Coverage Report

Created: 2025-03-27 15:33

/root/bitcoin/src/wallet/wallet.cpp
Line
Count
Source (jump to first uncovered line)
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <wallet/wallet.h>
7
8
#include <bitcoin-build-config.h> // IWYU pragma: keep
9
#include <addresstype.h>
10
#include <blockfilter.h>
11
#include <chain.h>
12
#include <coins.h>
13
#include <common/args.h>
14
#include <common/messages.h>
15
#include <common/settings.h>
16
#include <common/signmessage.h>
17
#include <common/system.h>
18
#include <consensus/amount.h>
19
#include <consensus/consensus.h>
20
#include <consensus/validation.h>
21
#include <external_signer.h>
22
#include <interfaces/chain.h>
23
#include <interfaces/handler.h>
24
#include <interfaces/wallet.h>
25
#include <kernel/chain.h>
26
#include <kernel/mempool_removal_reason.h>
27
#include <key.h>
28
#include <key_io.h>
29
#include <logging.h>
30
#include <node/types.h>
31
#include <outputtype.h>
32
#include <policy/feerate.h>
33
#include <primitives/block.h>
34
#include <primitives/transaction.h>
35
#include <psbt.h>
36
#include <pubkey.h>
37
#include <random.h>
38
#include <script/descriptor.h>
39
#include <script/interpreter.h>
40
#include <script/script.h>
41
#include <script/sign.h>
42
#include <script/signingprovider.h>
43
#include <script/solver.h>
44
#include <serialize.h>
45
#include <span.h>
46
#include <streams.h>
47
#include <support/allocators/secure.h>
48
#include <support/allocators/zeroafterfree.h>
49
#include <support/cleanse.h>
50
#include <sync.h>
51
#include <tinyformat.h>
52
#include <uint256.h>
53
#include <univalue.h>
54
#include <util/check.h>
55
#include <util/fs.h>
56
#include <util/fs_helpers.h>
57
#include <util/moneystr.h>
58
#include <util/result.h>
59
#include <util/string.h>
60
#include <util/time.h>
61
#include <util/translation.h>
62
#include <wallet/coincontrol.h>
63
#include <wallet/context.h>
64
#include <wallet/crypter.h>
65
#include <wallet/db.h>
66
#include <wallet/external_signer_scriptpubkeyman.h>
67
#include <wallet/scriptpubkeyman.h>
68
#include <wallet/transaction.h>
69
#include <wallet/types.h>
70
#include <wallet/walletdb.h>
71
#include <wallet/walletutil.h>
72
73
#include <algorithm>
74
#include <cassert>
75
#include <condition_variable>
76
#include <exception>
77
#include <optional>
78
#include <stdexcept>
79
#include <thread>
80
#include <tuple>
81
#include <variant>
82
83
struct KeyOriginInfo;
84
85
using common::AmountErrMsg;
86
using common::AmountHighWarn;
87
using common::PSBTError;
88
using interfaces::FoundBlock;
89
using util::ReplaceAll;
90
using util::ToString;
91
92
namespace wallet {
93
94
bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
95
0
{
96
0
    const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
97
0
        if (!setting_value.isArray()) setting_value.setArray();
98
0
        for (const auto& value : setting_value.getValues()) {
99
0
            if (value.isStr() && value.get_str() == wallet_name) return interfaces::SettingsAction::SKIP_WRITE;
100
0
        }
101
0
        setting_value.push_back(wallet_name);
102
0
        return interfaces::SettingsAction::WRITE;
103
0
    };
104
0
    return chain.updateRwSetting("wallet", update_function);
105
0
}
106
107
bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
108
0
{
109
0
    const auto update_function = [&wallet_name](common::SettingsValue& setting_value) {
110
0
        if (!setting_value.isArray()) return interfaces::SettingsAction::SKIP_WRITE;
111
0
        common::SettingsValue new_value(common::SettingsValue::VARR);
112
0
        for (const auto& value : setting_value.getValues()) {
113
0
            if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value);
114
0
        }
115
0
        if (new_value.size() == setting_value.size()) return interfaces::SettingsAction::SKIP_WRITE;
116
0
        setting_value = std::move(new_value);
117
0
        return interfaces::SettingsAction::WRITE;
118
0
    };
119
0
    return chain.updateRwSetting("wallet", update_function);
120
0
}
121
122
static void UpdateWalletSetting(interfaces::Chain& chain,
123
                                const std::string& wallet_name,
124
                                std::optional<bool> load_on_startup,
125
                                std::vector<bilingual_str>& warnings)
126
0
{
127
0
    if (!load_on_startup) return;
128
0
    if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) {
129
0
        warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup."));
130
0
    } else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) {
131
0
        warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup."));
132
0
    }
133
0
}
134
135
/**
136
 * Refresh mempool status so the wallet is in an internally consistent state and
137
 * immediately knows the transaction's status: Whether it can be considered
138
 * trusted and is eligible to be abandoned ...
139
 */
140
static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain)
141
84.3k
{
142
84.3k
    if (chain.isInMempool(tx.GetHash())) {
143
0
        tx.m_state = TxStateInMempool();
144
84.3k
    } else if (tx.state<TxStateInMempool>()) {
145
0
        tx.m_state = TxStateInactive();
146
0
    }
147
84.3k
}
148
149
bool AddWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
150
0
{
151
0
    LOCK(context.wallets_mutex);
152
0
    assert(wallet);
153
0
    std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
154
0
    if (i != context.wallets.end()) return false;
155
0
    context.wallets.push_back(wallet);
156
0
    wallet->ConnectScriptPubKeyManNotifiers();
157
0
    wallet->NotifyCanGetAddressesChanged();
158
0
    return true;
159
0
}
160
161
bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings)
162
0
{
163
0
    assert(wallet);
164
165
0
    interfaces::Chain& chain = wallet->chain();
166
0
    std::string name = wallet->GetName();
167
168
    // Unregister with the validation interface which also drops shared pointers.
169
0
    wallet->m_chain_notifications_handler.reset();
170
0
    {
171
0
        LOCK(context.wallets_mutex);
172
0
        std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(context.wallets.begin(), context.wallets.end(), wallet);
173
0
        if (i == context.wallets.end()) return false;
174
0
        context.wallets.erase(i);
175
0
    }
176
    // Notify unload so that upper layers release the shared pointer.
