan was not possible (due to
1782
 *         pruning or corruption). USER_ABORT if the rescan was aborted before
1783
 *         it could complete.
1784
 *
1785
 * @pre Caller needs to make sure start_block (and the optional stop_block) are on
1786
 * the main chain after to the addition of any new keys you want to detect
1787
 * transactions for.
1788
 */
1789
CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate, const bool save_progress)
1790
0
{
1791
0
    constexpr auto INTERVAL_TIME{60s};
1792
0
    auto current_time{reserver.now()};
1793
0
    auto start_time{reserver.now()};
1794
1795
0
    assert(reserver.isReserved());
1796
1797
0
    uint256 block_hash = start_block;
1798
0
    ScanResult result;
1799
1800
0
    std::unique_ptr<FastWalletRescanFilter> fast_rescan_filter;
1801
0
    if (chain().hasBlockFilterIndex(BlockFilterType::BASIC)) fast_rescan_filter = std::make_unique<FastWalletRescanFilter>(*this);
1802
1803
0
    WalletLogPrintf("Rescan started from block %s... (%s)\n", start_block.ToString(),
1804
0
                    fast_rescan_filter ? "fast variant using block filters" : "slow variant inspecting all blocks");
1805
1806
0
    fAbortRescan = false;
1807
0
    ShowProgress(strprintf("%s %s", GetDisplayName(), _("Rescanning…")), 0); // show rescan progress in GUI as dialog or on splashscreen, if rescan required on startup (e.g. due to corruption)
1808
0
    uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1809
0
    uint256 end_hash = tip_hash;
1810
0
    if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash));
1811
0
    double progress_begin = chain().guessVerificationProgress(block_hash);
1812
0
    double progress_end = chain().guessVerificationProgress(end_hash);
1813
0
    double progress_current = progress_begin;
1814
0
    int block_height = start_height;
1815
0
    while (!fAbortRescan && !chain().shutdownRequested()) {
1816
0
        if (progress_end - progress_begin > 0.0) {
1817
0
            m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin);
1818
0
        } else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal)
1819
0
            m_scanning_progress = 0;
1820
0
        }
1821
0
        if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) {
1822
0
            ShowProgress(strprintf("%s %s", GetDisplayName(), _("Rescanning…")), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));
1823
0
        }
1824
1825
0
        bool next_interval = reserver.now() >= current_time + INTERVAL_TIME;
1826
0
        if (next_interval) {
1827
0
            current_time = reserver.now();
1828
0
            WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current);
1829
0
        }
1830
1831
0
        bool fetch_block{true};
1832
0
        if (fast_rescan_filter) {
1833
0
            fast_rescan_filter->UpdateIfNeeded();
1834
0
            auto matches_block{fast_rescan_filter->MatchesBlock(block_hash)};
1835
0
            if (matches_block.has_value()) {
1836
0
                if (*matches_block) {
1837
0
                    LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (filter matched)\n", block_height, block_hash.ToString());
1838
0
                } else {
1839
0
                    result.last_scanned_block = block_hash;
1840
0
                    result.last_scanned_height = block_height;
1841
0
                    fetch_block = false;
1842
0
                }
1843
0
            } else {
1844
0
                LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (WARNING: block filter not found!)\n", block_height, block_hash.ToString());
1845
0
            }
1846
0
        }
1847
1848
        // Find next block separately from reading data above, because reading
1849
        // is slow and there might be a reorg while it is read.
1850
0
        bool block_still_active = false;
1851
0
        bool next_block = false;
1852
0
        uint256 next_block_hash;
1853
0
        chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash)));
1854
1855
0
        if (fetch_block) {
1856
            // Read block data
1857
0
            CBlock block;
1858
0
            chain().findBlock(block_hash, FoundBlock().data(block));
1859
1860
0
            if (!block.IsNull()) {
1861
0
                LOCK(cs_wallet);
1862
0
                if (!block_still_active) {
1863
                    // Abort scan if current block is no longer active, to prevent
1864
                    // marking transactions as coming from the wrong block.
1865
0
                    result.last_failed_block = block_hash;
1866
0
                    result.status = ScanResult::FAILURE;
1867
0
                    break;
1868
0
                }
1869
0
                for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) {
1870
0
                    SyncTransaction(block.vtx[posInBlock], TxStateConfirmed{block_hash, block_height, static_cast<int>(posInBlock)}, fUpdate, /*rescanning_old_block=*/true);
1871
0
                }
1872
                // scan succeeded, record block as most recent successfully scanned
1873
0
                result.last_scanned_block = block_hash;
1874
0
                result.last_scanned_height = block_height;
1875
1876
0
                if (save_progress && next_interval) {
1877
0
                    CBlockLocator loc = m_chain->getActiveChainLocator(block_hash);
1878
1879
0
                    if (!loc.IsNull()) {
1880
0
                        WalletLogPrintf("Saving scan progress %d.\n", block_height);
1881
0
                        WalletBatch batch(GetDatabase());
1882
0
                        batch.WriteBestBlock(loc);
1883
0
                    }
1884
0
                }
1885
0
            } else {
1886
                // could not scan block, keep scanning but record this block as the most recent failure
1887
0
                result.last_failed_block = block_hash;
1888
0
                result.status = ScanResult::FAILURE;
1889
0
            }
1890
0
        }
1891
0
        if (max_height && block_height >= *max_height) {
1892
0
            break;
1893
0
        }
1894
        // If rescanning was triggered with cs_wallet permanently locked (AttachChain), additional blocks that were connected during the rescan
1895
        // aren't processed here but will be processed with the pending blockConnected notifications after the lock is released.
1896
        // If rescanning without a permanent cs_wallet lock, additional blocks that were added during the rescan will be re-processed if
1897
        // the notification was processed and the last block height was updated.
1898
0
        if (block_height >= WITH_LOCK(cs_wallet, return GetLastBlockHeight())) {
1899
0
            break;
1900
0
        }
1901
1902
0
        {
1903
0
            if (!next_block) {
1904
                // break successfully when rescan has reached the tip, or
1905
                // previous block is no longer on the chain due to a reorg
1906
0
                break;
1907
0
            }
1908
1909
            // increment block and verification progress
1910
0
            block_hash = next_block_hash;
1911
0
            ++block_height;
1912
0
            progress_current = chain().guessVerificationProgress(block_hash);
1913
1914
            // handle updated tip hash
1915
0
            const uint256 prev_tip_hash = tip_hash;
1916
0
            tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1917
0
            if (!max_height && prev_tip_hash != tip_hash) {
1918
                // in case the tip has changed, update progress max
1919
0
                progress_end = chain().guessVerificationProgress(tip_hash);
1920
0
            }
1921
0
        }
1922
0
    }
1923
0
    if (!max_height) {
1924
0
        WalletLogPrintf("Scanning current mempool transactions.\n");
1925
0
        WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
1926
0
    }
1927
0
    ShowProgress(strprintf("%s %s", GetDisplayName(), _("Rescanning…")), 100); // hide progress dialog in GUI
1928
0
    if (block_height && fAbortRescan) {
1929
0
        WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current);
1930
0
        result.status = ScanResult::USER_ABORT;
1931
0
    } else if (block_height && chain().shutdownRequested()) {
1932
0
        WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current);
1933
0
        result.status = ScanResult::USER_ABORT;
1934
0
    } else {
1935
0
        WalletLogPrintf("Rescan completed in %15dms\n", Ticks<std::chrono::milliseconds>(reserver.now() - start_time));
1936
0
    }
1937
0
    return result;
1938
0
}
1939
1940
bool CWallet::SubmitTxMemoryPoolAndRelay(CWalletTx& wtx, std::string& err_string, bool relay) const
1941
0
{
1942
0
    AssertLockHeld(cs_wallet);
1943
1944
    // Can't relay if wallet is not broadcasting
1945
0
    if (!GetBroadcastTransactions()) return false;
1946
    // Don't relay abandoned transactions
1947
0
    if (wtx.isAbandoned()) return false;
1948
    // Don't try to submit coinbase transactions. These would fail anyway but would
1949
    // cause log spam.
1950
0
    if (wtx.IsCoinBase()) return false;
1951
    // Don't try to submit conflicted or confirmed transactions.
1952
0
    if (GetTxDepthInMainChain(wtx) != 0) return false;
1953
1954
    // Submit transaction to mempool for relay
1955
0
    WalletLogPrintf("Submitting wtx %s to mempool for relay\n", wtx.GetHash().ToString());
1956
    // We must set TxStateInMempool here. Even though it will also be set later by the
1957
    // entered-mempool callback, if we did not there would be a race where a
1958
    // user could call sendmoney in a loop and hit spurious out of funds errors
1959
    // because we think that this newly generated transaction's change is
1960
    // unavailable as we're not yet aware that it is in the mempool.
1961
    //
1962
    // If broadcast fails for any reason, trying to set wtx.m_state here would be incorrect.
1963
    // If transaction was previously in the mempool, it should be updated when
1964
    // TransactionRemovedFromMempool fires.
1965
0
    bool ret = chain().broadcastTransaction(wtx.tx, m_default_max_tx_fee, relay, err_string);
1966
0
    if (ret) wtx.m_state = TxStateInMempool{};
1967
0
    return ret;
1968
0
}
1969
1970
std::set<uint256> CWallet::GetTxConflicts(const CWalletTx& wtx) const
1971
0
{
1972
0
    AssertLockHeld(cs_wallet);
1973
1974
0
    const uint256 myHash{wtx.GetHash()};
1975
0
    std::set<uint256> result{GetConflicts(myHash)};
1976
0
    result.erase(myHash);
1977
0
    return result;
1978
0
}
1979
1980
bool CWallet::ShouldResend() const
1981
0
{
1982
    // Don't attempt to resubmit if the wallet is configured to not broadcast
1983
0
    if (!fBroadcastTransactions) return false;
1984
1985
    // During reindex, importing and IBD, old wallet transactions become
1986
    // unconfirmed. Don't resend them as that would spam other nodes.
1987
    // We only allow forcing mempool submission when not relaying to avoid this spam.
1988
0
    if (!chain().isReadyToBroadcast()) return false;
1989
1990
    // Do this infrequently and randomly to avoid giving away
1991
    // that these are our transactions.
1992
0
    if (NodeClock::now() < m_next_resend) return false;
1993
1994
0
    return true;
1995
0
}
1996
1997
0
NodeClock::time_point CWallet::GetDefaultNextResend() { return FastRandomContext{}.rand_uniform_delay(NodeClock::now() + 12h, 24h); }
1998
1999
// Resubmit transactions from the wallet to the mempool, optionally asking the
2000
// mempool to relay them. On startup, we will do this for all unconfirmed
2001
// transactions but will not ask the mempool to relay them. We do this on startup
2002
// to ensure that our own mempool is aware of our transactions. There
2003
// is a privacy side effect here as not broadcasting on startup also means that we won't
2004
// inform the world of our wallet's state, particularly if the wallet (or node) is not
2005
// yet synced.
2006
//
2007
// Otherwise this function is called periodically in order to relay our unconfirmed txs.
2008
// We do this on a random timer to slightly obfuscate which transactions
2009
// come from our wallet.
2010
//
2011
// TODO: Ideally, we'd only resend transactions that we think should have been
2012
// mined in the most recent block. Any transaction that wasn't in the top
2013
// blockweight of transactions in the mempool shouldn't have been mined,
2014
// and so is probably just sitting in the mempool waiting to be confirmed.
2015
// Rebroadcasting does nothing to speed up confirmation and only damages
2016
// privacy.
2017
//
2018
// The `force` option results in all unconfirmed transactions being submitted to
2019
// the mempool. This does not necessarily result in those transactions being relayed,
2020
// that depends on the `relay` option. Periodic rebroadcast uses the pattern
2021
// relay=true force=false, while loading into the mempool
2022
// (on start, or after import) uses relay=false force=true.
2023
void CWallet::ResubmitWalletTransactions(bool relay, bool force)
2024
0
{
2025
    // Don't attempt to resubmit if the wallet is configured to not broadcast,
2026
    // even if forcing.
2027
0
    if (!fBroadcastTransactions) return;
2028
2029
0
    int submitted_tx_count = 0;
2030
2031
0
    { // cs_wallet scope
2032
0
        LOCK(cs_wallet);
2033
2034
        // First filter for the transactions we want to rebroadcast.
2035
        // We use a set with WalletTxOrderComparator so that rebroadcasting occurs in insertion order
2036
0
        std::set<CWalletTx*, WalletTxOrderComparator> to_submit;
2037
0
        for (auto& [txid, wtx] : mapWallet) {
2038
            // Only rebroadcast unconfirmed txs
2039
0
            if (!wtx.isUnconfirmed()) continue;
2040
2041
            // Attempt to rebroadcast all txes more than 5 minutes older than
2042
            // the last block, or all txs if forcing.
2043
0
            if (!force && wtx.nTimeReceived > m_best_block_time - 5 * 60) continue;
2044
0
            to_submit.insert(&wtx);
2045
0
        }
2046
        // Now try submitting the transactions to the memory pool and (optionally) relay them.
2047
0
        for (auto wtx : to_submit) {
2048
0
            std::string unused_err_string;
2049
0
            if (SubmitTxMemoryPoolAndRelay(*wtx, unused_err_string, relay)) ++submitted_tx_count;
2050
0
        }
2051
0
    } // cs_wallet
2052
2053
0
    if (submitted_tx_count > 0) {
2054
0
        WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count);
2055
0
    }
2056
0
}
2057
2058
/** @} */ // end of mapWallet
2059
2060
void MaybeResendWalletTxs(WalletContext& context)
2061
0
{
2062
0
    for (const std::shared_ptr<CWallet>& pwallet : GetWallets(context)) {
2063
0
        if (!pwallet->ShouldResend()) continue;
2064
0
        pwallet->ResubmitWalletTransactions(/*relay=*/true, /*force=*/false);
2065
0
        pwallet->SetNextResend();
2066
0
    }
2067
0
}
2068
2069
2070
bool CWallet::SignTransaction(CMutableTransaction& tx) const
2071
0
{
2072
0
    AssertLockHeld(cs_wallet);
2073
2074
    // Build coins map
2075
0
    std::map<COutPoint, Coin> coins;
2076
0
    for (auto& input : tx.vin) {
2077
0
        const auto mi = mapWallet.find(input.prevout.hash);
2078
0
        if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) {
2079
0
            return false;
2080
0
        }
2081
0
        const CWalletTx& wtx = mi->second;
2082
0
        int prev_height = wtx.state<TxStateConfirmed>() ? wtx.state<TxStateConfirmed>()->confirmed_block_height : 0;
2083
0
        coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], prev_height, wtx.IsCoinBase());
2084
0
    }
2085
0
    std::map<int, bilingual_str> input_errors;
2086
0
    return SignTransaction(tx, coins, SIGHASH_DEFAULT, input_errors);
2087
0
}
2088
2089
bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const
2090
0
{
2091
    // Try to sign with all ScriptPubKeyMans
2092
0
    for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2093
        // spk_man->SignTransaction will return true if the transaction is complete,
2094
        // so we can exit early and return true if that happens
2095
0
        if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) {
2096
0
            return true;
2097
0
        }
2098
0
    }
2099
2100
    // At this point, one input was not fully signed otherwise we would have exited already
2101
0
    return false;
2102
0
}
2103
2104
std::optional<PSBTError> CWallet::FillPSBT(PartiallySignedTransaction& psbtx, bool& complete, int sighash_type, bool sign, bool bip32derivs, size_t * n_signed, bool finalize) const
2105
0
{
2106
0
    if (n_signed) {
2107
0
        *n_signed = 0;
2108
0
    }
2109
0
    LOCK(cs_wallet);
2110
    // Get all of the previous transactions
2111
0
    for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
2112
0
        const CTxIn& txin = psbtx.tx->vin[i];
2113
0
        PSBTInput& input = psbtx.inputs.at(i);
2114
2115
0
        if (PSBTInputSigned(input)) {
2116
0
            continue;
2117
0
        }
2118
2119
        // If we have no utxo, grab it from the wallet.