177
0
    wallet->NotifyUnload();
178
179
    // Write the wallet setting
180
0
    UpdateWalletSetting(chain, name, load_on_start, warnings);
181
182
0
    return true;
183
0
}
184
185
bool RemoveWallet(WalletContext& context, const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start)
186
0
{
187
0
    std::vector<bilingual_str> warnings;
188
0
    return RemoveWallet(context, wallet, load_on_start, warnings);
189
0
}
190
191
std::vector<std::shared_ptr<CWallet>> GetWallets(WalletContext& context)
192
0
{
193
0
    LOCK(context.wallets_mutex);
194
0
    return context.wallets;
195
0
}
196
197
std::shared_ptr<CWallet> GetDefaultWallet(WalletContext& context, size_t& count)
198
0
{
199
0
    LOCK(context.wallets_mutex);
200
0
    count = context.wallets.size();
201
0
    return count == 1 ? context.wallets[0] : nullptr;
202
0
}
203
204
std::shared_ptr<CWallet> GetWallet(WalletContext& context, const std::string& name)
205
0
{
206
0
    LOCK(context.wallets_mutex);
207
0
    for (const std::shared_ptr<CWallet>& wallet : context.wallets) {
208
0
        if (wallet->GetName() == name) return wallet;
209
0
    }
210
0
    return nullptr;
211
0
}
212
213
std::unique_ptr<interfaces::Handler> HandleLoadWallet(WalletContext& context, LoadWalletFn load_wallet)
214
0
{
215
0
    LOCK(context.wallets_mutex);
216
0
    auto it = context.wallet_load_fns.emplace(context.wallet_load_fns.end(), std::move(load_wallet));
217
0
    return interfaces::MakeCleanupHandler([&context, it] { LOCK(context.wallets_mutex); context.wallet_load_fns.erase(it); });
218
0
}
219
220
void NotifyWalletLoaded(WalletContext& context, const std::shared_ptr<CWallet>& wallet)
221
0
{
222
0
    LOCK(context.wallets_mutex);
223
0
    for (auto& load_wallet : context.wallet_load_fns) {
224
0
        load_wallet(interfaces::MakeWallet(context, wallet));
225
0
    }
226
0
}
227
228
static GlobalMutex g_loading_wallet_mutex;
229
static GlobalMutex g_wallet_release_mutex;
230
static std::condition_variable g_wallet_release_cv;
231
static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex);
232
static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex);
233
234
// Custom deleter for shared_ptr<CWallet>.
235
static void FlushAndDeleteWallet(CWallet* wallet)
236
0
{
237
0
    const std::string name = wallet->GetName();
238
0
    wallet->WalletLogPrintf("Releasing wallet %s..\n", name);
239
0
    wallet->Flush();
240
0
    delete wallet;
241
    // Wallet is now released, notify WaitForDeleteWallet, if any.
242
0
    {
243
0
        LOCK(g_wallet_release_mutex);
244
0
        if (g_unloading_wallet_set.erase(name) == 0) {
245
            // WaitForDeleteWallet was not called for this wallet, all done.
246
0
            return;
247
0
        }
248
0
    }
249
0
    g_wallet_release_cv.notify_all();
250
0
}
251
252
void WaitForDeleteWallet(std::shared_ptr<CWallet>&& wallet)
253
0
{
254
    // Mark wallet for unloading.
255
0
    const std::string name = wallet->GetName();
256
0
    {
257
0
        LOCK(g_wallet_release_mutex);
258
0
        g_unloading_wallet_set.insert(name);
259
        // Do not expect to be the only one removing this wallet.
260
        // Multiple threads could simultaneously be waiting for deletion.
261
0
    }
262
263
    // Time to ditch our shared_ptr and wait for FlushAndDeleteWallet call.
264
0
    wallet.reset();
265
0
    {
266
0
        WAIT_LOCK(g_wallet_release_mutex, lock);
267
0
        while (g_unloading_wallet_set.count(name) == 1) {
268
0
            g_wallet_release_cv.wait(lock);
269
0
        }
270
0
    }
271
0
}
272
273
namespace {
274
std::shared_ptr<CWallet> LoadWalletInternal(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
275
0
{
276
0
    try {
277
0
        std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
278
0
        if (!database) {
279
0
            error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
280
0
            return nullptr;
281
0
        }
282
283
0
        context.chain->initMessage(_("Loading wallet…"));
284
0
        std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), options.create_flags, error, warnings);
285
0
        if (!wallet) {
286
0
            error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error;
287
0
            status = DatabaseStatus::FAILED_LOAD;
288
0
            return nullptr;
289
0
        }
290
291
        // Legacy wallets are being deprecated, warn if the loaded wallet is legacy
292
0
        if (!wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
293
0
            warnings.emplace_back(_("Wallet loaded successfully. The legacy wallet type is being deprecated and support for creating and opening legacy wallets will be removed in the future. Legacy wallets can be migrated to a descriptor wallet with migratewallet."));
294
0
        }
295
296
0
        NotifyWalletLoaded(context, wallet);
297
0
        AddWallet(context, wallet);
298
0
        wallet->postInitProcess();
299
300
        // Write the wallet setting
301
0
        UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
302
303
0
        return wallet;
304
0
    } catch (const std::runtime_error& e) {
305
0
        error = Untranslated(e.what());
306
0
        status = DatabaseStatus::FAILED_LOAD;
307
0
        return nullptr;
308
0
    }
309
0
}
310
311
class FastWalletRescanFilter
312
{
313
public:
314
0
    FastWalletRescanFilter(const CWallet& wallet) : m_wallet(wallet)
315
0
    {
316
        // fast rescanning via block filters is only supported by descriptor wallets right now
317
0
        assert(!m_wallet.IsLegacy());
318
319
        // create initial filter with scripts from all ScriptPubKeyMans
320
0
        for (auto spkm : m_wallet.GetAllScriptPubKeyMans()) {
321
0
            auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(spkm)};
322
0
            assert(desc_spkm != nullptr);
323
0
            AddScriptPubKeys(desc_spkm);
324
            // save each range descriptor's end for possible future filter updates
325
0
            if (desc_spkm->IsHDEnabled()) {
326
0
                m_last_range_ends.emplace(desc_spkm->GetID(), desc_spkm->GetEndRange());
327
0
            }
328
0
        }
329
0
    }
330
331
    void UpdateIfNeeded()
332
0
    {
333
        // repopulate filter with new scripts if top-up has happened since last iteration
334
0
        for (const auto& [desc_spkm_id, last_range_end] : m_last_range_ends) {
335
0
            auto desc_spkm{dynamic_cast<DescriptorScriptPubKeyMan*>(m_wallet.GetScriptPubKeyMan(desc_spkm_id))};
336
0
            assert(desc_spkm != nullptr);
337
0
            int32_t current_range_end{desc_spkm->GetEndRange()};
338
0
            if (current_range_end > last_range_end) {
339
0
                AddScriptPubKeys(desc_spkm, last_range_end);
340
0
                m_last_range_ends.at(desc_spkm->GetID()) = current_range_end;
341
0
            }
342
0
        }
343
0
    }
344
345
    std::optional<bool> MatchesBlock(const uint256& block_hash) const
346
0
    {
347
0
        return m_wallet.chain().blockFilterMatchesAny(BlockFilterType::BASIC, block_hash, m_filter_set);
348
0
    }
349
350
private:
351
    const CWallet& m_wallet;
352
    /** Map for keeping track of each range descriptor's last seen end range.
353
      * This information is used to detect whether new addresses were derived
354
      * (that is, if the current end range is larger than the saved end range)
355
      * after processing a block and hence a filter set update is needed to
356
      * take possible keypool top-ups into account.
357
      */
358
    std::map<uint256, int32_t> m_last_range_ends;
359
    GCSFilter::ElementSet m_filter_set;
360
361
    void AddScriptPubKeys(const DescriptorScriptPubKeyMan* desc_spkm, int32_t last_range_end = 0)
362
0
    {
363
0
        for (const auto& script_pub_key : desc_spkm->GetScriptPubKeys(last_range_end)) {
364
0
            m_filter_set.emplace(script_pub_key.begin(), script_pub_key.end());
365
0
        }
366
0
    }
367
};
368
} // namespace
369
370
std::shared_ptr<CWallet> LoadWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
371
0
{
372
0
    auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name));
373
0
    if (!result.second) {
374
0
        error = Untranslated("Wallet already loading.");
375
0
        status = DatabaseStatus::FAILED_LOAD;
376
0
        return nullptr;
377
0
    }
378
0
    auto wallet = LoadWalletInternal(context, name, load_on_start, options, status, error, warnings);
379
0
    WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first));
380
0
    return wallet;
381
0
}
382
383
std::shared_ptr<CWallet> CreateWallet(WalletContext& context, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
384
0
{
385
0
    uint64_t wallet_creation_flags = options.create_flags;
386
0
    const SecureString& passphrase = options.create_passphrase;
387
388
0
    ArgsManager& args = *Assert(context.args);
389
390
0
    if (wallet_creation_flags & WALLET_FLAG_DESCRIPTORS) options.require_format = DatabaseFormat::SQLITE;
391
0
    else if (args.GetBoolArg("-swapbdbendian", false)) {
392
0
        options.require_format = DatabaseFormat::BERKELEY_SWAP;
393
0
    }
394
395
    // Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted
396
0
    bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET);
397
398
    // Born encrypted wallets need to be created blank first.
399
0
    if (!passphrase.empty()) {
400
0
        wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET;
401
0
    }
402
403
    // Private keys must be disabled for an external signer wallet
404
0
    if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
405
0
        error = Untranslated("Private keys must be disabled when using an external signer");
406
0
        status = DatabaseStatus::FAILED_CREATE;
407
0
        return nullptr;
408
0
    }
409
410
    // Descriptor support must be enabled for an external signer wallet
411
0
    if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) && !(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS)) {
412
0
        error = Untranslated("Descriptor support must be enabled when using an external signer");
413
0
        status = DatabaseStatus::FAILED_CREATE;
414
0
        return nullptr;
415
0
    }
416
417
    // Do not allow a passphrase when private keys are disabled
418
0
    if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
419
0
        error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled.");
420
0
        status = DatabaseStatus::FAILED_CREATE;
421
0
        return nullptr;
422
0
    }
423
424
    // Wallet::Verify will check if we're trying to create a wallet with a duplicate name.
425
0
    std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
426
0
    if (!database) {
427
0
        error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
428
0
        status = DatabaseStatus::FAILED_VERIFY;
429
0
        return nullptr;
430
0
    }
431
432
    // Make the wallet
433
0
    context.chain->initMessage(_("Loading wallet…"));
434
0
    std::shared_ptr<CWallet> wallet = CWallet::Create(context, name, std::move(database), wallet_creation_flags, error, warnings);
435
0
    if (!wallet) {
436
0
        error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error;
437
0
        status = DatabaseStatus::FAILED_CREATE;
438
0
        return nullptr;
439
0
    }
440
441
    // Encrypt the wallet
442
0
    if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
443
0
        if (!wallet->EncryptWallet(passphrase)) {
444
0
            error = Untranslated("Error: Wallet created but failed to encrypt.");
445
0
            status = DatabaseStatus::FAILED_ENCRYPT;
446
0
            return nullptr;
447
0
        }
448
0
        if (!create_blank) {
449
            // Unlock the wallet
450
0
            if (!wallet->Unlock(passphrase)) {
451
0
                error = Untranslated("Error: Wallet was encrypted but could not be unlocked");
452
0
                status = DatabaseStatus::FAILED_ENCRYPT;
453
0
                return nullptr;
454
0
            }
455
456
            // Set a seed for the wallet
457
0
            {
458
0
                LOCK(wallet->cs_wallet);
459
0
                if (wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
460
0
                    wallet->SetupDescriptorScriptPubKeyMans();
461
0
                } else {
462
0
                    for (auto spk_man : wallet->GetActiveScriptPubKeyMans()) {
463
0
                        if (!spk_man->SetupGeneration()) {
464
0
                            error = Untranslated("Unable to generate initial keys");
465
0
                            status = DatabaseStatus::FAILED_CREATE;
466
0
                            return nullptr;
467
0
                        }
468
0
                    }
469
0
                }
470
0
            }
471
472
            // Relock the wallet
473
0
            wallet->Lock();
474
0
        }
475
0
    }
476
477
0
    NotifyWalletLoaded(context, wallet);
478
0
    AddWallet(context, wallet);
479
0
    wallet->postInitProcess();
480
481
    // Write the wallet settings
482
0
    UpdateWalletSetting(*context.chain, name, load_on_start, warnings);
483
484
    // Legacy wallets are being deprecated, warn if a newly created wallet is legacy
485
0
    if (!(wallet_creation_flags & WALLET_FLAG_DESCRIPTORS)) {
486
0
        warnings.emplace_back(_("Wallet created successfully. The legacy wallet type is being deprecated and support for creating and opening legacy wallets will be removed in the future."));
487
0
    }
488
489
0
    status = DatabaseStatus::SUCCESS;
490
0
    return wallet;
491
0
}
492
493
// Re-creates wallet from the backup file by renaming and moving it into the wallet's directory.
494
// If 'load_after_restore=true', the wallet object will be fully initialized and appended to the context.