2120
0
        if (!input.non_witness_utxo) {
2121
0
            const uint256& txhash = txin.prevout.hash;
2122
0
            const auto it = mapWallet.find(txhash);
2123
0
            if (it != mapWallet.end()) {
2124
0
                const CWalletTx& wtx = it->second;
2125
                // We only need the non_witness_utxo, which is a superset of the witness_utxo.
2126
                //   The signing code will switch to the smaller witness_utxo if this is ok.
2127
0
                input.non_witness_utxo = wtx.tx;
2128
0
            }
2129
0
        }
2130
0
    }
2131
2132
0
    const PrecomputedTransactionData txdata = PrecomputePSBTData(psbtx);
2133
2134
    // Fill in information from ScriptPubKeyMans
2135
0
    for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2136
0
        int n_signed_this_spkm = 0;
2137
0
        const auto error{spk_man->FillPSBT(psbtx, txdata, sighash_type, sign, bip32derivs, &n_signed_this_spkm, finalize)};
2138
0
        if (error) {
2139
0
            return error;
2140
0
        }
2141
2142
0
        if (n_signed) {
2143
0
            (*n_signed) += n_signed_this_spkm;
2144
0
        }
2145
0
    }
2146
2147
0
    RemoveUnnecessaryTransactions(psbtx, sighash_type);
2148
2149
    // Complete if every input is now signed
2150
0
    complete = true;
2151
0
    for (size_t i = 0; i < psbtx.inputs.size(); ++i) {
2152
0
        complete &= PSBTInputSignedAndVerified(psbtx, i, &txdata);
2153
0
    }
2154
2155
0
    return {};
2156
0
}
2157
2158
SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const
2159
0
{
2160
0
    SignatureData sigdata;
2161
0
    CScript script_pub_key = GetScriptForDestination(pkhash);
2162
0
    for (const auto& spk_man_pair : m_spk_managers) {
2163
0
        if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
2164
0
            LOCK(cs_wallet);  // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
2165
0
            return spk_man_pair.second->SignMessage(message, pkhash, str_sig);
2166
0
        }
2167
0
    }
2168
0
    return SigningResult::PRIVATE_KEY_NOT_AVAILABLE;
2169
0
}
2170
2171
OutputType CWallet::TransactionChangeType(const std::optional<OutputType>& change_type, const std::vector<CRecipient>& vecSend) const
2172
0
{
2173
    // If -changetype is specified, always use that change type.
2174
0
    if (change_type) {
2175
0
        return *change_type;
2176
0
    }
2177
2178
    // if m_default_address_type is legacy, use legacy address as change.
2179
0
    if (m_default_address_type == OutputType::LEGACY) {
2180
0
        return OutputType::LEGACY;
2181
0
    }
2182
2183
0
    bool any_tr{false};
2184
0
    bool any_wpkh{false};
2185
0
    bool any_sh{false};
2186
0
    bool any_pkh{false};
2187
2188
0
    for (const auto& recipient : vecSend) {
2189
0
        if (std::get_if<WitnessV1Taproot>(&recipient.dest)) {
2190
0
            any_tr = true;
2191
0
        } else if (std::get_if<WitnessV0KeyHash>(&recipient.dest)) {
2192
0
            any_wpkh = true;
2193
0
        } else if (std::get_if<ScriptHash>(&recipient.dest)) {
2194
0
            any_sh = true;
2195
0
        } else if (std::get_if<PKHash>(&recipient.dest)) {
2196
0
            any_pkh = true;
2197
0
        }
2198
0
    }
2199
2200
0
    const bool has_bech32m_spkman(GetScriptPubKeyMan(OutputType::BECH32M, /*internal=*/true));
2201
0
    if (has_bech32m_spkman && any_tr) {
2202
        // Currently tr is the only type supported by the BECH32M spkman
2203
0
        return OutputType::BECH32M;
2204
0
    }
2205
0
    const bool has_bech32_spkman(GetScriptPubKeyMan(OutputType::BECH32, /*internal=*/true));
2206
0
    if (has_bech32_spkman && any_wpkh) {
2207
        // Currently wpkh is the only type supported by the BECH32 spkman
2208
0
        return OutputType::BECH32;
2209
0
    }
2210
0
    const bool has_p2sh_segwit_spkman(GetScriptPubKeyMan(OutputType::P2SH_SEGWIT, /*internal=*/true));
2211
0
    if (has_p2sh_segwit_spkman && any_sh) {
2212
        // Currently sh_wpkh is the only type supported by the P2SH_SEGWIT spkman
2213
        // As of 2021 about 80% of all SH are wrapping WPKH, so use that
2214
0
        return OutputType::P2SH_SEGWIT;
2215
0
    }
2216
0
    const bool has_legacy_spkman(GetScriptPubKeyMan(OutputType::LEGACY, /*internal=*/true));
2217
0
    if (has_legacy_spkman && any_pkh) {
2218
        // Currently pkh is the only type supported by the LEGACY spkman
2219
0
        return OutputType::LEGACY;
2220
0
    }
2221
2222
0
    if (has_bech32m_spkman) {
2223
0
        return OutputType::BECH32M;
2224
0
    }
2225
0
    if (has_bech32_spkman) {
2226
0
        return OutputType::BECH32;
2227
0
    }
2228
    // else use m_default_address_type for change
2229
0
    return m_default_address_type;
2230
0
}
2231
2232
void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm)
2233
0
{
2234
0
    LOCK(cs_wallet);
2235
0
    WalletLogPrintf("CommitTransaction:\n%s\n", util::RemoveSuffixView(tx->ToString(), "\n"));
2236
2237
    // Add tx to wallet, because if it has change it's also ours,
2238
    // otherwise just for transaction history.
2239
0
    CWalletTx* wtx = AddToWallet(tx, TxStateInactive{}, [&](CWalletTx& wtx, bool new_tx) {
2240
0
        CHECK_NONFATAL(wtx.mapValue.empty());
2241
0
        CHECK_NONFATAL(wtx.vOrderForm.empty());
2242
0
        wtx.mapValue = std::move(mapValue);
2243
0
        wtx.vOrderForm = std::move(orderForm);
2244
0
        wtx.fTimeReceivedIsTxTime = true;
2245
0
        wtx.fFromMe = true;
2246
0
        return true;
2247
0
    });
2248
2249
    // wtx can only be null if the db write failed.
2250
0
    if (!wtx) {
2251
0
        throw std::runtime_error(std::string(__func__) + ": Wallet db error, transaction commit failed");
2252
0
    }
2253
2254
    // Notify that old coins are spent
2255
0
    for (const CTxIn& txin : tx->vin) {
2256
0
        CWalletTx &coin = mapWallet.at(txin.prevout.hash);
2257
0
        coin.MarkDirty();
2258
0
        NotifyTransactionChanged(coin.GetHash(), CT_UPDATED);
2259
0
    }
2260
2261
0
    if (!fBroadcastTransactions) {
2262
        // Don't submit tx to the mempool
2263
0
        return;
2264
0
    }
2265
2266
0
    std::string err_string;
2267
0
    if (!SubmitTxMemoryPoolAndRelay(*wtx, err_string, true)) {
2268
0
        WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string);
2269
        // TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure.
2270
0
    }
2271
0
}
2272
2273
DBErrors CWallet::LoadWallet()
2274
0
{
2275
0
    LOCK(cs_wallet);
2276
2277
0
    Assert(m_spk_managers.empty());
2278
0
    Assert(m_wallet_flags == 0);
2279
0
    DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this);
2280
0
    if (nLoadWalletRet == DBErrors::NEED_REWRITE)
2281
0
    {
2282
0
        if (GetDatabase().Rewrite("\x04pool"))
2283
0
        {
2284
0
            for (const auto& spk_man_pair : m_spk_managers) {
2285
0
                spk_man_pair.second->RewriteDB();
2286
0
            }
2287
0
        }
2288
0
    }
2289
2290
0
    if (m_spk_managers.empty()) {
2291
0
        assert(m_external_spk_managers.empty());
2292
0
        assert(m_internal_spk_managers.empty());
2293
0
    }
2294
2295
0
    return nLoadWalletRet;
2296
0
}
2297
2298
util::Result<void> CWallet::RemoveTxs(std::vector<uint256>& txs_to_remove)
2299
0
{
2300
0
    AssertLockHeld(cs_wallet);
2301
0
    bilingual_str str_err;  // future: make RunWithinTxn return a util::Result
2302
0
    bool was_txn_committed = RunWithinTxn(GetDatabase(), /*process_desc=*/"remove transactions", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
2303
0
        util::Result<void> result{RemoveTxs(batch, txs_to_remove)};
2304
0
        if (!result) str_err = util::ErrorString(result);
2305
0
        return result.has_value();
2306
0
    });
2307
0
    if (!str_err.empty()) return util::Error{str_err};
2308
0
    if (!was_txn_committed) return util::Error{_("Error starting/committing db txn for wallet transactions removal process")};
2309
0
    return {}; // all good
2310
0
}
2311
2312
util::Result<void> CWallet::RemoveTxs(WalletBatch& batch, std::vector<uint256>& txs_to_remove)
2313
0
{
2314
0
    AssertLockHeld(cs_wallet);
2315
0
    if (!batch.HasActiveTxn()) return util::Error{strprintf(_("The transactions removal process can only be executed within a db txn"))};
2316
2317
    // Check for transaction existence and remove entries from disk
2318
0
    using TxIterator = std::unordered_map<uint256, CWalletTx, SaltedTxidHasher>::const_iterator;
2319
0
    std::vector<TxIterator> erased_txs;
2320
0
    bilingual_str str_err;
2321
0
    for (const uint256& hash : txs_to_remove) {
2322
0
        auto it_wtx = mapWallet.find(hash);
2323
0
        if (it_wtx == mapWallet.end()) {
2324
0
            return util::Error{strprintf(_("Transaction %s does not belong to this wallet"), hash.GetHex())};
2325
0
        }
2326
0
        if (!batch.EraseTx(hash)) {
2327
0
            return util::Error{strprintf(_("Failure removing transaction: %s"), hash.GetHex())};
2328
0
        }
2329
0
        erased_txs.emplace_back(it_wtx);
2330
0
    }
2331
2332
    // Register callback to update the memory state only when the db txn is actually dumped to disk
2333
0
    batch.RegisterTxnListener({.on_commit=[&, erased_txs]() EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
2334
        // Update the in-memory state and notify upper layers about the removals
2335
0
        for (const auto& it : erased_txs) {
2336
0
            const uint256 hash{it->first};
2337
0
            wtxOrdered.erase(it->second.m_it_wtxOrdered);
2338
0
            for (const auto& txin : it->second.tx->vin)
2339
0
                mapTxSpends.erase(txin.prevout);
2340
0
            mapWallet.erase(it);
2341
0
            NotifyTransactionChanged(hash, CT_DELETED);
2342
0
        }
2343
2344
0
        MarkDirty();
2345
0
    }, .on_abort={}});
2346
2347
0
    return {};
2348
0
}
2349
2350
bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& new_purpose)
2351
0
{
2352
0
    bool fUpdated = false;
2353
0
    bool is_mine;
2354
0
    std::optional<AddressPurpose> purpose;
2355
0
    {
2356
0
        LOCK(cs_wallet);
2357
0
        std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address);
2358
0
        fUpdated = mi != m_address_book.end() && !mi->second.IsChange();
2359
2360
0
        CAddressBookData& record = mi != m_address_book.end() ? mi->second : m_address_book[address];
2361
0
        record.SetLabel(strName);
2362
0
        is_mine = IsMine(address) != ISMINE_NO;
2363
0
        if (new_purpose) { /* update purpose only if requested */
2364
0
            record.purpose = new_purpose;
2365
0
        }
2366
0
        purpose = record.purpose;
2367
0
    }
2368
2369
0
    const std::string& encoded_dest = EncodeDestination(address);
2370
0
    if (new_purpose && !batch.WritePurpose(encoded_dest, PurposeToString(*new_purpose))) {
2371
0
        WalletLogPrintf("Error: fail to write address book 'purpose' entry\n");
2372
0
        return false;
2373
0
    }
2374
0
    if (!batch.WriteName(encoded_dest, strName)) {
2375
0
        WalletLogPrintf("Error: fail to write address book 'name' entry\n");
2376
0
        return false;
2377
0
    }
2378
2379
    // In very old wallets, address purpose may not be recorded so we derive it from IsMine
2380
0
    NotifyAddressBookChanged(address, strName, is_mine,
2381
0
                             purpose.value_or(is_mine ? AddressPurpose::RECEIVE : AddressPurpose::SEND),
2382
0
                             (fUpdated ? CT_UPDATED : CT_NEW));
2383
0
    return true;
2384
0
}
2385
2386
bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& purpose)
2387
0
{
2388
0
    WalletBatch batch(GetDatabase());
2389
0
    return SetAddressBookWithDB(batch, address, strName, purpose);
2390
0
}
2391
2392
bool CWallet::DelAddressBook(const CTxDestination& address)
2393
0
{
2394
0
    return RunWithinTxn(GetDatabase(), /*process_desc=*/"address book entry removal", [&](WalletBatch& batch){
2395
0
        return DelAddressBookWithDB(batch, address);
2396
0
    });
2397
0
}
2398
2399
bool CWallet::DelAddressBookWithDB(WalletBatch& batch, const CTxDestination& address)
2400
0
{
2401
0
    const std::string& dest = EncodeDestination(address);
2402
0
    {
2403
0
        LOCK(cs_wallet);
2404
        // If we want to delete receiving addresses, we should avoid calling EraseAddressData because it will delete the previously_spent value. Could instead just erase the label so it becomes a change address, and keep the data.
2405
        // NOTE: This isn't a problem for sending addresses because they don't have any data that needs to be kept.
2406
        // When adding new address data, it should be considered here whether to retain or delete it.