495
std::shared_ptr<CWallet> RestoreWallet(WalletContext& context, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings, bool load_after_restore)
496
0
{
497
0
    DatabaseOptions options;
498
0
    ReadDatabaseArgs(*context.args, options);
499
0
    options.require_existing = true;
500
501
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name));
502
0
    auto wallet_file = wallet_path / "wallet.dat";
503
0
    std::shared_ptr<CWallet> wallet;
504
505
0
    try {
506
0
        if (!fs::exists(backup_file)) {
507
0
            error = Untranslated("Backup file does not exist");
508
0
            status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE;
509
0
            return nullptr;
510
0
        }
511
512
0
        if (fs::exists(wallet_path) || !TryCreateDirectories(wallet_path)) {
513
0
            error = Untranslated(strprintf("Failed to create database path '%s'. Database already exists.", fs::PathToString(wallet_path)));
514
0
            status = DatabaseStatus::FAILED_ALREADY_EXISTS;
515
0
            return nullptr;
516
0
        }
517
518
0
        fs::copy_file(backup_file, wallet_file, fs::copy_options::none);
519
520
0
        if (load_after_restore) {
521
0
            wallet = LoadWallet(context, wallet_name, load_on_start, options, status, error, warnings);
522
0
        }
523
0
    } catch (const std::exception& e) {
524
0
        assert(!wallet);
525
0
        if (!error.empty()) error += Untranslated("\n");
526
0
        error += Untranslated(strprintf("Unexpected exception: %s", e.what()));
527
0
    }
528
529
    // Remove created wallet path only when loading fails
530
0
    if (load_after_restore && !wallet) {
531
0
        fs::remove_all(wallet_path);
532
0
    }
533
534
0
    return wallet;
535
0
}
536
537
/** @defgroup mapWallet
538
 *
539
 * @{
540
 */
541
542
const CWalletTx* CWallet::GetWalletTx(const uint256& hash) const
543
325k
{
544
325k
    AssertLockHeld(cs_wallet);
545
325k
    const auto it = mapWallet.find(hash);
546
325k
    if (it == mapWallet.end())
547
30.6k
        return nullptr;
548
294k
    return &(it->second);
549
325k
}
550
551
void CWallet::UpgradeKeyMetadata()
552
0
{
553
0
    if (IsLocked() || IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
554
0
        return;
555
0
    }
556
557
0
    auto spk_man = GetLegacyScriptPubKeyMan();
558
0
    if (!spk_man) {
559
0
        return;
560
0
    }
561
562
0
    spk_man->UpgradeKeyMetadata();
563
0
    SetWalletFlag(WALLET_FLAG_KEY_ORIGIN_METADATA);
564
0
}
565
566
void CWallet::UpgradeDescriptorCache()
567
0
{
568
0
    if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) {
569
0
        return;
570
0
    }
571
572
0
    for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) {
573
0
        DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
574
0
        desc_spkm->UpgradeDescriptorCache();
575
0
    }
576
0
    SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
577
0
}
578
579
bool CWallet::Unlock(const SecureString& strWalletPassphrase)
580
0
{
581
0
    CCrypter crypter;
582
0
    CKeyingMaterial _vMasterKey;
583
584
0
    {
585
0
        LOCK(cs_wallet);
586
0
        for (const MasterKeyMap::value_type& pMasterKey : mapMasterKeys)
587
0
        {
588
0
            if(!crypter.SetKeyFromPassphrase(strWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
589
0
                return false;
590
0
            if (!crypter.Decrypt(pMasterKey.second.vchCryptedKey, _vMasterKey))
591
0
                continue; // try another master key
592
0
            if (Unlock(_vMasterKey)) {
593
                // Now that we've unlocked, upgrade the key metadata
594
0
                UpgradeKeyMetadata();
595
                // Now that we've unlocked, upgrade the descriptor cache
596
0
                UpgradeDescriptorCache();
597
0
                return true;
598
0
            }
599
0
        }
600
0
    }
601
0
    return false;
602
0
}
603
604
bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase)
605
0
{
606
0
    bool fWasLocked = IsLocked();
607
608
0
    {
609
0
        LOCK2(m_relock_mutex, cs_wallet);
610
0
        Lock();
611
612
0
        CCrypter crypter;
613
0
        CKeyingMaterial _vMasterKey;
614
0
        for (MasterKeyMap::value_type& pMasterKey : mapMasterKeys)
615
0
        {
616
0
            if(!crypter.SetKeyFromPassphrase(strOldWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
617
0
                return false;
618
0
            if (!crypter.Decrypt(pMasterKey.second.vchCryptedKey, _vMasterKey))
619
0
                return false;
620
0
            if (Unlock(_vMasterKey))
621
0
            {
622
0
                constexpr MillisecondsDouble target{100};
623
0
                auto start{SteadyClock::now()};
624
0
                crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod);
625
0
                pMasterKey.second.nDeriveIterations = static_cast<unsigned int>(pMasterKey.second.nDeriveIterations * target / (SteadyClock::now() - start));
626
627
0
                start = SteadyClock::now();
628
0
                crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod);
629
0
                pMasterKey.second.nDeriveIterations = (pMasterKey.second.nDeriveIterations + static_cast<unsigned int>(pMasterKey.second.nDeriveIterations * target / (SteadyClock::now() - start))) / 2;
630
631
0
                if (pMasterKey.second.nDeriveIterations < 25000)
632
0
                    pMasterKey.second.nDeriveIterations = 25000;
633
634
0
                WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", pMasterKey.second.nDeriveIterations);
635
636
0
                if (!crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
637
0
                    return false;
638
0
                if (!crypter.Encrypt(_vMasterKey, pMasterKey.second.vchCryptedKey))
639
0
                    return false;
640
0
                WalletBatch(GetDatabase()).WriteMasterKey(pMasterKey.first, pMasterKey.second);
641
0
                if (fWasLocked)
642
0
                    Lock();
643
0
                return true;
644
0
            }
645
0
        }
646
0
    }
647
648
0
    return false;
649
0
}
650
651
void CWallet::chainStateFlushed(ChainstateRole role, const CBlockLocator& loc)
652
0
{
653
    // Don't update the best block until the chain is attached so that in case of a shutdown,
654
    // the rescan will be restarted at next startup.
655
0
    if (m_attaching_chain || role == ChainstateRole::BACKGROUND) {
656
0
        return;
657
0
    }
658
0
    WalletBatch batch(GetDatabase());
659
0
    batch.WriteBestBlock(loc);
660
0
}
661
662
void CWallet::SetMinVersion(enum WalletFeature nVersion, WalletBatch* batch_in)
663
0
{
664
0
    LOCK(cs_wallet);
665
0
    if (nWalletVersion >= nVersion)
666
0
        return;
667
0
    WalletLogPrintf("Setting minversion to %d\n", nVersion);
668
0
    nWalletVersion = nVersion;
669
670
0
    {
671
0
        WalletBatch* batch = batch_in ? batch_in : new WalletBatch(GetDatabase());
672
0
        if (nWalletVersion > 40000)
673
0
            batch->WriteMinVersion(nWalletVersion);
674
0
        if (!batch_in)
675
0
            delete batch;
676
0
    }
677
0
}
678
679
std::set<uint256> CWallet::GetConflicts(const uint256& txid) const
680
0
{
681
0
    std::set<uint256> result;
682
0
    AssertLockHeld(cs_wallet);
683
684
0
    const auto it = mapWallet.find(txid);
685
0
    if (it == mapWallet.end())
686
0
        return result;
687
0
    const CWalletTx& wtx = it->second;
688
689
0
    std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
690
691
0
    for (const CTxIn& txin : wtx.tx->vin)
692
0
    {
693
0
        if (mapTxSpends.count(txin.prevout) <= 1)
694
0
            continue;  // No conflict if zero or one spends
695
0
        range = mapTxSpends.equal_range(txin.prevout);
696
0
        for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it)
697
0
            result.insert(_it->second);
698
0
    }
699
0
    return result;
700
0
}
701
702
bool CWallet::HasWalletSpend(const CTransactionRef& tx) const
703
0
{
704
0
    AssertLockHeld(cs_wallet);
705
0
    const Txid& txid = tx->GetHash();
706
0
    for (unsigned int i = 0; i < tx->vout.size(); ++i) {
707
0
        if (IsSpent(COutPoint(txid, i))) {
708
0
            return true;
709
0
        }
710
0
    }
711
0
    return false;
712
0
}
713
714
void CWallet::Flush()
715
0
{
716
0
    GetDatabase().Flush();
717
0
}
718
719
void CWallet::Close()
720
0
{
721
0
    GetDatabase().Close();
722
0
}
723
724
void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range)
725
317k
{
726
    // We want all the wallet transactions in range to have the same metadata as
727
    // the oldest (smallest nOrderPos).
728
    // So: find smallest nOrderPos:
729
730
317k
    int nMinOrderPos = std::numeric_limits<int>::max();
731
317k
    const CWalletTx* copyFrom = nullptr;
732
635k
    for (TxSpends::iterator it = range.first; it != range.second; ++it) {
733
317k
        const CWalletTx* wtx = &mapWallet.at(it->second);
734
317k
        if (wtx->nOrderPos < nMinOrderPos) {
735
317k
            nMinOrderPos = wtx->nOrderPos;
736
317k
            copyFrom = wtx;
737
317k
        }
738
317k
    }
739
740
317k
    if (!copyFrom) {
741
0
        return;
742
0
    }
743
744
    // Now copy data from copyFrom to rest:
745
635k
    for (TxSpends::iterator it = range.first; it != range.second; ++it)
746
317k
    {
747
317k
        const uint256& hash = it->second;
748
317k
        CWalletTx* copyTo = &mapWallet.at(hash);
749
317k
        if (copyFrom == copyTo) continue;
750
0
        assert(copyFrom && "Oldest wallet transaction in range assumed to have been found.");
751
0
        if (!copyFrom->IsEquivalentTo(*copyTo)) continue;
752
0
        copyTo->mapValue = copyFrom->mapValue;
753
0
        copyTo->vOrderForm = copyFrom->vOrderForm;
754
        // fTimeReceivedIsTxTime not copied on purpose
755
        // nTimeReceived not copied on purpose
756
0
        copyTo->nTimeSmart = copyFrom->nTimeSmart;
757
0
        copyTo->fFromMe = copyFrom->fFromMe;
758
        // nOrderPos not copied on purpose
759
        // cached members not copied on purpose
760
0
    }
761
317k
}
762
763
/**
764
 * Outpoint is spent if any non-conflicted transaction
765
 * spends it:
766
 */
767
bool CWallet::IsSpent(const COutPoint& outpoint) const
768
13.8M
{
769
13.8M
    std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
770
13.8M
    range = mapTxSpends.equal_range(outpoint);
771
772
13.8M
    for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
773
8.82M
        const uint256& wtxid = it->second;
774
8.82M
        const auto mit = mapWallet.find(wtxid);
775
8.82M
        if (mit != mapWallet.end()) {
776
8.82M
            const auto& wtx = mit->second;
777
8.82M
            if (!wtx.isAbandoned() && !wtx.isBlockConflicted() && !wtx.isMempoolConflicted())
778
8.82M
                return true; // Spent
779
8.82M
        }
780
8.82M
    }
781
5.00M
    return false;
782
13.8M
}
783
784
void CWallet::AddToSpends(const COutPoint& outpoint, const uint256& wtxid, WalletBatch* batch)
785
317k
{
786
317k
    mapTxSpends.insert(std::make_pair(outpoint, wtxid));
787
788
317k
    if (batch) {
789
317k
        UnlockCoin(outpoint, batch);
790
317k
    } else {
791
0
        WalletBatch temp_batch(GetDatabase());
792
0
        UnlockCoin(outpoint, &temp_batch);
793
0
    }
794
795
317k
    std::pair<TxSpends::iterator, TxSpends::iterator> range;
796
317k
    range = mapTxSpends.equal_range(outpoint);
797
317k
    SyncMetaData(range);
798
317k
}
799
800
801
void CWallet::AddToSpends(const CWalletTx& wtx, WalletBatch* batch)
802
84.3k
{
803
84.3k
    if (wtx.IsCoinBase()) // Coinbases don't spend anything!
804
0
        return;
805
806
84.3k
    for (const CTxIn& txin : wtx.tx->vin)
807
317k
        AddToSpends(txin.prevout, wtx.GetHash(), batch);
808
84.3k
}
809
810
bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
811
0
{
812
0
    if (IsCrypted())
813
0
        return false;
814
815
0
    CKeyingMaterial _vMasterKey;
816
817
0
    _vMasterKey.resize(WALLET_CRYPTO_KEY_SIZE);
818
0
    GetStrongRandBytes(_vMasterKey);
819
820
0
    CMasterKey kMasterKey;
821
822
0
    kMasterKey.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE);
823
0
    GetStrongRandBytes(kMasterKey.vchSalt);
824
825
0
    CCrypter crypter;
826
0
    constexpr MillisecondsDouble target{100};
827
0
    auto start{SteadyClock::now()};
828
0
    crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, 25000, kMasterKey.nDerivationMethod);
829
0
    kMasterKey.nDeriveIterations = static_cast<unsigned int>(25000 * target / (SteadyClock::now() - start));
830
831
0
    start = SteadyClock::now();
832
0
    crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod);
833
0
    kMasterKey.nDeriveIterations = (kMasterKey.nDeriveIterations + static_cast<unsigned int>(kMasterKey.nDeriveIterations * target / (SteadyClock::now() - start))) / 2;
834
835
0
    if (kMasterKey.nDeriveIterations < 25000)
836
0
        kMasterKey.nDeriveIterations = 25000;
837
838
0
    WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", kMasterKey.nDeriveIterations);
839
840
0
    if (!crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod))
841
0
        return false;
842
0
    if (!crypter.Encrypt(_vMasterKey, kMasterKey.vchCryptedKey))
843
0
        return false;
844
845
0
    {
846
0
        LOCK2(m_relock_mutex, cs_wallet);
847
0
        mapMasterKeys[++nMasterKeyMaxID] = kMasterKey;
848
0
        WalletBatch* encrypted_batch = new WalletBatch(GetDatabase());
849
0
        if (!encrypted_batch->TxnBegin()) {
850
0
            delete encrypted_batch;
851
0
            encrypted_batch = nullptr;
852
0
            return false;
853
0
        }
854
0
        encrypted_batch->WriteMasterKey(nMasterKeyMaxID, kMasterKey);
855
856
0
        for (const auto& spk_man_pair : m_spk_managers) {
857
0
            auto spk_man = spk_man_pair.second.get();
858
0
            if (!spk_man->Encrypt(_vMasterKey, encrypted_batch)) {
859
0
                encrypted_batch->TxnAbort();
860
0
                delete encrypted_batch;
861
0
                encrypted_batch = nullptr;
862
                // We now probably have half of our keys encrypted in memory, and half not...
863
                // die and let the user reload the unencrypted wallet.
864
0
                assert(false);
865
0
            }
866
0
        }
867
868
        // Encryption was introduced in version 0.4.0
869
0
        SetMinVersion(FEATURE_WALLETCRYPT, encrypted_batch);
870
871
0
        if (!encrypted_batch->TxnCommit()) {
872
0
            delete encrypted_batch;
873
0
            encrypted_batch = nullptr;
874
            // We now have keys encrypted in memory, but not on disk...
875
            // die to avoid confusion and let the user reload the unencrypted wallet.