2407
0
        if (IsMine(address)) {
2408
0
            WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, CLIENT_BUGREPORT);
2409
0
            return false;
2410
0
        }
2411
        // Delete data rows associated with this address
2412
0
        if (!batch.EraseAddressData(address)) {
2413
0
            WalletLogPrintf("Error: cannot erase address book entry data\n");
2414
0
            return false;
2415
0
        }
2416
2417
        // Delete purpose entry
2418
0
        if (!batch.ErasePurpose(dest)) {
2419
0
            WalletLogPrintf("Error: cannot erase address book entry purpose\n");
2420
0
            return false;
2421
0
        }
2422
2423
        // Delete name entry
2424
0
        if (!batch.EraseName(dest)) {
2425
0
            WalletLogPrintf("Error: cannot erase address book entry name\n");
2426
0
            return false;
2427
0
        }
2428
2429
        // finally, remove it from the map
2430
0
        m_address_book.erase(address);
2431
0
    }
2432
2433
    // All good, signal changes
2434
0
    NotifyAddressBookChanged(address, "", /*is_mine=*/false, AddressPurpose::SEND, CT_DELETED);
2435
0
    return true;
2436
0
}
2437
2438
size_t CWallet::KeypoolCountExternalKeys() const
2439
0
{
2440
0
    AssertLockHeld(cs_wallet);
2441
2442
0
    unsigned int count = 0;
2443
0
    for (auto spk_man : m_external_spk_managers) {
2444
0
        count += spk_man.second->GetKeyPoolSize();
2445
0
    }
2446
2447
0
    return count;
2448
0
}
2449
2450
unsigned int CWallet::GetKeyPoolSize() const
2451
0
{
2452
0
    AssertLockHeld(cs_wallet);
2453
2454
0
    unsigned int count = 0;
2455
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
2456
0
        count += spk_man->GetKeyPoolSize();
2457
0
    }
2458
0
    return count;
2459
0
}
2460
2461
bool CWallet::TopUpKeyPool(unsigned int kpSize)
2462
0
{
2463
0
    LOCK(cs_wallet);
2464
0
    bool res = true;
2465
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
2466
0
        res &= spk_man->TopUp(kpSize);
2467
0
    }
2468
0
    return res;
2469
0
}
2470
2471
util::Result<CTxDestination> CWallet::GetNewDestination(const OutputType type, const std::string label)
2472
0
{
2473
0
    LOCK(cs_wallet);
2474
0
    auto spk_man = GetScriptPubKeyMan(type, /*internal=*/false);
2475
0
    if (!spk_man) {
2476
0
        return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2477
0
    }
2478
2479
0
    auto op_dest = spk_man->GetNewDestination(type);
2480
0
    if (op_dest) {
2481
0
        SetAddressBook(*op_dest, label, AddressPurpose::RECEIVE);
2482
0
    }
2483
2484
0
    return op_dest;
2485
0
}
2486
2487
util::Result<CTxDestination> CWallet::GetNewChangeDestination(const OutputType type)
2488
0
{
2489
0
    LOCK(cs_wallet);
2490
2491
0
    ReserveDestination reservedest(this, type);
2492
0
    auto op_dest = reservedest.GetReservedDestination(true);
2493
0
    if (op_dest) reservedest.KeepDestination();
2494
2495
0
    return op_dest;
2496
0
}
2497
2498
std::optional<int64_t> CWallet::GetOldestKeyPoolTime() const
2499
0
{
2500
0
    LOCK(cs_wallet);
2501
0
    if (m_spk_managers.empty()) {
2502
0
        return std::nullopt;
2503
0
    }
2504
2505
0
    std::optional<int64_t> oldest_key{std::numeric_limits<int64_t>::max()};
2506
0
    for (const auto& spk_man_pair : m_spk_managers) {
2507
0
        oldest_key = std::min(oldest_key, spk_man_pair.second->GetOldestKeyPoolTime());
2508
0
    }
2509
0
    return oldest_key;
2510
0
}
2511
2512
0
void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) {
2513
0
    for (auto& entry : mapWallet) {
2514
0
        CWalletTx& wtx = entry.second;
2515
0
        if (wtx.m_is_cache_empty) continue;
2516
0
        for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
2517
0
            CTxDestination dst;
2518
0
            if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.count(dst)) {
2519
0
                wtx.MarkDirty();
2520
0
                break;
2521
0
            }
2522
0
        }
2523
0
    }
2524
0
}
2525
2526
void CWallet::ForEachAddrBookEntry(const ListAddrBookFunc& func) const
2527
0
{
2528
0
    AssertLockHeld(cs_wallet);
2529
0
    for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book) {
2530
0
        const auto& entry = item.second;
2531
0
        func(item.first, entry.GetLabel(), entry.IsChange(), entry.purpose);
2532
0
    }
2533
0
}
2534
2535
std::vector<CTxDestination> CWallet::ListAddrBookAddresses(const std::optional<AddrBookFilter>& _filter) const
2536
0
{
2537
0
    AssertLockHeld(cs_wallet);
2538
0
    std::vector<CTxDestination> result;
2539
0
    AddrBookFilter filter = _filter ? *_filter : AddrBookFilter();
2540
0
    ForEachAddrBookEntry([&result, &filter](const CTxDestination& dest, const std::string& label, bool is_change, const std::optional<AddressPurpose>& purpose) {
2541
        // Filter by change
2542
0
        if (filter.ignore_change && is_change) return;
2543
        // Filter by label
2544
0
        if (filter.m_op_label && *filter.m_op_label != label) return;
2545
        // All good
2546
0
        result.emplace_back(dest);
2547
0
    });
2548
0
    return result;
2549
0
}
2550
2551
std::set<std::string> CWallet::ListAddrBookLabels(const std::optional<AddressPurpose> purpose) const
2552
0
{
2553
0
    AssertLockHeld(cs_wallet);
2554
0
    std::set<std::string> label_set;
2555
0
    ForEachAddrBookEntry([&](const CTxDestination& _dest, const std::string& _label,
2556
0
                             bool _is_change, const std::optional<AddressPurpose>& _purpose) {
2557
0
        if (_is_change) return;
2558
0
        if (!purpose || purpose == _purpose) {
2559
0
            label_set.insert(_label);
2560
0
        }
2561
0
    });
2562
0
    return label_set;
2563
0
}
2564
2565
util::Result<CTxDestination> ReserveDestination::GetReservedDestination(bool internal)
2566
0
{
2567
0
    m_spk_man = pwallet->GetScriptPubKeyMan(type, internal);
2568
0
    if (!m_spk_man) {
2569
0
        return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2570
0
    }
2571
2572
0
    if (nIndex == -1) {
2573
0
        int64_t index;
2574
0
        auto op_address = m_spk_man->GetReservedDestination(type, internal, index);
2575
0
        if (!op_address) return op_address;
2576
0
        nIndex = index;
2577
0
        address = *op_address;
2578
0
    }
2579
0
    return address;
2580
0
}
2581
2582
void ReserveDestination::KeepDestination()
2583
0
{
2584
0
    if (nIndex != -1) {
2585
0
        m_spk_man->KeepDestination(nIndex, type);
2586
0
    }
2587
0
    nIndex = -1;
2588
0
    address = CNoDestination();
2589
0
}
2590
2591
void ReserveDestination::ReturnDestination()
2592
0
{
2593
0
    if (nIndex != -1) {
2594
0
        m_spk_man->ReturnDestination(nIndex, fInternal, address);
2595
0
    }
2596
0
    nIndex = -1;
2597
0
    address = CNoDestination();
2598
0
}
2599
2600
util::Result<void> CWallet::DisplayAddress(const CTxDestination& dest)
2601
0
{
2602
0
    CScript scriptPubKey = GetScriptForDestination(dest);
2603
0
    for (const auto& spk_man : GetScriptPubKeyMans(scriptPubKey)) {
2604
0
        auto signer_spk_man = dynamic_cast<ExternalSignerScriptPubKeyMan *>(spk_man);
2605
0
        if (signer_spk_man == nullptr) {
2606
0
            continue;
2607
0
        }
2608
0
        ExternalSigner signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
2609
0
        return signer_spk_man->DisplayAddress(dest, signer);
2610
0
    }
2611
0
    return util::Error{_("There is no ScriptPubKeyManager for this address")};
2612
0
}
2613
2614
bool CWallet::LockCoin(const COutPoint& output, WalletBatch* batch)
2615
0
{
2616
0
    AssertLockHeld(cs_wallet);
2617
0
    setLockedCoins.insert(output);
2618
0
    if (batch) {
2619
0
        return batch->WriteLockedUTXO(output);
2620
0
    }
2621
0
    return true;
2622
0
}
2623
2624
bool CWallet::UnlockCoin(const COutPoint& output, WalletBatch* batch)
2625
0
{
2626
0
    AssertLockHeld(cs_wallet);
2627
0
    bool was_locked = setLockedCoins.erase(output);
2628
0
    if (batch && was_locked) {
2629
0
        return batch->EraseLockedUTXO(output);
2630
0
    }
2631
0
    return true;
2632
0
}
2633
2634
bool CWallet::UnlockAllCoins()
2635
0
{
2636
0
    AssertLockHeld(cs_wallet);
2637
0
    bool success = true;
2638
0
    WalletBatch batch(GetDatabase());
2639
0
    for (auto it = setLockedCoins.begin(); it != setLockedCoins.end(); ++it) {
2640
0
        success &= batch.EraseLockedUTXO(*it);
2641
0
    }
2642
0
    setLockedCoins.clear();
2643
0
    return success;
2644
0
}
2645
2646
bool CWallet::IsLockedCoin(const COutPoint& output) const
2647
0
{
2648
0
    AssertLockHeld(cs_wallet);
2649
0
    return setLockedCoins.count(output) > 0;
2650
0
}
2651
2652
void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const
2653
0
{
2654
0
    AssertLockHeld(cs_wallet);
2655
0
    for (std::set<COutPoint>::iterator it = setLockedCoins.begin();
2656
0
         it != setLockedCoins.end(); it++) {
2657
0
        COutPoint outpt = (*it);
2658
0
        vOutpts.push_back(outpt);
2659
0
    }
2660
0
}
2661
2662
/**
2663
 * Compute smart timestamp for a transaction being added to the wallet.
2664
 *
2665
 * Logic:
2666
 * - If sending a transaction, assign its timestamp to the current time.
2667
 * - If receiving a transaction outside a block, assign its timestamp to the
2668
 *   current time.
2669
 * - If receiving a transaction during a rescanning process, assign all its
2670
 *   (not already known) transactions' timestamps to the block time.
2671
 * - If receiving a block with a future timestamp, assign all its (not already
2672
 *   known) transactions' timestamps to the current time.
2673
 * - If receiving a block with a past timestamp, before the most recent known
2674
 *   transaction (that we care about), assign all its (not already known)
2675
 *   transactions' timestamps to the same timestamp as that most-recent-known
2676
 *   transaction.
2677
 * - If receiving a block with a past timestamp, but after the most recent known
2678
 *   transaction, assign all its (not already known) transactions' timestamps to
2679
 *   the block time.
2680
 *
2681
 * For more information see CWalletTx::nTimeSmart,
2682
 * https://bitcointalk.org/?topic=54527, or
2683
 * https://github.com/bitcoin/bitcoin/pull/1393.
2684
 */
2685
unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const
2686
0
{
2687
0
    std::optional<uint256> block_hash;
2688
0
    if (auto* conf = wtx.state<TxStateConfirmed>()) {
2689
0
        block_hash = conf->confirmed_block_hash;
2690
0
    } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
2691
0
        block_hash = conf->conflicting_block_hash;
2692
0
    }
2693
2694
0
    unsigned int nTimeSmart = wtx.nTimeReceived;
2695
0
    if (block_hash) {
2696
0
        int64_t blocktime;
2697
0
        int64_t block_max_time;
2698
0
        if (chain().findBlock(*block_hash, FoundBlock().time(blocktime).maxTime(block_max_time))) {
2699
0
            if (rescanning_old_block) {
2700
0
                nTimeSmart = block_max_time;
2701
0
            } else {
2702
0
                int64_t latestNow = wtx.nTimeReceived;
2703
0
                int64_t latestEntry = 0;
2704
2705
                // Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future
2706
0
                int64_t latestTolerated = latestNow + 300;
2707
0
                const TxItems& txOrdered = wtxOrdered;
2708
0
                for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) {
2709
0
                    CWalletTx* const pwtx = it->second;
2710
0
                    if (pwtx == &wtx) {
2711
0
                        continue;
2712
0
                    }
2713
0
                    int64_t nSmartTime;
2714
0
                    nSmartTime = pwtx->nTimeSmart;
2715
0
                    if (!nSmartTime) {
2716
0
                        nSmartTime = pwtx->nTimeReceived;
2717
0
                    }
2718
0
                    if (nSmartTime <= latestTolerated) {
2719
0
                        latestEntry = nSmartTime;
2720
0
                        if (nSmartTime > latestNow) {
2721
0
                            latestNow = nSmartTime;
2722
0
                        }
2723
0
                        break;
2724
0
                    }
2725
0
                }
2726
2727
0
                nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow));
2728
0
            }
2729
0
        } else {
2730
0
            WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), block_hash->ToString());
2731
0
        }
2732
0
    }
2733
0
    return nTimeSmart;
2734
0
}
2735
2736
bool CWallet::SetAddressPreviouslySpent(WalletBatch& batch, const CTxDestination& dest, bool used)
2737
0
{
2738
0
    if (std::get_if<CNoDestination>(&dest))
2739
0
        return false;
2740
2741
0
    if (!used) {
2742
0
        if (auto* data{common::FindKey(m_address_book, dest)}) data->previously_spent = false;
2743
0
        return batch.WriteAddressPreviouslySpent(dest, false);
2744
0
    }
2745
2746
0
    LoadAddressPreviouslySpent(dest);
2747
0
    return batch.WriteAddressPreviouslySpent(dest, true);
2748
0
}
2749
2750
void CWallet::LoadAddressPreviouslySpent(const CTxDestination& dest)
2751
0
{
2752
0
    m_address_book[dest].previously_spent = true;
2753
0
}
2754
2755
void CWallet::LoadAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& request)
2756
0
{
2757
0
    m_address_book[dest].receive_requests[id] = request;
2758
0
}
2759
2760
bool CWallet::IsAddressPreviouslySpent(const CTxDestination& dest) const
2761
0
{
2762
0
    if (auto* data{common::FindKey(m_address_book, dest)}) return data->previously_spent;
2763
0
    return false;
2764
0
}
2765
2766
std::vector<std::string> CWallet::GetAddressReceiveRequests() const
2767
0
{
2768
0
    std::vector<std::string> values;
2769
0
    for (const auto& [dest, entry] : m_address_book) {
2770
0
        for (const auto& [id, request] : entry.receive_requests) {
2771
0
            values.emplace_back(request);
2772
0
        }
2773
0
    }
2774
0
    return values;
2775
0
}
2776
2777
bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value)
2778
0
{
2779
0
    if (!batch.WriteAddressReceiveRequest(dest, id, value)) return false;
2780
0
    m_address_book[dest].receive_requests[id] = value;
2781
0
    return true;
2782
0
}
2783
2784
bool CWallet::EraseAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id)
2785
0
{
2786
0
    if (!batch.EraseAddressReceiveRequest(dest, id)) return false;
2787
0
    m_address_book[dest].receive_requests.erase(id);
2788
0
    return true;
2789
0
}
2790
2791
static util::Result<fs::path> GetWalletPath(const std::string& name)
2792
0
{
2793
    // Do some checking on wallet path. It should be either a:
2794
    //
2795
    // 1. Path where a directory can be created.
2796
    // 2. Path to an existing directory.
2797
    // 3. Path to a symlink to a directory.
2798
    // 4. For backwards compatibility, the name of a data file in -walletdir.