876
0
            assert(false);
877
0
        }
878
879
0
        delete encrypted_batch;
880
0
        encrypted_batch = nullptr;
881
882
0
        Lock();
883
0
        Unlock(strWalletPassphrase);
884
885
        // If we are using descriptors, make new descriptors with a new seed
886
0
        if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) && !IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
887
0
            SetupDescriptorScriptPubKeyMans();
888
0
        } else if (auto spk_man = GetLegacyScriptPubKeyMan()) {
889
            // if we are using HD, replace the HD seed with a new one
890
0
            if (spk_man->IsHDEnabled()) {
891
0
                if (!spk_man->SetupGeneration(true)) {
892
0
                    return false;
893
0
                }
894
0
            }
895
0
        }
896
0
        Lock();
897
898
        // Need to completely rewrite the wallet file; if we don't, bdb might keep
899
        // bits of the unencrypted private key in slack space in the database file.
900
0
        GetDatabase().Rewrite();
901
902
        // BDB seems to have a bad habit of writing old data into
903
        // slack space in .dat files; that is bad if the old data is
904
        // unencrypted private keys. So:
905
0
        GetDatabase().ReloadDbEnv();
906
907
0
    }
908
0
    NotifyStatusChanged(this);
909
910
0
    return true;
911
0
}
912
913
DBErrors CWallet::ReorderTransactions()
914
0
{
915
0
    LOCK(cs_wallet);
916
0
    WalletBatch batch(GetDatabase());
917
918
    // Old wallets didn't have any defined order for transactions
919
    // Probably a bad idea to change the output of this
920
921
    // First: get all CWalletTx into a sorted-by-time multimap.
922
0
    typedef std::multimap<int64_t, CWalletTx*> TxItems;
923
0
    TxItems txByTime;
924
925
0
    for (auto& entry : mapWallet)
926
0
    {
927
0
        CWalletTx* wtx = &entry.second;
928
0
        txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx));
929
0
    }
930
931
0
    nOrderPosNext = 0;
932
0
    std::vector<int64_t> nOrderPosOffsets;
933
0
    for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it)
934
0
    {
935
0
        CWalletTx *const pwtx = (*it).second;
936
0
        int64_t& nOrderPos = pwtx->nOrderPos;
937
938
0
        if (nOrderPos == -1)
939
0
        {
940
0
            nOrderPos = nOrderPosNext++;
941
0
            nOrderPosOffsets.push_back(nOrderPos);
942
943
0
            if (!batch.WriteTx(*pwtx))
944
0
                return DBErrors::LOAD_FAIL;
945
0
        }
946
0
        else
947
0
        {
948
0
            int64_t nOrderPosOff = 0;
949
0
            for (const int64_t& nOffsetStart : nOrderPosOffsets)
950
0
            {
951
0
                if (nOrderPos >= nOffsetStart)
952
0
                    ++nOrderPosOff;
953
0
            }
954
0
            nOrderPos += nOrderPosOff;
955
0
            nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1);
956
957
0
            if (!nOrderPosOff)
958
0
                continue;
959
960
            // Since we're changing the order, write it back
961
0
            if (!batch.WriteTx(*pwtx))
962
0
                return DBErrors::LOAD_FAIL;
963
0
        }
964
0
    }
965
0
    batch.WriteOrderPosNext(nOrderPosNext);
966
967
0
    return DBErrors::LOAD_OK;
968
0
}
969
970
int64_t CWallet::IncOrderPosNext(WalletBatch* batch)
971
84.3k
{
972
84.3k
    AssertLockHeld(cs_wallet);
973
84.3k
    int64_t nRet = nOrderPosNext++;
974
84.3k
    if (batch) {
975
84.3k
        batch->WriteOrderPosNext(nOrderPosNext);
976
84.3k
    } else {
977
0
        WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext);
978
0
    }
979
84.3k
    return nRet;
980
84.3k
}
981
982
void CWallet::MarkDirty()
983
0
{
984
0
    {
985
0
        LOCK(cs_wallet);
986
0
        for (std::pair<const uint256, CWalletTx>& item : mapWallet)
987
0
            item.second.MarkDirty();
988
0
    }
989
0
}
990
991
bool CWallet::MarkReplaced(const uint256& originalHash, const uint256& newHash)
992
0
{
993
0
    LOCK(cs_wallet);
994
995
0
    auto mi = mapWallet.find(originalHash);
996
997
    // There is a bug if MarkReplaced is not called on an existing wallet transaction.
998
0
    assert(mi != mapWallet.end());
999
1000
0
    CWalletTx& wtx = (*mi).second;
1001
1002
    // Ensure for now that we're not overwriting data
1003
0
    assert(wtx.mapValue.count("replaced_by_txid") == 0);
1004
1005
0
    wtx.mapValue["replaced_by_txid"] = newHash.ToString();
1006
1007
    // Refresh mempool status without waiting for transactionRemovedFromMempool or transactionAddedToMempool
1008
0
    RefreshMempoolStatus(wtx, chain());
1009
1010
0
    WalletBatch batch(GetDatabase());
1011
1012
0
    bool success = true;
1013
0
    if (!batch.WriteTx(wtx)) {
1014
0
        WalletLogPrintf("%s: Updating batch tx %s failed\n", __func__, wtx.GetHash().ToString());
1015
0
        success = false;
1016
0
    }
1017
1018
0
    NotifyTransactionChanged(originalHash, CT_UPDATED);
1019
1020
0
    return success;
1021
0
}
1022
1023
void CWallet::SetSpentKeyState(WalletBatch& batch, const uint256& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations)
1024
0
{
1025
0
    AssertLockHeld(cs_wallet);
1026
0
    const CWalletTx* srctx = GetWalletTx(hash);
1027
0
    if (!srctx) return;
1028
1029
0
    CTxDestination dst;
1030
0
    if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) {
1031
0
        if (IsMine(dst)) {
1032
0
            if (used != IsAddressPreviouslySpent(dst)) {
1033
0
                if (used) {
1034
0
                    tx_destinations.insert(dst);
1035
0
                }
1036
0
                SetAddressPreviouslySpent(batch, dst, used);
1037
0
            }
1038
0
        }
1039
0
    }
1040
0
}
1041
1042
bool CWallet::IsSpentKey(const CScript& scriptPubKey) const
1043
0
{
1044
0
    AssertLockHeld(cs_wallet);
1045
0
    CTxDestination dest;
1046
0
    if (!ExtractDestination(scriptPubKey, dest)) {
1047
0
        return false;
1048
0
    }
1049
0
    if (IsAddressPreviouslySpent(dest)) {
1050
0
        return true;
1051
0
    }
1052
1053
0
    if (LegacyScriptPubKeyMan* spk_man = GetLegacyScriptPubKeyMan()) {
1054
0
        for (const auto& keyid : GetAffectedKeys(scriptPubKey, *spk_man)) {
1055
0
            WitnessV0KeyHash wpkh_dest(keyid);
1056
0
            if (IsAddressPreviouslySpent(wpkh_dest)) {
1057
0
                return true;
1058
0
            }
1059
0
            ScriptHash sh_wpkh_dest(GetScriptForDestination(wpkh_dest));
1060
0
            if (IsAddressPreviouslySpent(sh_wpkh_dest)) {
1061
0
                return true;
1062
0
            }
1063
0
            PKHash pkh_dest(keyid);
1064
0
            if (IsAddressPreviouslySpent(pkh_dest)) {
1065
0
                return true;
1066
0
            }
1067
0
        }
1068
0
    }
1069
0
    return false;
1070
0
}
1071
1072
CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const TxState& state, const UpdateWalletTxFn& update_wtx, bool fFlushOnClose, bool rescanning_old_block)
1073
84.3k
{
1074
84.3k
    LOCK(cs_wallet);
1075
1076
84.3k
    WalletBatch batch(GetDatabase(), fFlushOnClose);
1077
1078
84.3k
    uint256 hash = tx->GetHash();
1079
1080
84.3k
    if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
1081
        // Mark used destinations
1082
0
        std::set<CTxDestination> tx_destinations;
1083
1084
0
        for (const CTxIn& txin : tx->vin) {
1085
0
            const COutPoint& op = txin.prevout;
1086
0
            SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations);
1087
0
        }
1088
1089
0
        MarkDestinationsDirty(tx_destinations);
1090
0
    }
1091
1092
    // Inserts only if not already there, returns tx inserted or tx found
1093
84.3k
    auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(tx, state));
1094
84.3k
    CWalletTx& wtx = (*ret.first).second;
1095
84.3k
    bool fInsertedNew = ret.second;
1096
84.3k
    bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew);
1097
84.3k
    if (fInsertedNew) {
1098
84.3k
        wtx.nTimeReceived = GetTime();
1099
84.3k
        wtx.nOrderPos = IncOrderPosNext(&batch);
1100
84.3k
        wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1101
84.3k
        wtx.nTimeSmart = ComputeTimeSmart(wtx, rescanning_old_block);
1102
84.3k
        AddToSpends(wtx, &batch);
1103
1104
        // Update birth time when tx time is older than it.
1105
84.3k
        MaybeUpdateBirthTime(wtx.GetTxTime());
1106
84.3k
    }
1107
1108
84.3k
    if (!fInsertedNew)
1109
0
    {
1110
0
        if (state.index() != wtx.m_state.index()) {
1111
0
            wtx.m_state = state;
1112
0
            fUpdated = true;
1113
0
        } else {
1114
0
            assert(TxStateSerializedIndex(wtx.m_state) == TxStateSerializedIndex(state));
1115
0
            assert(TxStateSerializedBlockHash(wtx.m_state) == TxStateSerializedBlockHash(state));
1116
0
        }
1117
        // If we have a witness-stripped version of this transaction, and we
1118
        // see a new version with a witness, then we must be upgrading a pre-segwit
1119
        // wallet.  Store the new version of the transaction with the witness,
1120
        // as the stripped-version must be invalid.
1121
        // TODO: Store all versions of the transaction, instead of just one.
1122
0
        if (tx->HasWitness() && !wtx.tx->HasWitness()) {
1123
0
            wtx.SetTx(tx);
1124
0
            fUpdated = true;
1125
0
        }
1126
0
    }
1127
1128
    // Mark inactive coinbase transactions and their descendants as abandoned
1129
84.3k
    if (wtx.IsCoinBase() && wtx.isInactive()) {
1130
0
        std::vector<CWalletTx*> txs{&wtx};
1131
1132
0
        TxStateInactive inactive_state = TxStateInactive{/*abandoned=*/true};
1133
1134
0
        while (!txs.empty()) {
1135
0
            CWalletTx* desc_tx = txs.back();
1136
0
            txs.pop_back();
1137
0
            desc_tx->m_state = inactive_state;
1138
            // Break caches since we have changed the state
1139
0
            desc_tx->MarkDirty();
1140
0
            batch.WriteTx(*desc_tx);
1141
0
            MarkInputsDirty(desc_tx->tx);
1142
0
            for (unsigned int i = 0; i < desc_tx->tx->vout.size(); ++i) {
1143
0
                COutPoint outpoint(desc_tx->GetHash(), i);
1144
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(outpoint);
1145
0
                for (TxSpends::const_iterator it = range.first; it != range.second; ++it) {
1146
0
                    const auto wit = mapWallet.find(it->second);
1147
0
                    if (wit != mapWallet.end()) {
1148
0
                        txs.push_back(&wit->second);
1149
0
                    }
1150
0
                }
1151
0
            }
1152
0
        }
1153
0
    }
1154
1155
    //// debug print
1156
84.3k
    WalletLogPrintf("AddToWallet %s  %s%s %s\n", hash.ToString(), (fInsertedNew ? "new" : ""), (fUpdated ? "update" : ""), TxStateString(state));
1157
1158
    // Write to disk
1159
84.3k
    if (fInsertedNew || fUpdated)
1160
84.3k
        if (!batch.WriteTx(wtx))
1161
0
            return nullptr;
1162
1163
    // Break debit/credit balance caches:
1164
84.3k
    wtx.MarkDirty();
1165
1166
    // Notify UI of new or updated transaction
1167
84.3k
    NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED);
1168
1169
84.3k
#if HAVE_SYSTEM
1170
    // notify an external script when a wallet transaction comes in or is updated
1171
84.3k
    std::string strCmd = m_notify_tx_changed_script;
1172
1173
84.3k
    if (!strCmd.empty())
1174
0
    {
1175
0
        ReplaceAll(strCmd, "%s", hash.GetHex());
1176
0
        if (auto* conf = wtx.state<TxStateConfirmed>())
1177
0
        {
1178
0
            ReplaceAll(strCmd, "%b", conf->confirmed_block_hash.GetHex());
1179
0
            ReplaceAll(strCmd, "%h", ToString(conf->confirmed_block_height));
1180
0
        } else {
1181
0
            ReplaceAll(strCmd, "%b", "unconfirmed");
1182
0
            ReplaceAll(strCmd, "%h", "-1");
1183
0
        }
1184
0
#ifndef WIN32
1185
        // Substituting the wallet name isn't currently supported on windows
1186
        // because windows shell escaping has not been implemented yet:
1187
        // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
1188
        // A few ways it could be implemented in the future are described in:
1189
        // https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
1190
0
        ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
1191
0
#endif
1192
0
        std::thread t(runCommand, strCmd);
1193
0
        t.detach(); // thread runs free
1194
0
    }
1195
84.3k
#endif
1196
1197
84.3k
    return &wtx;
1198
84.3k
}
1199
1200
bool CWallet::LoadToWallet(const uint256& hash, const UpdateWalletTxFn& fill_wtx)
1201
0
{
1202
0
    const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(nullptr, TxStateInactive{}));
1203
0
    CWalletTx& wtx = ins.first->second;
1204
0
    if (!fill_wtx(wtx, ins.second)) {
1205
0
        return false;
1206
0
    }
1207
    // If wallet doesn't have a chain (e.g when using bitcoin-wallet tool),
1208
    // don't bother to update txn.