2799
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(name));
2800
0
    fs::file_type path_type = fs::symlink_status(wallet_path).type();
2801
0
    if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory ||
2802
0
          (path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) ||
2803
0
          (path_type == fs::file_type::regular && fs::PathFromString(name).filename() == fs::PathFromString(name)))) {
2804
0
        return util::Error{Untranslated(strprintf(
2805
0
              "Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and "
2806
0
              "database/log.?????????? files can be stored, a location where such a directory could be created, "
2807
0
              "or (for backwards compatibility) the name of an existing data file in -walletdir (%s)",
2808
0
              name, fs::quoted(fs::PathToString(GetWalletDir()))))};
2809
0
    }
2810
0
    return wallet_path;
2811
0
}
2812
2813
std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string)
2814
0
{
2815
0
    const auto& wallet_path = GetWalletPath(name);
2816
0
    if (!wallet_path) {
2817
0
        error_string = util::ErrorString(wallet_path);
2818
0
        status = DatabaseStatus::FAILED_BAD_PATH;
2819
0
        return nullptr;
2820
0
    }
2821
0
    return MakeDatabase(*wallet_path, options, status, error_string);
2822
0
}
2823
2824
std::shared_ptr<CWallet> CWallet::Create(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings)
2825
0
{
2826
0
    interfaces::Chain* chain = context.chain;
2827
0
    ArgsManager& args = *Assert(context.args);
2828
0
    const std::string& walletFile = database->Filename();
2829
2830
0
    const auto start{SteadyClock::now()};
2831
    // TODO: Can't use std::make_shared because we need a custom deleter but
2832
    // should be possible to use std::allocate_shared.
2833
0
    std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
2834
0
    walletInstance->m_keypool_size = std::max(args.GetIntArg("-keypool", DEFAULT_KEYPOOL_SIZE), int64_t{1});
2835
0
    walletInstance->m_notify_tx_changed_script = args.GetArg("-walletnotify", "");
2836
2837
    // Load wallet
2838
0
    bool rescan_required = false;
2839
0
    DBErrors nLoadWalletRet = walletInstance->LoadWallet();
2840
0
    if (nLoadWalletRet != DBErrors::LOAD_OK) {
2841
0
        if (nLoadWalletRet == DBErrors::CORRUPT) {
2842
0
            error = strprintf(_("Error loading %s: Wallet corrupted"), walletFile);
2843
0
            return nullptr;
2844
0
        }
2845
0
        else if (nLoadWalletRet == DBErrors::NONCRITICAL_ERROR)
2846
0
        {
2847
0
            warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"
2848
0
                                           " or address metadata may be missing or incorrect."),
2849
0
                walletFile));
2850
0
        }
2851
0
        else if (nLoadWalletRet == DBErrors::TOO_NEW) {
2852
0
            error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), walletFile, CLIENT_NAME);
2853
0
            return nullptr;
2854
0
        }
2855
0
        else if (nLoadWalletRet == DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED) {
2856
0
            error = strprintf(_("Error loading %s: External signer wallet being loaded without external signer support compiled"), walletFile);
2857
0
            return nullptr;
2858
0
        }
2859
0
        else if (nLoadWalletRet == DBErrors::NEED_REWRITE)
2860
0
        {
2861
0
            error = strprintf(_("Wallet needed to be rewritten: restart %s to complete"), CLIENT_NAME);
2862
0
            return nullptr;
2863
0
        } else if (nLoadWalletRet == DBErrors::NEED_RESCAN) {
2864
0
            warnings.push_back(strprintf(_("Error reading %s! Transaction data may be missing or incorrect."
2865
0
                                           " Rescanning wallet."), walletFile));
2866
0
            rescan_required = true;
2867
0
        } else if (nLoadWalletRet == DBErrors::UNKNOWN_DESCRIPTOR) {
2868
0
            error = strprintf(_("Unrecognized descriptor found. Loading wallet %s\n\n"
2869
0
                                "The wallet might had been created on a newer version.\n"
2870
0
                                "Please try running the latest software version.\n"), walletFile);
2871
0
            return nullptr;
2872
0
        } else if (nLoadWalletRet == DBErrors::UNEXPECTED_LEGACY_ENTRY) {
2873
0
            error = strprintf(_("Unexpected legacy entry in descriptor wallet found. Loading wallet %s\n\n"
2874
0
                                "The wallet might have been tampered with or created with malicious intent.\n"), walletFile);
2875
0
            return nullptr;
2876
0
        } else if (nLoadWalletRet == DBErrors::LEGACY_WALLET) {
2877
0
            error = strprintf(_("Error loading %s: Wallet is a legacy wallet. Please migrate to a descriptor wallet using the migration tool (migratewallet RPC)."), walletFile);
2878
0
            return nullptr;
2879
0
        } else {
2880
0
            error = strprintf(_("Error loading %s"), walletFile);
2881
0
            return nullptr;
2882
0
        }
2883
0
    }
2884
2885
    // This wallet is in its first run if there are no ScriptPubKeyMans and it isn't blank or no privkeys
2886
0
    const bool fFirstRun = walletInstance->m_spk_managers.empty() &&
2887
0
                     !walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) &&
2888
0
                     !walletInstance->IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET);
2889
0
    if (fFirstRun)
2890
0
    {
2891
        // ensure this wallet.dat can only be opened by clients supporting HD with chain split and expects no default key
2892
0
        walletInstance->SetMinVersion(FEATURE_LATEST);
2893
2894
0
        walletInstance->InitWalletFlags(wallet_creation_flags);
2895
2896
        // Only descriptor wallets can be created
2897
0
        assert(walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
2898
2899
0
        if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) || !(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) {
2900
0
            LOCK(walletInstance->cs_wallet);
2901
0
            if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
2902
0
                walletInstance->SetupDescriptorScriptPubKeyMans();
2903
                // SetupDescriptorScriptPubKeyMans already calls SetupGeneration for us so we don't need to call SetupGeneration separately
2904
0
            } else {
2905
                // Legacy wallets need SetupGeneration here.
2906
0
                for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
2907
0
                    if (!spk_man->SetupGeneration()) {
2908
0
                        error = _("Unable to generate initial keys");
2909
0
                        return nullptr;
2910
0
                    }
2911
0
                }
2912
0
            }
2913
0
        }
2914
2915
0
        if (chain) {
2916
0
            walletInstance->chainStateFlushed(ChainstateRole::NORMAL, chain->getTipLocator());
2917
0
        }
2918
0
    } else if (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS) {
2919
        // Make it impossible to disable private keys after creation
2920
0
        error = strprintf(_("Error loading %s: Private keys can only be disabled during creation"), walletFile);
2921
0
        return nullptr;
2922
0
    } else if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
2923
0
        for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
2924
0
            if (spk_man->HavePrivateKeys()) {
2925
0
                warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));
2926
0
                break;
2927
0
            }
2928
0
        }
2929
0
    }
2930
2931
0
    if (!args.GetArg("-addresstype", "").empty()) {
2932
0
        std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-addresstype", ""));
2933
0
        if (!parsed) {
2934
0
            error = strprintf(_("Unknown address type '%s'"), args.GetArg("-addresstype", ""));
2935
0
            return nullptr;
2936
0
        }
2937
0
        walletInstance->m_default_address_type = parsed.value();
2938
0
    }
2939
2940
0
    if (!args.GetArg("-changetype", "").empty()) {
2941
0
        std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-changetype", ""));
2942
0
        if (!parsed) {
2943
0
            error = strprintf(_("Unknown change type '%s'"), args.GetArg("-changetype", ""));
2944
0
            return nullptr;
2945
0
        }
2946
0
        walletInstance->m_default_change_type = parsed.value();
2947
0
    }
2948
2949
0
    if (const auto arg{args.GetArg("-mintxfee")}) {
2950
0
        std::optional<CAmount> min_tx_fee = ParseMoney(*arg);
2951
0
        if (!min_tx_fee) {
2952
0
            error = AmountErrMsg("mintxfee", *arg);
2953
0
            return nullptr;
2954
0
        } else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
2955
0
            warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") +
2956
0
                               _("This is the minimum transaction fee you pay on every transaction."));
2957
0
        }
2958
2959
0
        walletInstance->m_min_fee = CFeeRate{min_tx_fee.value()};
2960
0
    }
2961
2962
0
    if (const auto arg{args.GetArg("-maxapsfee")}) {
2963
0
        const std::string& max_aps_fee{*arg};
2964
0
        if (max_aps_fee == "-1") {
2965
0
            walletInstance->m_max_aps_fee = -1;
2966
0
        } else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) {
2967
0
            if (max_fee.value() > HIGH_APS_FEE) {
2968
0
                warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") +
2969
0
                                  _("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection."));
2970
0
            }
2971
0
            walletInstance->m_max_aps_fee = max_fee.value();
2972
0
        } else {
2973
0
            error = AmountErrMsg("maxapsfee", max_aps_fee);
2974
0
            return nullptr;
2975
0
        }
2976
0
    }
2977
2978
0
    if (const auto arg{args.GetArg("-fallbackfee")}) {
2979
0
        std::optional<CAmount> fallback_fee = ParseMoney(*arg);
2980
0
        if (!fallback_fee) {
2981
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-fallbackfee", *arg);
2982
0
            return nullptr;
2983
0
        } else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) {
2984
0
            warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") +
2985
0
                               _("This is the transaction fee you may pay when fee estimates are not available."));
2986
0
        }
2987
0
        walletInstance->m_fallback_fee = CFeeRate{fallback_fee.value()};
2988
0
    }
2989
2990
    // Disable fallback fee in case value was set to 0, enable if non-null value
2991
0
    walletInstance->m_allow_fallback_fee = walletInstance->m_fallback_fee.GetFeePerK() != 0;
2992
2993
0
    if (const auto arg{args.GetArg("-discardfee")}) {
2994
0
        std::optional<CAmount> discard_fee = ParseMoney(*arg);
2995
0
        if (!discard_fee) {
2996
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-discardfee", *arg);
2997
0
            return nullptr;
2998
0
        } else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) {
2999
0
            warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") +
3000
0
                               _("This is the transaction fee you may discard if change is smaller than dust at this level"));
3001
0
        }
3002
0
        walletInstance->m_discard_rate = CFeeRate{discard_fee.value()};
3003
0
    }
3004
3005
0
    if (const auto arg{args.GetArg("-paytxfee")}) {
3006
0
        warnings.push_back(_("-paytxfee is deprecated and will be fully removed in v31.0."));
3007
3008
0
        std::optional<CAmount> pay_tx_fee = ParseMoney(*arg);
3009
0
        if (!pay_tx_fee) {
3010
0
            error = AmountErrMsg("paytxfee", *arg);
3011
0
            return nullptr;
3012
0
        } else if (pay_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
3013
0
            warnings.push_back(AmountHighWarn("-paytxfee") + Untranslated(" ") +
3014
0
                               _("This is the transaction fee you will pay if you send a transaction."));
3015
0
        }
3016
3017
0
        walletInstance->m_pay_tx_fee = CFeeRate{pay_tx_fee.value(), 1000};
3018
3019
0
        if (chain && walletInstance->m_pay_tx_fee < chain->relayMinFee()) {
3020
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least %s)"),
3021
0
                "-paytxfee", *arg, chain->relayMinFee().ToString());
3022
0
            return nullptr;
3023
0
        }
3024
0
    }
3025
3026
0
    if (const auto arg{args.GetArg("-maxtxfee")}) {
3027
0
        std::optional<CAmount> max_fee = ParseMoney(*arg);
3028
0
        if (!max_fee) {
3029
0
            error = AmountErrMsg("maxtxfee", *arg);
3030
0
            return nullptr;
3031
0
        } else if (max_fee.value() > HIGH_MAX_TX_FEE) {
3032
0
            warnings.push_back(strprintf(_("%s is set very high! Fees this large could be paid on a single transaction."), "-maxtxfee"));
3033
0
        }
3034
3035
0
        if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) {
3036
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),
3037
0
                "-maxtxfee", *arg, chain->relayMinFee().ToString());
3038
0
            return nullptr;
3039
0
        }
3040
3041
0
        walletInstance->m_default_max_tx_fee = max_fee.value();
3042
0
    }
3043
3044
0
    if (const auto arg{args.GetArg("-consolidatefeerate")}) {
3045
0
        if (std::optional<CAmount> consolidate_feerate = ParseMoney(*arg)) {
3046
0
            walletInstance->m_consolidate_feerate = CFeeRate(*consolidate_feerate);
3047
0
        } else {
3048
0
            error = AmountErrMsg("consolidatefeerate", *arg);
3049
0
            return nullptr;
3050
0
        }
3051
0
    }
3052
3053
0
    if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB) {
3054
0
        warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") +
3055
0
                           _("The wallet will avoid paying less than the minimum relay fee."));
3056
0
    }
3057
3058
0
    walletInstance->m_confirm_target = args.GetIntArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET);
3059
0
    walletInstance->m_spend_zero_conf_change = args.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE);
3060
0
    walletInstance->m_signal_rbf = args.GetBoolArg("-walletrbf", DEFAULT_WALLET_RBF);
3061
3062
0
    walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3063
3064
    // Try to top up keypool. No-op if the wallet is locked.
3065
0
    walletInstance->TopUpKeyPool();
3066
3067
    // Cache the first key time
3068
0
    std::optional<int64_t> time_first_key;
3069
0
    for (auto spk_man : walletInstance->GetAllScriptPubKeyMans()) {
3070
0
        int64_t time = spk_man->GetTimeFirstKey();
3071
0
        if (!time_first_key || time < *time_first_key) time_first_key = time;
3072
0
    }
3073
0
    if (time_first_key) walletInstance->MaybeUpdateBirthTime(*time_first_key);
3074
3075
0
    if (chain && !AttachChain(walletInstance, *chain, rescan_required, error, warnings)) {
3076
0
        walletInstance->m_chain_notifications_handler.reset(); // Reset this pointer so that the wallet will actually be unloaded
3077
0
        return nullptr;
3078
0
    }
3079
3080
0
    {
3081
0
        LOCK(walletInstance->cs_wallet);
3082
0
        walletInstance->SetBroadcastTransactions(args.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST));
3083
0
        walletInstance->WalletLogPrintf("setKeyPool.size() = %u\n",      walletInstance->GetKeyPoolSize());
3084
0
        walletInstance->WalletLogPrintf("mapWallet.size() = %u\n",       walletInstance->mapWallet.size());
3085
0
        walletInstance->WalletLogPrintf("m_address_book.size() = %u\n",  walletInstance->m_address_book.size());
3086
0
    }
3087
3088
0
    return walletInstance;
3089
0
}
3090
3091
bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, const bool rescan_required, bilingual_str& error, std::vector<bilingual_str>& warnings)
3092
0
{
3093
0
    LOCK(walletInstance->cs_wallet);
3094
    // allow setting the chain if it hasn't been set already but prevent changing it
3095
0
    assert(!walletInstance->m_chain || walletInstance->m_chain == &chain);
3096
0
    walletInstance->m_chain = &chain;
3097
3098
    // Unless allowed, ensure wallet files are not reused across chains:
3099
0
    if (!gArgs.GetBoolArg("-walletcrosschain", DEFAULT_WALLETCROSSCHAIN)) {
3100
0
        WalletBatch batch(walletInstance->GetDatabase());
3101
0
        CBlockLocator locator;
3102
0
        if (batch.ReadBestBlock(locator) && locator.vHave.size() > 0 && chain.getHeight()) {
3103
            // Wallet is assumed to be from another chain, if genesis block in the active
3104
            // chain differs from the genesis block known to the wallet.
3105
0
            if (chain.getBlockHash(0) != locator.vHave.back()) {
3106
0
                error = Untranslated("Wallet files should not be reused across chains. Restart bitcoind with -walletcrosschain to override.");
3107
0
                return false;
3108
0
            }
3109
0
        }
3110
0
    }
3111
3112
    // Register wallet with validationinterface. It's done before rescan to avoid
3113
    // missing block connections during the rescan.
3114
    // Because of the wallet lock being held, block connection notifications are going to
3115
    // be pending on the validation-side until lock release. Blocks that are connected while the
3116
    // rescan is ongoing will not be processed in the rescan but with the block connected notifications,
3117
    // so the wallet will only be completeley synced after the notifications delivery.
3118
    // chainStateFlushed notifications are ignored until the rescan is finished
3119
    // so that in case of a shutdown event, the rescan will be repeated at the next start.
3120
    // This is temporary until rescan and notifications delivery are unified under same
3121
    // interface.
3122
0
    walletInstance->m_attaching_chain = true; //ignores chainStateFlushed notifications
3123
0
    walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance);
3124
3125
    // If rescan_required = true, rescan_height remains equal to 0
3126
0
    int rescan_height = 0;
3127
0
    if (!rescan_required)
3128
0
    {
3129
0
        WalletBatch batch(walletInstance->GetDatabase());
3130
0
        CBlockLocator locator;
3131
0
        if (batch.ReadBestBlock(locator)) {
3132
0
            if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) {
3133
0
                rescan_height = *fork_height;
3134
0
            }
3135
0
        }
3136
0
    }
3137
3138
0
    const std::optional<int> tip_height = chain.getHeight();
3139
0
    if (tip_height) {
3140
0
        walletInstance->m_last_block_processed = chain.getBlockHash(*tip_height);
3141
0
        walletInstance->m_last_block_processed_height = *tip_height;
3142
0
    } else {
3143
0
        walletInstance->m_last_block_processed.SetNull();
3144
0
        walletInstance->m_last_block_processed_height = -1;
3145
0
    }
3146
3147
0
    if (tip_height && *tip_height != rescan_height)
3148
0
    {
3149
        // No need to read and scan block if block was created before
3150
        // our wallet birthday (as adjusted for block time variability)
3151
0
        std::optional<int64_t> time_first_key = walletInstance->m_birth_time.load();
3152
0
        if (time_first_key) {
3153
0
            FoundBlock found = FoundBlock().height(rescan_height);
3154
0
            chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, found);
3155
0
            if (!found.found) {
3156
                // We were unable to find a block that had a time more recent than our earliest timestamp
3157
                // or a height higher than the wallet was synced to, indicating that the wallet is newer than the
3158
                // current chain tip. Skip rescanning in this case.
3159
0
                rescan_height = *tip_height;
3160
0
            }
3161
0
        }
3162
3163
        // Technically we could execute the code below in any case, but performing the
3164
        // `while` loop below can make startup very slow, so only check blocks on disk
3165
        // if necessary.
3166
0
        if (chain.havePruned() || chain.hasAssumedValidChain()) {
3167
0
            int block_height = *tip_height;
3168
0
            while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) {
3169
0
                --block_height;
3170
0
            }
3171
3172
0
            if (rescan_height != block_height) {
3173
                // We can't rescan beyond blocks we don't have data for, stop and throw an error.
3174
                // This might happen if a user uses an old wallet within a pruned node
3175
                // or if they ran -disablewallet for a longer time, then decided to re-enable
3176
                // Exit early and print an error.
3177
                // It also may happen if an assumed-valid chain is in use and therefore not
3178
                // all block data is available.
3179
                // If a block is pruned after this check, we will load the wallet,
3180
                // but fail the rescan with a generic error.
3181
3182
0
                error = chain.havePruned() ?
3183
0
                     _("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of pruned node)") :
3184
0
                     strprintf(_(
3185
0
                        "Error loading wallet. Wallet requires blocks to be downloaded, "
3186
0
                        "and software does not currently support loading wallets while "
3187
0
                        "blocks are being downloaded out of order when using assumeutxo "
3188
0
                        "snapshots. Wallet should be able to load successfully after "
3189
0
                        "node sync reaches height %s"), block_height);
3190
0
                return false;
3191
0
            }
3192
0
        }
3193
3194
0
        chain.initMessage(_("Rescanning…"));
3195
0
        walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height);
3196
3197
0
        {
3198
0
            WalletRescanReserver reserver(*walletInstance);
3199
0
            if (!reserver.reserve() || (ScanResult::SUCCESS != walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, /*max_height=*/{}, reserver, /*fUpdate=*/true, /*save_progress=*/true).status)) {
3200
0
                error = _("Failed to rescan the wallet during initialization");
3201
0
                return false;
3202
0
            }
3203
0
        }
3204
0
        walletInstance->m_attaching_chain = false;
3205
0
        walletInstance->chainStateFlushed(ChainstateRole::NORMAL, chain.getTipLocator());
3206
0
    }
3207
0
    walletInstance->m_attaching_chain = false;
3208
3209
0
    return true;
3210
0
}
3211
3212
const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const
3213
0
{
3214
0
    const auto& address_book_it = m_address_book.find(dest);
3215
0
    if (address_book_it == m_address_book.end()) return nullptr;
3216
0
    if ((!allow_change) && address_book_it->second.IsChange()) {
3217
0
        return nullptr;
3218
0
    }
3219
0
    return &address_book_it->second;
3220
0
}
3221
3222
bool CWallet::UpgradeWallet(int version, bilingual_str& error)
3223
0
{
3224
0
    int prev_version = GetVersion();
3225
0
    if (version == 0) {
3226
0
        WalletLogPrintf("Performing wallet upgrade to %i\n", FEATURE_LATEST);
3227
0
        version = FEATURE_LATEST;
3228
0
    } else {
3229
0
        WalletLogPrintf("Allowing wallet upgrade up to %i\n", version);
3230
0
    }
3231
0
    if (version < prev_version) {
3232
0
        error = strprintf(_("Cannot downgrade wallet from version %i to version %i. Wallet version unchanged."), prev_version, version);
3233
0
        return false;
3234
0
    }
3235
3236
0
    LOCK(cs_wallet);
3237
3238
    // Do not upgrade versions to any version between HD_SPLIT and FEATURE_PRE_SPLIT_KEYPOOL unless already supporting HD_SPLIT
3239
0
    if (!CanSupportFeature(FEATURE_HD_SPLIT) && version >= FEATURE_HD_SPLIT && version < FEATURE_PRE_SPLIT_KEYPOOL) {
3240
0
        error = strprintf(_("Cannot upgrade a non HD split wallet from version %i to version %i without upgrading to support pre-split keypool. Please use version %i or no version specified."), prev_version, version, FEATURE_PRE_SPLIT_KEYPOOL);
3241
0
        return false;
3242
0
    }
3243
3244
    // Permanently upgrade to the version
3245
0
    SetMinVersion(GetClosestWalletFeature(version));
3246
3247
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
3248
0
        if (!spk_man->Upgrade(prev_version, version, error)) {
3249
0
            return false;
3250
0
        }
3251
0
    }
3252
0
    return true;
3253
0
}
3254
3255
void CWallet::postInitProcess()
3256
0
{
3257
    // Add wallet transactions that aren't already in a block to mempool
3258
    // Do this here as mempool requires genesis block to be loaded
3259
0
    ResubmitWalletTransactions(/*relay=*/false, /*force=*/true);
3260
3261
    // Update wallet transactions with current mempool transactions.
3262
0
    WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
3263
0
}
3264
3265
bool CWallet::BackupWallet(const std::string& strDest) const
3266
0
{
3267
0
    if (m_chain) {
3268
0
        CBlockLocator loc;
3269
0
        WITH_LOCK(cs_wallet, chain().findBlock(m_last_block_processed, FoundBlock().locator(loc)));
3270
0
        if (!loc.IsNull()) {
3271
0
            WalletBatch batch(GetDatabase());
3272
0
            batch.WriteBestBlock(loc);
3273
0
        }
3274
0
    }
3275
0
    return GetDatabase().Backup(strDest);
3276
0
}
3277
3278
int CWallet::GetTxDepthInMainChain(const CWalletTx& wtx) const
3279
0
{
3280
0
    AssertLockHeld(cs_wallet);
3281
0
    if (auto* conf = wtx.state<TxStateConfirmed>()) {
3282
0
        assert(conf->confirmed_block_height >= 0);
3283
0
        return GetLastBlockHeight() - conf->confirmed_block_height + 1;
3284
0
    } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
3285
0
        assert(conf->conflicting_block_height >= 0);
3286
0
        return -1 * (GetLastBlockHeight() - conf->conflicting_block_height + 1);
3287
0
    } else {
3288
0
        return 0;
3289
0
    }
3290
0
}
3291
3292
int CWallet::GetTxBlocksToMaturity(const CWalletTx& wtx) const
3293
0
{
3294
0
    AssertLockHeld(cs_wallet);
3295
3296
0
    if (!wtx.IsCoinBase()) {
3297
0
        return 0;
3298
0
    }
3299
0
    int chain_depth = GetTxDepthInMainChain(wtx);
3300
0
    assert(chain_depth >= 0); // coinbase tx should not be conflicted
3301
0
    return std::max(0, (COINBASE_MATURITY+1) - chain_depth);
3302
0
}
3303
3304
bool CWallet::IsTxImmatureCoinBase(const CWalletTx& wtx) const
3305
0
{
3306
0
    AssertLockHeld(cs_wallet);
3307
3308
    // note GetBlocksToMaturity is 0 for non-coinbase tx
3309
0
    return GetTxBlocksToMaturity(wtx) > 0;
3310
0
}
3311
3312
bool CWallet::IsCrypted() const
3313
0
{
3314
0
    return HasEncryptionKeys();
3315
0
}
3316
3317
bool CWallet::IsLocked() const
3318
0
{
3319
0
    if (!IsCrypted()) {
3320
0
        return false;
3321
0
    }
3322
0
    LOCK(cs_wallet);
3323
0
    return vMasterKey.empty();
3324
0
}
3325
3326
bool CWallet::Lock()
3327
0
{
3328
0
    if (!IsCrypted())
3329
0
        return false;
3330
3331
0
    {
3332
0
        LOCK2(m_relock_mutex, cs_wallet);
3333
0
        if (!vMasterKey.empty()) {
3334
0
            memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type));
3335
0
            vMasterKey.clear();
3336
0
        }
3337
0
    }
3338
3339
0
    NotifyStatusChanged(this);
3340
0
    return true;
3341
0
}
3342
3343
bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn)
3344
0
{
3345
0
    {
3346
0
        LOCK(cs_wallet);
3347
0
        for (const auto& spk_man_pair : m_spk_managers) {
3348
0
            if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn)) {
3349
0
                return false;
3350
0
            }
3351
0
        }
3352
0
        vMasterKey = vMasterKeyIn;
3353
0
    }
3354
0
    NotifyStatusChanged(this);
3355
0
    return true;
3356
0
}
3357
3358
std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const
3359
0
{
3360
0
    std::set<ScriptPubKeyMan*> spk_mans;
3361
0
    for (bool internal : {false, true}) {
3362
0
        for (OutputType t : OUTPUT_TYPES) {
3363
0
            auto spk_man = GetScriptPubKeyMan(t, internal);
3364
0
            if (spk_man) {
3365
0
                spk_mans.insert(spk_man);
3366
0
            }
3367
0
        }
3368
0
    }
3369
0
    return spk_mans;
3370
0
}
3371
3372
bool CWallet::IsActiveScriptPubKeyMan(const ScriptPubKeyMan& spkm) const
3373
0
{
3374
0
    for (const auto& [_, ext_spkm] : m_external_spk_managers) {
3375
0
        if (ext_spkm == &spkm) return true;
3376
0
    }
3377
0
    for (const auto& [_, int_spkm] : m_internal_spk_managers) {
3378
0
        if (int_spkm == &spkm) return true;
3379
0
    }
3380
0
    return false;
3381
0
}
3382
3383
std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const
3384
0
{
3385
0
    std::set<ScriptPubKeyMan*> spk_mans;
3386
0
    for (const auto& spk_man_pair : m_spk_managers) {
3387
0
        spk_mans.insert(spk_man_pair.second.get());
3388
0
    }
3389
0
    return spk_mans;
3390
0
}
3391
3392
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const OutputType& type, bool internal) const
3393
0
{
3394
0
    const std::map<OutputType, ScriptPubKeyMan*>& spk_managers = internal ? m_internal_spk_managers : m_external_spk_managers;
3395
0
    std::map<OutputType, ScriptPubKeyMan*>::const_iterator it = spk_managers.find(type);
3396
0
    if (it == spk_managers.end()) {
3397
0
        return nullptr;
3398
0
    }
3399
0
    return it->second;
3400
0
}
3401
3402
std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script) const
3403
0
{
3404
0
    std::set<ScriptPubKeyMan*> spk_mans;
3405
3406
    // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3407
0
    const auto& it = m_cached_spks.find(script);
3408
0
    if (it != m_cached_spks.end()) {
3409
0
        spk_mans.insert(it->second.begin(), it->second.end());
3410
0
    }
3411
0
    SignatureData sigdata;
3412
0
    Assume(std::all_of(spk_mans.begin(), spk_mans.end(), [&script, &sigdata](ScriptPubKeyMan* spkm) { return spkm->CanProvide(script, sigdata); }));
3413
3414
0
    return spk_mans;
3415
0
}
3416
3417
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const
3418
0
{
3419
0
    if (m_spk_managers.count(id) > 0) {
3420
0
        return m_spk_managers.at(id).get();
3421
0
    }
3422
0
    return nullptr;
3423
0
}
3424
3425
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const
3426
0
{
3427
0
    SignatureData sigdata;
3428
0
    return GetSolvingProvider(script, sigdata);
3429
0
}
3430
3431
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const
3432
0
{
3433
    // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3434
0
    const auto& it = m_cached_spks.find(script);
3435
0
    if (it != m_cached_spks.end()) {
3436
        // All spkms for a given script must already be able to make a SigningProvider for the script, so just return the first one.
3437
0
        Assume(it->second.at(0)->CanProvide(script, sigdata));
3438
0
        return it->second.at(0)->GetSolvingProvider(script);
3439
0
    }
3440
3441
0
    return nullptr;
3442
0
}
3443
3444
std::vector<WalletDescriptor> CWallet::GetWalletDescriptors(const CScript& script) const
3445
0
{
3446
0
    std::vector<WalletDescriptor> descs;
3447
0
    for (const auto spk_man: GetScriptPubKeyMans(script)) {
3448
0
        if (const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man)) {
3449
0
            LOCK(desc_spk_man->cs_desc_man);
3450
0
            descs.push_back(desc_spk_man->GetWalletDescriptor());
3451
0
        }
3452
0
    }
3453
0
    return descs;
3454
0
}
3455
3456
LegacyDataSPKM* CWallet::GetLegacyDataSPKM() const
3457
0
{
3458
0
    if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3459
0
        return nullptr;
3460
0
    }
3461
0
    auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3462
0
    if (it == m_internal_spk_managers.end()) return nullptr;
3463
0
    return dynamic_cast<LegacyDataSPKM*>(it->second);
3464
0
}
3465
3466
void CWallet::AddScriptPubKeyMan(const uint256& id, std::unique_ptr<ScriptPubKeyMan> spkm_man)
3467
0
{
3468
    // Add spkm_man to m_spk_managers before calling any method
3469
    // that might access it.
3470
0
    const auto& spkm = m_spk_managers[id] = std::move(spkm_man);
3471
3472
    // Update birth time if needed
3473
0
    MaybeUpdateBirthTime(spkm->GetTimeFirstKey());
3474
0
}
3475
3476
LegacyDataSPKM* CWallet::GetOrCreateLegacyDataSPKM()
3477
0
{
3478
0
    SetupLegacyScriptPubKeyMan();
3479
0
    return GetLegacyDataSPKM();
3480
0
}
3481
3482
void CWallet::SetupLegacyScriptPubKeyMan()
3483
0
{
3484
0
    if (!m_internal_spk_managers.empty() || !m_external_spk_managers.empty() || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3485
0
        return;
3486
0
    }
3487
3488
0
    Assert(m_database->Format() == "bdb_ro" || m_database->Format() == "mock");
3489
0
    std::unique_ptr<ScriptPubKeyMan> spk_manager = std::make_unique<LegacyDataSPKM>(*this);
3490
3491
0
    for (const auto& type : LEGACY_OUTPUT_TYPES) {
3492
0
        m_internal_spk_managers[type] = spk_manager.get();
3493
0
        m_external_spk_managers[type] = spk_manager.get();
3494
0
    }
3495
0
    uint256 id = spk_manager->GetID();
3496
0
    AddScriptPubKeyMan(id, std::move(spk_manager));
3497
0
}
3498
3499
bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const
3500
0
{
3501
0
    LOCK(cs_wallet);
3502
0
    return cb(vMasterKey);
3503
0
}
3504
3505
bool CWallet::HasEncryptionKeys() const
3506
0
{
3507
0
    return !mapMasterKeys.empty();
3508
0
}
3509
3510
bool CWallet::HaveCryptedKeys() const
3511
0
{
3512
0
    for (const auto& spkm : GetAllScriptPubKeyMans()) {
3513
0
        if (spkm->HaveCryptedKeys()) return true;
3514
0
    }
3515
0
    return false;
3516
0
}
3517
3518
void CWallet::ConnectScriptPubKeyManNotifiers()
3519
0
{
3520
0
    for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
3521
0
        spk_man->NotifyCanGetAddressesChanged.connect(NotifyCanGetAddressesChanged);
3522
0
        spk_man->NotifyFirstKeyTimeChanged.connect(std::bind(&CWallet::MaybeUpdateBirthTime, this, std::placeholders::_2));
3523
0
    }
3524
0
}
3525
3526
DescriptorScriptPubKeyMan& CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc)
3527
0
{
3528
0
    DescriptorScriptPubKeyMan* spk_manager;
3529
0
    if (IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3530
0
        spk_manager = new ExternalSignerScriptPubKeyMan(*this, desc, m_keypool_size);
3531
0
    } else {
3532
0
        spk_manager = new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size);
3533
0
    }
3534
0
    AddScriptPubKeyMan(id, std::unique_ptr<ScriptPubKeyMan>(spk_manager));
3535
0
    return *spk_manager;
3536
0
}
3537
3538
DescriptorScriptPubKeyMan& CWallet::SetupDescriptorScriptPubKeyMan(WalletBatch& batch, const CExtKey& master_key, const OutputType& output_type, bool internal)
3539
0
{
3540
0
    AssertLockHeld(cs_wallet);
3541
0
    auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, m_keypool_size));
3542
0
    if (IsCrypted()) {
3543
0
        if (IsLocked()) {
3544
0
            throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors");
3545
0
        }
3546
0
        if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, &batch)) {
3547
0
            throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors");
3548
0
        }
3549
0
    }
3550
0
    spk_manager->SetupDescriptorGeneration(batch, master_key, output_type, internal);
3551
0
    DescriptorScriptPubKeyMan* out = spk_manager.get();
3552
0
    uint256 id = spk_manager->GetID();
3553
0
    AddScriptPubKeyMan(id, std::move(spk_manager));
3554
0
    AddActiveScriptPubKeyManWithDb(batch, id, output_type, internal);
3555
0
    return *out;
3556
0
}
3557
3558
void CWallet::SetupDescriptorScriptPubKeyMans(WalletBatch& batch, const CExtKey& master_key)
3559
0
{
3560
0
    AssertLockHeld(cs_wallet);
3561
0
    for (bool internal : {false, true}) {
3562
0
        for (OutputType t : OUTPUT_TYPES) {
3563
0
            SetupDescriptorScriptPubKeyMan(batch, master_key, t, internal);
3564
0
        }
3565
0
    }
3566
0
}
3567
3568
void CWallet::SetupOwnDescriptorScriptPubKeyMans(WalletBatch& batch)
3569
0
{
3570
0
    AssertLockHeld(cs_wallet);
3571
0
    assert(!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER));
3572
    // Make a seed
3573
0
    CKey seed_key = GenerateRandomKey();
3574
0
    CPubKey seed = seed_key.GetPubKey();
3575
0
    assert(seed_key.VerifyPubKey(seed));
3576
3577
    // Get the extended key
3578
0
    CExtKey master_key;
3579
0
    master_key.SetSeed(seed_key);
3580
3581
0
    SetupDescriptorScriptPubKeyMans(batch, master_key);
3582
0
}
3583
3584
void CWallet::SetupDescriptorScriptPubKeyMans()
3585
0
{
3586
0
    AssertLockHeld(cs_wallet);
3587
3588
0
    if (!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3589
0
        if (!RunWithinTxn(GetDatabase(), /*process_desc=*/"setup descriptors", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet){
3590
0
            SetupOwnDescriptorScriptPubKeyMans(batch);
3591
0
            return true;
3592
0
        })) throw std::runtime_error("Error: cannot process db transaction for descriptors setup");
3593
0
    } else {
3594
0
        ExternalSigner signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
3595
3596
        // TODO: add account parameter
3597
0
        int account = 0;
3598
0
        UniValue signer_res = signer.GetDescriptors(account);
3599
3600
0
        if (!signer_res.isObject()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
3601
3602
0
        WalletBatch batch(GetDatabase());
3603
0
        if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors import");
3604
3605
0
        for (bool internal : {false, true}) {
3606
0
            const UniValue& descriptor_vals = signer_res.find_value(internal ? "internal" : "receive");
3607
0
            if (!descriptor_vals.isArray()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
3608
0
            for (const UniValue& desc_val : descriptor_vals.get_array().getValues()) {
3609
0
                const std::string& desc_str = desc_val.getValStr();
3610
0
                FlatSigningProvider keys;
3611
0
                std::string desc_error;
3612
0
                auto descs = Parse(desc_str, keys, desc_error, false);
3613
0
                if (descs.empty()) {
3614
0
                    throw std::runtime_error(std::string(__func__) + ": Invalid descriptor \"" + desc_str + "\" (" + desc_error + ")");
3615
0
                }
3616
0
                auto& desc = descs.at(0);
3617
0
                if (!desc->GetOutputType()) {
3618
0
                    continue;
3619
0
                }
3620
0
                OutputType t =  *desc->GetOutputType();
3621
0
                auto spk_manager = std::unique_ptr<ExternalSignerScriptPubKeyMan>(new ExternalSignerScriptPubKeyMan(*this, m_keypool_size));
3622
0
                spk_manager->SetupDescriptor(batch, std::move(desc));
3623
0
                uint256 id = spk_manager->GetID();
3624
0
                AddScriptPubKeyMan(id, std::move(spk_manager));
3625
0
                AddActiveScriptPubKeyManWithDb(batch, id, t, internal);
3626
0
            }
3627
0
        }
3628
3629
        // Ensure imported descriptors are committed to disk
3630
0
        if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors import");
3631
0
    }
3632
0
}
3633
3634
void CWallet::AddActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3635
0
{
3636
0
    WalletBatch batch(GetDatabase());
3637
0
    return AddActiveScriptPubKeyManWithDb(batch, id, type, internal);
3638
0
}
3639
3640
void CWallet::AddActiveScriptPubKeyManWithDb(WalletBatch& batch, uint256 id, OutputType type, bool internal)
3641
0
{
3642
0
    if (!batch.WriteActiveScriptPubKeyMan(static_cast<uint8_t>(type), id, internal)) {
3643
0
        throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed");
3644
0
    }
3645
0
    LoadActiveScriptPubKeyMan(id, type, internal);
3646
0
}
3647
3648
void CWallet::LoadActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3649
0
{
3650
    // Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets.
3651
    // Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types.
3652
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3653
3654
0
    WalletLogPrintf("Setting spkMan to active: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3655
0
    auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3656
0
    auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers;
3657
0
    auto spk_man = m_spk_managers.at(id).get();
3658
0
    spk_mans[type] = spk_man;
3659
3660
0
    const auto it = spk_mans_other.find(type);
3661
0
    if (it != spk_mans_other.end() && it->second == spk_man) {
3662
0
        spk_mans_other.erase(type);
3663
0
    }
3664
3665
0
    NotifyCanGetAddressesChanged();
3666
0
}
3667
3668
void CWallet::DeactivateScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3669
0
{
3670
0
    auto spk_man = GetScriptPubKeyMan(type, internal);
3671
0
    if (spk_man != nullptr && spk_man->GetID() == id) {
3672
0
        WalletLogPrintf("Deactivate spkMan: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3673
0
        WalletBatch batch(GetDatabase());
3674
0
        if (!batch.EraseActiveScriptPubKeyMan(static_cast<uint8_t>(type), internal)) {
3675
0
            throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed");
3676
0
        }
3677
3678
0
        auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3679
0
        spk_mans.erase(type);
3680
0
    }
3681
3682
0
    NotifyCanGetAddressesChanged();
3683
0
}
3684
3685
DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const
3686
0
{
3687
0
    auto spk_man_pair = m_spk_managers.find(desc.id);
3688
3689
0
    if (spk_man_pair != m_spk_managers.end()) {
3690
        // Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match
3691
0
        DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair->second.get());
3692
0
        if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) {
3693
0
            return spk_manager;
3694
0
        }
3695
0
    }
3696
3697
0
    return nullptr;
3698
0
}
3699
3700
std::optional<bool> CWallet::IsInternalScriptPubKeyMan(ScriptPubKeyMan* spk_man) const
3701
0
{
3702
    // only active ScriptPubKeyMan can be internal
3703
0
    if (!GetActiveScriptPubKeyMans().count(spk_man)) {
3704
0
        return std::nullopt;
3705
0
    }
3706
3707
0
    const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man);
3708
0
    if (!desc_spk_man) {
3709
0
        throw std::runtime_error(std::string(__func__) + ": unexpected ScriptPubKeyMan type.");
3710
0
    }
3711
3712
0
    LOCK(desc_spk_man->cs_desc_man);
3713
0
    const auto& type = desc_spk_man->GetWalletDescriptor().descriptor->GetOutputType();
3714
0
    assert(type.has_value());
3715
3716
0
    return GetScriptPubKeyMan(*type, /* internal= */ true) == desc_spk_man;
3717
0
}
3718
3719
util::Result<ScriptPubKeyMan*> CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal)
3720
0
{
3721
0
    AssertLockHeld(cs_wallet);
3722
3723
0
    if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3724
0
        WalletLogPrintf("Cannot add WalletDescriptor to a non-descriptor wallet\n");
3725
0
        return nullptr;
3726
0
    }
3727
3728
0
    auto spk_man = GetDescriptorScriptPubKeyMan(desc);
3729
0
    if (spk_man) {
3730
0
        WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString());
3731
0
        if (auto spkm_res = spk_man->UpdateWalletDescriptor(desc); !spkm_res) {
3732
0
            return util::Error{util::ErrorString(spkm_res)};
3733
0
        }
3734
0
    } else {
3735
0
        auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size));
3736
0
        spk_man = new_spk_man.get();
3737
3738
        // Save the descriptor to memory
3739
0
        uint256 id = new_spk_man->GetID();
3740
0
        AddScriptPubKeyMan(id, std::move(new_spk_man));
3741
0
    }
3742
3743
    // Add the private keys to the descriptor
3744
0
    for (const auto& entry : signing_provider.keys) {
3745
0
        const CKey& key = entry.second;
3746
0
        spk_man->AddDescriptorKey(key, key.GetPubKey());
3747
0
    }
3748
3749
    // Top up key pool, the manager will generate new scriptPubKeys internally
3750
0
    if (!spk_man->TopUp()) {
3751
0
        WalletLogPrintf("Could not top up scriptPubKeys\n");
3752
0
        return nullptr;
3753
0
    }
3754
3755
    // Apply the label if necessary
3756
    // Note: we disable labels for ranged descriptors
3757
0
    if (!desc.descriptor->IsRange()) {
3758
0
        auto script_pub_keys = spk_man->GetScriptPubKeys();
3759
0
        if (script_pub_keys.empty()) {
3760
0
            WalletLogPrintf("Could not generate scriptPubKeys (cache is empty)\n");
3761
0
            return nullptr;
3762
0
        }
3763
3764
0
        if (!internal) {
3765
0
            for (const auto& script : script_pub_keys) {
3766
0
                CTxDestination dest;
3767
0
                if (ExtractDestination(script, dest)) {
3768
0
                    SetAddressBook(dest, label, AddressPurpose::RECEIVE);
3769
0
                }
3770
0
            }
3771
0
        }
3772
0
    }
3773
3774
    // Save the descriptor to DB
3775
0
    spk_man->WriteDescriptor();
3776
3777
0
    return spk_man;
3778
0
}
3779
3780
bool CWallet::MigrateToSQLite(bilingual_str& error)
3781
0
{
3782
0
    AssertLockHeld(cs_wallet);
3783
3784
0
    WalletLogPrintf("Migrating wallet storage database from BerkeleyDB to SQLite.\n");
3785
3786
0
    if (m_database->Format() == "sqlite") {
3787
0
        error = _("Error: This wallet already uses SQLite");
3788
0
        return false;
3789
0
    }
3790
3791
    // Get all of the records for DB type migration
3792
0
    std::unique_ptr<DatabaseBatch> batch = m_database->MakeBatch();
3793
0
    std::unique_ptr<DatabaseCursor> cursor = batch->GetNewCursor();
3794
0
    std::vector<std::pair<SerializeData, SerializeData>> records;
3795
0
    if (!cursor) {
3796
0
        error = _("Error: Unable to begin reading all records in the database");
3797
0
        return false;
3798
0
    }
3799
0
    DatabaseCursor::Status status = DatabaseCursor::Status::FAIL;
3800
0
    while (true) {
3801
0
        DataStream ss_key{};
3802
0
        DataStream ss_value{};
3803
0
        status = cursor->Next(ss_key, ss_value);
3804
0
        if (status != DatabaseCursor::Status::MORE) {
3805
0
            break;
3806
0
        }
3807
0
        SerializeData key(ss_key.begin(), ss_key.end());
3808
0
        SerializeData value(ss_value.begin(), ss_value.end());
3809
0
        records.emplace_back(key, value);
3810
0
    }
3811
0
    cursor.reset();
3812
0
    batch.reset();
3813
0
    if (status != DatabaseCursor::Status::DONE) {
3814
0
        error = _("Error: Unable to read all records in the database");
3815
0
        return false;
3816
0
    }
3817
3818
    // Close this database and delete the file
3819
0
    fs::path db_path = fs::PathFromString(m_database->Filename());
3820
0
    m_database->Close();
3821
0
    fs::remove(db_path);
3822
3823
    // Generate the path for the location of the migrated wallet
3824
    // Wallets that are plain files rather than wallet directories will be migrated to be wallet directories.
3825
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(m_name));
3826
3827
    // Make new DB
3828
0
    DatabaseOptions opts;
3829
0
    opts.require_create = true;
3830
0
    opts.require_format = DatabaseFormat::SQLITE;
3831
0
    DatabaseStatus db_status;
3832
0
    std::unique_ptr<WalletDatabase> new_db = MakeDatabase(wallet_path, opts, db_status, error);
3833
0
    assert(new_db); // This is to prevent doing anything further with this wallet. The original file was deleted, but a backup exists.
3834
0
    m_database.reset();
3835
0
    m_database = std::move(new_db);
3836
3837
    // Write existing records into the new DB
3838
0
    batch = m_database->MakeBatch();
3839
0
    bool began = batch->TxnBegin();
3840
0
    assert(began); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3841
0
    for (const auto& [key, value] : records) {
3842
0
        if (!batch->Write(std::span{key}, std::span{value})) {
3843
0
            batch->TxnAbort();
3844
0
            m_database->Close();
3845
0
            fs::remove(m_database->Filename());
3846
0
            assert(false); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3847
0
        }
3848
0
    }
3849
0
    bool committed = batch->TxnCommit();
3850
0
    assert(committed); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
3851
0
    return true;
3852
0
}
3853
3854
std::optional<MigrationData> CWallet::GetDescriptorsForLegacy(bilingual_str& error) const
3855
0
{
3856
0
    AssertLockHeld(cs_wallet);
3857
3858
0
    LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3859
0
    if (!Assume(legacy_spkm)) {
3860
        // This shouldn't happen
3861
0
        error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));
3862
0
        return std::nullopt;
3863
0
    }
3864
3865
0
    std::optional<MigrationData> res = legacy_spkm->MigrateToDescriptor();
3866
0
    if (res == std::nullopt) {
3867
0
        error = _("Error: Unable to produce descriptors for this legacy wallet. Make sure to provide the wallet's passphrase if it is encrypted.");
3868
0
        return std::nullopt;
3869
0
    }
3870
0
    return res;
3871
0
}
3872
3873
util::Result<void> CWallet::ApplyMigrationData(WalletBatch& local_wallet_batch, MigrationData& data)
3874
0
{
3875
0
    AssertLockHeld(cs_wallet);
3876
3877
0
    LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
3878
0
    if (!Assume(legacy_spkm)) {
3879
        // This shouldn't happen
3880
0
        return util::Error{Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"))};
3881
0
    }
3882
3883
    // Get all invalid or non-watched scripts that will not be migrated
3884
0
    std::set<CTxDestination> not_migrated_dests;
3885
0
    for (const auto& script : legacy_spkm->GetNotMineScriptPubKeys()) {
3886
0
        CTxDestination dest;
3887
0
        if (ExtractDestination(script, dest)) not_migrated_dests.emplace(dest);
3888
0
    }
3889
3890
    // When the legacy wallet has no spendable scripts, the main wallet will be empty, leaving its script cache empty as well.
3891
    // The watch-only and/or solvable wallet(s) will contain the scripts in their respective caches.
3892
0
    if (!data.desc_spkms.empty()) Assume(!m_cached_spks.empty());
3893
0
    if (!data.watch_descs.empty()) Assume(!data.watchonly_wallet->m_cached_spks.empty());
3894
0
    if (!data.solvable_descs.empty()) Assume(!data.solvable_wallet->m_cached_spks.empty());
3895
3896
0
    for (auto& desc_spkm : data.desc_spkms) {
3897
0
        if (m_spk_managers.count(desc_spkm->GetID()) > 0) {
3898
0
            return util::Error{_("Error: Duplicate descriptors created during migration. Your wallet may be corrupted.")};
3899
0
        }
3900
0
        uint256 id = desc_spkm->GetID();
3901
0
        AddScriptPubKeyMan(id, std::move(desc_spkm));
3902
0
    }
3903
3904
    // Remove the LegacyScriptPubKeyMan from disk
3905
0
    if (!legacy_spkm->DeleteRecordsWithDB(local_wallet_batch)) {
3906
0
        return util::Error{_("Error: cannot remove legacy wallet records")};
3907
0
    }
3908
3909
    // Remove the LegacyScriptPubKeyMan from memory
3910
0
    m_spk_managers.erase(legacy_spkm->GetID());
3911
0
    m_external_spk_managers.clear();
3912
0
    m_internal_spk_managers.clear();
3913
3914
    // Setup new descriptors
3915
0
    SetWalletFlagWithDB(local_wallet_batch, WALLET_FLAG_DESCRIPTORS);
3916
0
    if (!IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
3917
        // Use the existing master key if we have it
3918
0
        if (data.master_key.key.IsValid()) {
3919
0
            SetupDescriptorScriptPubKeyMans(local_wallet_batch, data.master_key);
3920
0
        } else {
3921
            // Setup with a new seed if we don't.
3922
0
            SetupOwnDescriptorScriptPubKeyMans(local_wallet_batch);
3923
0
        }
3924
0
    }
3925
3926
    // Get best block locator so that we can copy it to the watchonly and solvables
3927
0
    CBlockLocator best_block_locator;
3928
0
    if (!local_wallet_batch.ReadBestBlock(best_block_locator)) {
3929
0
        return util::Error{_("Error: Unable to read wallet's best block locator record")};
3930
0
    }
3931
3932
    // Check if the transactions in the wallet are still ours. Either they belong here, or they belong in the watchonly wallet.
3933
    // We need to go through these in the tx insertion order so that lookups to spends works.
3934
0
    std::vector<uint256> txids_to_delete;
3935
0
    std::unique_ptr<WalletBatch> watchonly_batch;
3936
0
    if (data.watchonly_wallet) {
3937
0
        watchonly_batch = std::make_unique<WalletBatch>(data.watchonly_wallet->GetDatabase());
3938
0
        if (!watchonly_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.watchonly_wallet->GetName())};
3939
        // Copy the next tx order pos to the watchonly wallet
3940
0
        LOCK(data.watchonly_wallet->cs_wallet);
3941
0
        data.watchonly_wallet->nOrderPosNext = nOrderPosNext;
3942
0
        watchonly_batch->WriteOrderPosNext(data.watchonly_wallet->nOrderPosNext);
3943
        // Write the best block locator to avoid rescanning on reload
3944
0
        if (!watchonly_batch->WriteBestBlock(best_block_locator)) {
3945
0
            return util::Error{_("Error: Unable to write watchonly wallet best block locator record")};
3946
0
        }
3947
0
    }
3948
0
    std::unique_ptr<WalletBatch> solvables_batch;
3949
0
    if (data.solvable_wallet) {
3950
0
        solvables_batch = std::make_unique<WalletBatch>(data.solvable_wallet->GetDatabase());
3951
0
        if (!solvables_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.solvable_wallet->GetName())};
3952
        // Write the best block locator to avoid rescanning on reload
3953
0
        if (!solvables_batch->WriteBestBlock(best_block_locator)) {
3954
0
            return util::Error{_("Error: Unable to write solvable wallet best block locator record")};
3955
0
        }
3956
0
    }
3957
0
    for (const auto& [_pos, wtx] : wtxOrdered) {
3958
        // Check it is the watchonly wallet's
3959
        // solvable_wallet doesn't need to be checked because transactions for those scripts weren't being watched for
3960
0
        bool is_mine = IsMine(*wtx->tx) || IsFromMe(*wtx->tx);
3961
0
        if (data.watchonly_wallet) {
3962
0
            LOCK(data.watchonly_wallet->cs_wallet);
3963
0
            if (data.watchonly_wallet->IsMine(*wtx->tx) || data.watchonly_wallet->IsFromMe(*wtx->tx)) {
3964
                // Add to watchonly wallet
3965
0
                const uint256& hash = wtx->GetHash();
3966
0
                const CWalletTx& to_copy_wtx = *wtx;
3967
0
                if (!data.watchonly_wallet->LoadToWallet(hash, [&](CWalletTx& ins_wtx, bool new_tx) EXCLUSIVE_LOCKS_REQUIRED(data.watchonly_wallet->cs_wallet) {
3968
0
                    if (!new_tx) return false;
3969
0
                    ins_wtx.SetTx(to_copy_wtx.tx);
3970
0
                    ins_wtx.CopyFrom(to_copy_wtx);
3971
0
                    return true;
3972
0
                })) {
3973
0
                    return util::Error{strprintf(_("Error: Could not add watchonly tx %s to watchonly wallet"), wtx->GetHash().GetHex())};
3974
0
                }
3975
0
                watchonly_batch->WriteTx(data.watchonly_wallet->mapWallet.at(hash));
3976
                // Mark as to remove from the migrated wallet only if it does not also belong to it
3977
0
                if (!is_mine) {
3978
0
                    txids_to_delete.push_back(hash);
3979
0
                }
3980
0
                continue;
3981
0
            }
3982
0
        }
3983
0
        if (!is_mine) {
3984
            // Both not ours and not in the watchonly wallet
3985
0
            return util::Error{strprintf(_("Error: Transaction %s in wallet cannot be identified to belong to migrated wallets"), wtx->GetHash().GetHex())};
3986
0
        }
3987
0
    }
3988
3989
    // Do the removes
3990
0
    if (txids_to_delete.size() > 0) {
3991
0
        if (auto res = RemoveTxs(local_wallet_batch, txids_to_delete); !res) {
3992
0
            return util::Error{_("Error: Could not delete watchonly transactions. ") + util::ErrorString(res)};
3993
0
        }
3994
0
    }
3995
3996
    // Pair external wallets with their corresponding db handler
3997
0
    std::vector<std::pair<std::shared_ptr<CWallet>, std::unique_ptr<WalletBatch>>> wallets_vec;
3998
0
    if (data.watchonly_wallet) wallets_vec.emplace_back(data.watchonly_wallet, std::move(watchonly_batch));
3999
0
    if (data.solvable_wallet) wallets_vec.emplace_back(data.solvable_wallet, std::move(solvables_batch));
4000
4001
    // Write address book entry to disk
4002
0
    auto func_store_addr = [](WalletBatch& batch, const CTxDestination& dest, const CAddressBookData& entry) {
4003
0
        auto address{EncodeDestination(dest)};
4004
0
        if (entry.purpose) batch.WritePurpose(address, PurposeToString(*entry.purpose));
4005
0
        if (entry.label) batch.WriteName(address, *entry.label);
4006
0
        for (const auto& [id, request] : entry.receive_requests) {
4007
0
            batch.WriteAddressReceiveRequest(dest, id, request);
4008
0
        }
4009
0
        if (entry.previously_spent) batch.WriteAddressPreviouslySpent(dest, true);
4010
0
    };
4011
4012
    // Check the address book data in the same way we did for transactions
4013
0
    std::vector<CTxDestination> dests_to_delete;
4014
0
    for (const auto& [dest, record] : m_address_book) {
4015
        // Ensure "receive" entries that are no longer part of the original wallet are transferred to another wallet
4016
        // Entries for everything else ("send") will be cloned to all wallets.
4017
0
        bool require_transfer = record.purpose == AddressPurpose::RECEIVE && !IsMine(dest);
4018
0
        bool copied = false;
4019
0
        for (auto& [wallet, batch] : wallets_vec) {
4020
0
            LOCK(wallet->cs_wallet);
4021
0
            if (require_transfer && !wallet->IsMine(dest)) continue;
4022
4023
            // Copy the entire address book entry
4024
0
            wallet->m_address_book[dest] = record;
4025
0
            func_store_addr(*batch, dest, record);
4026
4027
0
            copied = true;
4028
            // Only delete 'receive' records that are no longer part of the original wallet
4029
0
            if (require_transfer) {
4030
0
                dests_to_delete.push_back(dest);
4031
0
                break;
4032
0
            }
4033
0
        }
4034
4035
        // Fail immediately if we ever found an entry that was ours and cannot be transferred
4036
        // to any of the created wallets (watch-only, solvable).
4037
        // Means that no inferred descriptor maps to the stored entry. Which mustn't happen.
4038
0
        if (require_transfer && !copied) {
4039
4040
            // Skip invalid/non-watched scripts that will not be migrated
4041
0
            if (not_migrated_dests.count(dest) > 0) {
4042
0
                dests_to_delete.push_back(dest);
4043
0
                continue;
4044
0
            }
4045
4046
0
            return util::Error{_("Error: Address book data in wallet cannot be identified to belong to migrated wallets")};
4047
0
        }
4048
0
    }
4049
4050
    // Persist external wallets address book entries
4051
0
    for (auto& [wallet, batch] : wallets_vec) {
4052
0
        if (!batch->TxnCommit()) {
4053
0
            return util::Error{strprintf(_("Error: Unable to write data to disk for wallet %s"), wallet->GetName())};
4054
0
        }
4055
0
    }
4056
4057
    // Remove the things to delete in this wallet
4058
0
    if (dests_to_delete.size() > 0) {
4059
0
        for (const auto& dest : dests_to_delete) {
4060
0
            if (!DelAddressBookWithDB(local_wallet_batch, dest)) {
4061
0
                return util::Error{_("Error: Unable to remove watchonly address book data")};
4062
0
            }
4063
0
        }
4064
0
    }
4065
4066
0
    return {}; // all good
4067
0
}
4068
4069
bool CWallet::CanGrindR() const
4070
0
{
4071
0
    return !IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER);
4072
0
}
4073
4074
bool DoMigration(CWallet& wallet, WalletContext& context, bilingual_str& error, MigrationResult& res) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet)
4075
0
{
4076
0
    AssertLockHeld(wallet.cs_wallet);
4077
4078
    // Get all of the descriptors from the legacy wallet
4079
0
    std::optional<MigrationData> data = wallet.GetDescriptorsForLegacy(error);
4080
0
    if (data == std::nullopt) return false;
4081
4082
    // Create the watchonly and solvable wallets if necessary
4083
0
    if (data->watch_descs.size() > 0 || data->solvable_descs.size() > 0) {
4084
0
        DatabaseOptions options;
4085
0
        options.require_existing = false;
4086
0
        options.require_create = true;
4087
0
        options.require_format = DatabaseFormat::SQLITE;
4088
4089
0
        WalletContext empty_context;
4090
0
        empty_context.args = context.args;
4091
4092
        // Make the wallets
4093
0
        options.create_flags = WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET | WALLET_FLAG_DESCRIPTORS;
4094
0
        if (wallet.IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
4095
0
            options.create_flags |= WALLET_FLAG_AVOID_REUSE;
4096
0
        }
4097
0
        if (wallet.IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
4098
0
            options.create_flags |= WALLET_FLAG_KEY_ORIGIN_METADATA;
4099
0
        }
4100
0
        if (data->watch_descs.size() > 0) {
4101
0
            wallet.WalletLogPrintf("Making a new watchonly wallet containing the watched scripts\n");
4102
4103
0
            DatabaseStatus status;
4104
0
            std::vector<bilingual_str> warnings;
4105
0
            std::string wallet_name = wallet.GetName() + "_watchonly";
4106
0
            std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4107
0
            if (!database) {
4108
0
                error = strprintf(_("Wallet file creation failed: %s"), error);
4109
0
                return false;
4110
0
            }
4111
4112
0
            data->watchonly_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4113
0
            if (!data->watchonly_wallet) {
4114
0
                error = _("Error: Failed to create new watchonly wallet");
4115
0
                return false;
4116
0
            }
4117
0
            res.watchonly_wallet = data->watchonly_wallet;
4118
0
            LOCK(data->watchonly_wallet->cs_wallet);
4119
4120
            // Parse the descriptors and add them to the new wallet
4121
0
            for (const auto& [desc_str, creation_time] : data->watch_descs) {
4122
                // Parse the descriptor
4123
0
                FlatSigningProvider keys;
4124
0
                std::string parse_err;
4125
0
                std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4126
0
                assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4127
0
                assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
4128
4129
                // Add to the wallet
4130
0
                WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
4131
0
                if (auto spkm_res = data->watchonly_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
4132
0
                    throw std::runtime_error(util::ErrorString(spkm_res).original);
4133
0
                }
4134
0
            }
4135
4136
            // Add the wallet to settings
4137
0
            UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4138
0
        }
4139
0
        if (data->solvable_descs.size() > 0) {
4140
0
            wallet.WalletLogPrintf("Making a new watchonly wallet containing the unwatched solvable scripts\n");
4141
4142
0
            DatabaseStatus status;
4143
0
            std::vector<bilingual_str> warnings;
4144
0
            std::string wallet_name = wallet.GetName() + "_solvables";
4145
0
            std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4146
0
            if (!database) {
4147
0
                error = strprintf(_("Wallet file creation failed: %s"), error);
4148
0
                return false;
4149
0
            }
4150
4151
0
            data->solvable_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4152
0
            if (!data->solvable_wallet) {
4153
0
                error = _("Error: Failed to create new watchonly wallet");
4154
0
                return false;
4155
0
            }
4156
0
            res.solvables_wallet = data->solvable_wallet;
4157
0
            LOCK(data->solvable_wallet->cs_wallet);
4158
4159
            // Parse the descriptors and add them to the new wallet
4160
0
            for (const auto& [desc_str, creation_time] : data->solvable_descs) {
4161
                // Parse the descriptor
4162
0
                FlatSigningProvider keys;
4163
0
                std::string parse_err;
4164
0
                std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4165
0
                assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4166
0
                assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
4167
4168
                // Add to the wallet
4169
0
                WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
4170
0
                if (auto spkm_res = data->solvable_wallet->AddWalletDescriptor(w_desc, keys, "", false); !spkm_res) {
4171
0
                    throw std::runtime_error(util::ErrorString(spkm_res).original);
4172
0
                }
4173
0
            }
4174
4175
            // Add the wallet to settings
4176
0
            UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4177
0
        }
4178
0
    }
4179
4180
    // Add the descriptors to wallet, remove LegacyScriptPubKeyMan, and cleanup txs and address book data
4181
0
    return RunWithinTxn(wallet.GetDatabase(), /*process_desc=*/"apply migration process", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet){
4182
0
        if (auto res_migration = wallet.ApplyMigrationData(batch, *data); !res_migration) {
4183
0
            error = util::ErrorString(res_migration);
4184
0
            return false;
4185
0
        }
4186
0
        wallet.WalletLogPrintf("Wallet migration complete.\n");
4187
0
        return true;
4188
0
    });
4189
0
}
4190
4191
util::Result<MigrationResult> MigrateLegacyToDescriptor(const std::string& wallet_name, const SecureString& passphrase, WalletContext& context)
4192
0
{
4193
0
    std::vector<bilingual_str> warnings;
4194
0
    bilingual_str error;
4195
4196
    // If the wallet is still loaded, unload it so that nothing else tries to use it while we're changing it
4197
0
    bool was_loaded = false;
4198
0
    if (auto wallet = GetWallet(context, wallet_name)) {
4199
0
        if (wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4200
0
            return util::Error{_("Error: This wallet is already a descriptor wallet")};
4201
0
        }
4202
4203
        // Flush chain state before unloading wallet
4204
0
        CBlockLocator locator;
4205
0
        WITH_LOCK(wallet->cs_wallet, context.chain->findBlock(wallet->GetLastBlockHash(), FoundBlock().locator(locator)));
4206
0
        if (!locator.IsNull()) wallet->chainStateFlushed(ChainstateRole::NORMAL, locator);
4207
4208
0
        if (!RemoveWallet(context, wallet, /*load_on_start=*/std::nullopt, warnings)) {
4209
0
            return util::Error{_("Unable to unload the wallet before migrating")};
4210
0
        }
4211
0
        WaitForDeleteWallet(std::move(wallet));
4212
0
        was_loaded = true;
4213
0
    } else {
4214
        // Check if the wallet is BDB
4215
0
        const auto& wallet_path = GetWalletPath(wallet_name);
4216
0
        if (!wallet_path) {
4217
0
            return util::Error{util::ErrorString(wallet_path)};
4218
0
        }
4219
0
        if (!fs::exists(*wallet_path)) {
4220
0
            return util::Error{_("Error: Wallet does not exist")};
4221
0
        }
4222
0
        if (!IsBDBFile(BDBDataFile(*wallet_path))) {
4223
0
            return util::Error{_("Error: This wallet is already a descriptor wallet")};
4224
0
        }
4225
0
    }
4226
4227
    // Load the wallet but only in the context of this function.
4228
    // No signals should be connected nor should anything else be aware of this wallet
4229
0
    WalletContext empty_context;
4230
0
    empty_context.args = context.args;
4231
0
    DatabaseOptions options;
4232
0
    options.require_existing = true;
4233
0
    options.require_format = DatabaseFormat::BERKELEY_RO;
4234
0
    DatabaseStatus status;
4235
0
    std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4236
0
    if (!database) {
4237
0
        return util::Error{Untranslated("Wallet file verification failed.") + Untranslated(" ") + error};
4238
0
    }
4239
4240
    // Make the local wallet
4241
0
    std::shared_ptr<CWallet> local_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4242
0
    if (!local_wallet) {
4243
0
        return util::Error{Untranslated("Wallet loading failed.") + Untranslated(" ") + error};
4244
0
    }
4245
4246
0
    return MigrateLegacyToDescriptor(std::move(local_wallet), passphrase, context, was_loaded);
4247
0
}
4248
4249
util::Result<MigrationResult> MigrateLegacyToDescriptor(std::shared_ptr<CWallet> local_wallet, const SecureString& passphrase, WalletContext& context, bool was_loaded)
4250
0
{
4251
0
    MigrationResult res;
4252
0
    bilingual_str error;
4253
0
    std::vector<bilingual_str> warnings;
4254
4255
0
    DatabaseOptions options;
4256
0
    options.require_existing = true;
4257
0
    DatabaseStatus status;
4258
4259
0
    const std::string wallet_name = local_wallet->GetName();
4260
4261
    // Helper to reload as normal for some of our exit scenarios
4262
0
    const auto& reload_wallet = [&](std::shared_ptr<CWallet>& to_reload) {
4263
0
        assert(to_reload.use_count() == 1);
4264
0
        std::string name = to_reload->GetName();
4265
0
        to_reload.reset();
4266
0
        to_reload = LoadWallet(context, name, /*load_on_start=*/std::nullopt, options, status, error, warnings);
4267
0
        return to_reload != nullptr;
4268
0
    };
4269
4270
    // Before anything else, check if there is something to migrate.
4271
0
    if (local_wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4272
0
        if (was_loaded) {
4273
0
            reload_wallet(local_wallet);
4274
0
        }
4275
0
        return util::Error{_("Error: This wallet is already a descriptor wallet")};
4276
0
    }
4277
4278
    // Make a backup of the DB
4279
0
    fs::path this_wallet_dir = fs::absolute(fs::PathFromString(local_wallet->GetDatabase().Filename())).parent_path();
4280
0
    fs::path backup_filename = fs::PathFromString(strprintf("%s_%d.legacy.bak", (wallet_name.empty() ? "default_wallet" : wallet_name), GetTime()));
4281
0
    fs::path backup_path = this_wallet_dir / backup_filename;
4282
0
    if (!local_wallet->BackupWallet(fs::PathToString(backup_path))) {
4283
0
        if (was_loaded) {
4284
0
            reload_wallet(local_wallet);
4285
0
        }
4286
0
        return util::Error{_("Error: Unable to make a backup of your wallet")};
4287
0
    }
4288
0
    res.backup_path = backup_path;
4289
4290
0
    bool success = false;
4291
4292
    // Unlock the wallet if needed
4293
0
    if (local_wallet->IsLocked() && !local_wallet->Unlock(passphrase)) {
4294
0
        if (was_loaded) {
4295
0
            reload_wallet(local_wallet);
4296
0
        }
4297
0
        if (passphrase.find('\0') == std::string::npos) {
4298
0
            return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase was not provided or was incorrect.")};
4299
0
        } else {
4300
0
            return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase entered was incorrect. "
4301
0
                                            "The passphrase contains a null character (ie - a zero byte). "
4302
0
                                            "If this passphrase was set with a version of this software prior to 25.0, "
4303
0
                                            "please try again with only the characters up to — but not including — "
4304
0
                                            "the first null character.")};
4305
0
        }
4306
0
    }
4307
4308
0
    {
4309
0
        LOCK(local_wallet->cs_wallet);
4310
        // First change to using SQLite
4311
0
        if (!local_wallet->MigrateToSQLite(error)) return util::Error{error};
4312
4313
        // Do the migration of keys and scripts for non-empty wallets, and cleanup if it fails
4314
0
        if (HasLegacyRecords(*local_wallet)) {
4315
0
            success = DoMigration(*local_wallet, context, error, res);
4316
0
        } else {
4317
            // Make sure that descriptors flag is actually set
4318
0
            local_wallet->SetWalletFlag(WALLET_FLAG_DESCRIPTORS);
4319
0
            success = true;
4320
0
        }
4321
0
    }
4322
4323
    // In case of reloading failure, we need to remember the wallet dirs to remove
4324
    // Set is used as it may be populated with the same wallet directory paths multiple times,
4325
    // both before and after reloading. This ensures the set is complete even if one of the wallets
4326
    // fails to reload.
4327
0
    std::set<fs::path> wallet_dirs;
4328
0
    if (success) {
4329
        // Migration successful, unload all wallets locally, then reload them.
4330
        // Reload the main wallet
4331
0
        wallet_dirs.insert(fs::PathFromString(local_wallet->GetDatabase().Filename()).parent_path());
4332
0
        success = reload_wallet(local_wallet);
4333
0
        res.wallet = local_wallet;
4334
0
        res.wallet_name = wallet_name;
4335
0
        if (success && res.watchonly_wallet) {
4336
            // Reload watchonly
4337
0
            wallet_dirs.insert(fs::PathFromString(res.watchonly_wallet->GetDatabase().Filename()).parent_path());
4338
0
            success = reload_wallet(res.watchonly_wallet);
4339
0
        }
4340
0
        if (success && res.solvables_wallet) {
4341
            // Reload solvables
4342
0
            wallet_dirs.insert(fs::PathFromString(res.solvables_wallet->GetDatabase().Filename()).parent_path());
4343
0
            success = reload_wallet(res.solvables_wallet);
4344
0
        }
4345
0
    }
4346
0
    if (!success) {
4347
        // Migration failed, cleanup
4348
        // Before deleting the wallet's directory, copy the backup file to the top-level wallets dir
4349
0
        fs::path temp_backup_location = fsbridge::AbsPathJoin(GetWalletDir(), backup_filename);
4350
0
        fs::copy_file(backup_path, temp_backup_location, fs::copy_options::none);
4351
4352
        // Make list of wallets to cleanup
4353
0
        std::vector<std::shared_ptr<CWallet>> created_wallets;
4354
0
        if (local_wallet) created_wallets.push_back(std::move(local_wallet));
4355
0
        if (res.watchonly_wallet) created_wallets.push_back(std::move(res.watchonly_wallet));
4356
0
        if (res.solvables_wallet) created_wallets.push_back(std::move(res.solvables_wallet));
4357
4358
        // Get the directories to remove after unloading
4359
0
        for (std::shared_ptr<CWallet>& w : created_wallets) {
4360
0
            wallet_dirs.emplace(fs::PathFromString(w->GetDatabase().Filename()).parent_path());
4361
0
        }
4362
4363
        // Unload the wallets
4364
0
        for (std::shared_ptr<CWallet>& w : created_wallets) {
4365
0
            if (w->HaveChain()) {
4366
                // Unloading for wallets that were loaded for normal use
4367
0
                if (!RemoveWallet(context, w, /*load_on_start=*/false)) {
4368
0
                    error += _("\nUnable to cleanup failed migration");
4369
0
                    return util::Error{error};
4370
0
                }
4371
0
                WaitForDeleteWallet(std::move(w));
4372
0
            } else {
4373
                // Unloading for wallets in local context
4374
0
                assert(w.use_count() == 1);
4375
0
                w.reset();
4376
0
            }
4377
0
        }
4378
4379
        // Delete the wallet directories
4380
0
        for (const fs::path& dir : wallet_dirs) {
4381
0
            fs::remove_all(dir);
4382
0
        }
4383
4384
        // Restore the backup
4385
        // Convert the backup file to the wallet db file by renaming it and moving it into the wallet's directory.
4386
        // Reload it into memory if the wallet was previously loaded.
4387
0
        bilingual_str restore_error;
4388
0
        const auto& ptr_wallet = RestoreWallet(context, temp_backup_location, wallet_name, /*load_on_start=*/std::nullopt, status, restore_error, warnings, /*load_after_restore=*/was_loaded);
4389
0
        if (!restore_error.empty()) {
4390
0
            error += restore_error + _("\nUnable to restore backup of wallet.");
4391
0
            return util::Error{error};
4392
0
        }
4393
4394
        // The wallet directory has been restored, but just in case, copy the previously created backup to the wallet dir
4395
0
        fs::copy_file(temp_backup_location, backup_path, fs::copy_options::none);
4396
0
        fs::remove(temp_backup_location);
4397
4398
        // Verify that there is no dangling wallet: when the wallet wasn't loaded before, expect null.
4399
        // This check is performed after restoration to avoid an early error before saving the backup.
4400
0
        bool wallet_reloaded = ptr_wallet != nullptr;
4401
0
        assert(was_loaded == wallet_reloaded);
4402
4403
0
        return util::Error{error};
4404
0
    }
4405
0
    return res;
4406
0
}
4407
4408
void CWallet::CacheNewScriptPubKeys(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4409
0
{
4410
0
    for (const auto& script : spks) {
4411
0
        m_cached_spks[script].push_back(spkm);
4412
0
    }
4413
0
}
4414
4415
void CWallet::TopUpCallback(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4416
0
{
4417
    // Update scriptPubKey cache
4418
0
    CacheNewScriptPubKeys(spks, spkm);
4419
0
}
4420
4421
std::set<CExtPubKey> CWallet::GetActiveHDPubKeys() const
4422
0
{
4423
0
    AssertLockHeld(cs_wallet);
4424
4425
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4426
4427
0
    std::set<CExtPubKey> active_xpubs;
4428
0
    for (const auto& spkm : GetActiveScriptPubKeyMans()) {
4429
0
        const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4430
0
        assert(desc_spkm);
4431
0
        LOCK(desc_spkm->cs_desc_man);
4432
0
        WalletDescriptor w_desc = desc_spkm->GetWalletDescriptor();
4433
4434
0
        std::set<CPubKey> desc_pubkeys;
4435
0
        std::set<CExtPubKey> desc_xpubs;
4436
0
        w_desc.descriptor->GetPubKeys(desc_pubkeys, desc_xpubs);
4437
0
        active_xpubs.merge(std::move(desc_xpubs));
4438
0
    }
4439
0
    return active_xpubs;
4440
0
}
4441
4442
std::optional<CKey> CWallet::GetKey(const CKeyID& keyid) const
4443
0
{
4444
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4445
4446
0
    for (const auto& spkm : GetAllScriptPubKeyMans()) {
4447
0
        const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4448
0
        assert(desc_spkm);
4449
0
        LOCK(desc_spkm->cs_desc_man);
4450
0
        if (std::optional<CKey> key = desc_spkm->GetKey(keyid)) {
4451
0
            return key;
4452
0
        }
4453
0
    }
4454
0
    return std::nullopt;
4455
0
}
4456
} // namespace wallet