1209
0
    if (HaveChain()) {
1210
0
      wtx.updateState(chain());
1211
0
    }
1212
0
    if (/* insertion took place */ ins.second) {
1213
0
        wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
1214
0
    }
1215
0
    AddToSpends(wtx);
1216
0
    for (const CTxIn& txin : wtx.tx->vin) {
1217
0
        auto it = mapWallet.find(txin.prevout.hash);
1218
0
        if (it != mapWallet.end()) {
1219
0
            CWalletTx& prevtx = it->second;
1220
0
            if (auto* prev = prevtx.state<TxStateBlockConflicted>()) {
1221
0
                MarkConflicted(prev->conflicting_block_hash, prev->conflicting_block_height, wtx.GetHash());
1222
0
            }
1223
0
        }
1224
0
    }
1225
1226
    // Update birth time when tx time is older than it.
1227
0
    MaybeUpdateBirthTime(wtx.GetTxTime());
1228
1229
0
    return true;
1230
0
}
1231
1232
bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, const SyncTxState& state, bool fUpdate, bool rescanning_old_block)
1233
114k
{
1234
114k
    const CTransaction& tx = *ptx;
1235
114k
    {
1236
114k
        AssertLockHeld(cs_wallet);
1237
1238
114k
        if (auto* conf = std::get_if<TxStateConfirmed>(&state)) {
1239
386k
            for (const CTxIn& txin : tx.vin) {
1240
386k
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout);
1241
386k
                while (range.first != range.second) {
1242
0
                    if (range.first->second != tx.GetHash()) {
1243
0
                        WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), conf->confirmed_block_hash.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n);
1244
0
                        MarkConflicted(conf->confirmed_block_hash, conf->confirmed_block_height, range.first->second);
1245
0
                    }
1246
0
                    range.first++;
1247
0
                }
1248
386k
            }
1249
114k
        }
1250
1251
114k
        bool fExisted = mapWallet.count(tx.GetHash()) != 0;
1252
114k
        if (fExisted && !fUpdate) return false;
1253
114k
        if (fExisted || IsMine(tx) || IsFromMe(tx))
1254
84.3k
        {
1255
            /* Check if any keys in the wallet keypool that were supposed to be unused
1256
             * have appeared in a new transaction. If so, remove those keys from the keypool.
1257
             * This can happen when restoring an old wallet backup that does not contain
1258
             * the mostly recently created transactions from newer versions of the wallet.
1259
             */
1260
1261
            // loop though all outputs
1262
329k
            for (const CTxOut& txout: tx.vout) {
1263
329k
                for (const auto& spk_man : GetScriptPubKeyMans(txout.scriptPubKey)) {
1264
215k
                    for (auto &dest : spk_man->MarkUnusedAddresses(txout.scriptPubKey)) {
1265
                        // If internal flag is not defined try to infer it from the ScriptPubKeyMan
1266
0
                        if (!dest.internal.has_value()) {
1267
0
                            dest.internal = IsInternalScriptPubKeyMan(spk_man);
1268
0
                        }
1269
1270
                        // skip if can't determine whether it's a receiving address or not
1271
0
                        if (!dest.internal.has_value()) continue;
1272
1273
                        // If this is a receiving address and it's not in the address book yet
1274
                        // (e.g. it wasn't generated on this node or we're restoring from backup)
1275
                        // add it to the address book for proper transaction accounting
1276
0
                        if (!*dest.internal && !FindAddressBookEntry(dest.dest, /* allow_change= */ false)) {
1277
0
                            SetAddressBook(dest.dest, "", AddressPurpose::RECEIVE);
1278
0
                        }
1279
0
                    }
1280
215k
                }
1281
329k
            }
1282
1283
            // Block disconnection override an abandoned tx as unconfirmed
1284
            // which means user may have to call abandontransaction again
1285
84.3k
            TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);
wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKS8_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
Line
Count
Source
1285
84.3k
            TxState tx_state = std::visit([](auto&& s) -> TxState { return s; }, state);
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKS9_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
Unexecuted instantiation: wallet.cpp:_ZZN6wallet7CWallet24AddToWalletIfInvolvingMeERKSt10shared_ptrIK12CTransactionERKSt7variantIJNS_16TxStateConfirmedENS_16TxStateInMempoolENS_15TxStateInactiveEEEbbENK3$_0clIRKSA_EES7_IJS8_S9_NS_22TxStateBlockConflictedESA_NS_19TxStateUnrecognizedEEEOT_
1286
84.3k
            CWalletTx* wtx = AddToWallet(MakeTransactionRef(tx), tx_state, /*update_wtx=*/nullptr, /*fFlushOnClose=*/false, rescanning_old_block);
1287
84.3k
            if (!wtx) {
1288
                // Can only be nullptr if there was a db write error (missing db, read-only db or a db engine internal writing error).
1289
                // As we only store arriving transaction in this process, and we don't want an inconsistent state, let's throw an error.
1290
0
                throw std::runtime_error("DB error adding transaction to wallet, write failed");
1291
0
            }
1292
84.3k
            return true;
1293
84.3k
        }
1294
114k
    }
1295
30.3k
    return false;
1296
114k
}
1297
1298
bool CWallet::TransactionCanBeAbandoned(const uint256& hashTx) const
1299
0
{
1300
0
    LOCK(cs_wallet);
1301
0
    const CWalletTx* wtx = GetWalletTx(hashTx);
1302
0
    return wtx && !wtx->isAbandoned() && GetTxDepthInMainChain(*wtx) == 0 && !wtx->InMempool();
1303
0
}
1304
1305
void CWallet::MarkInputsDirty(const CTransactionRef& tx)
1306
84.3k
{
1307
317k
    for (const CTxIn& txin : tx->vin) {
1308
317k
        auto it = mapWallet.find(txin.prevout.hash);
1309
317k
        if (it != mapWallet.end()) {
1310
261k
            it->second.MarkDirty();
1311
261k
        }
1312
317k
    }
1313
84.3k
}
1314
1315
bool CWallet::AbandonTransaction(const uint256& hashTx)
1316
0
{
1317
0
    LOCK(cs_wallet);
1318
0
    auto it = mapWallet.find(hashTx);
1319
0
    assert(it != mapWallet.end());
1320
0
    return AbandonTransaction(it->second);
1321
0
}
1322
1323
bool CWallet::AbandonTransaction(CWalletTx& tx)
1324
0
{
1325
    // Can't mark abandoned if confirmed or in mempool
1326
0
    if (GetTxDepthInMainChain(tx) != 0 || tx.InMempool()) {
1327
0
        return false;
1328
0
    }
1329
1330
0
    auto try_updating_state = [](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1331
        // If the orig tx was not in block/mempool, none of its spends can be.
1332
0
        assert(!wtx.isConfirmed());
1333
0
        assert(!wtx.InMempool());
1334
        // If already conflicted or abandoned, no need to set abandoned
1335
0
        if (!wtx.isBlockConflicted() && !wtx.isAbandoned()) {
1336
0
            wtx.m_state = TxStateInactive{/*abandoned=*/true};
1337
0
            return TxUpdate::NOTIFY_CHANGED;
1338
0
        }
1339
0
        return TxUpdate::UNCHANGED;
1340
0
    };
1341
1342
    // Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too.
1343
    // States are not permanent, so these transactions can become unabandoned if they are re-added to the
1344
    // mempool, or confirmed in a block, or conflicted.
1345
    // Note: If the reorged coinbase is re-added to the main chain, the descendants that have not had their
1346
    // states change will remain abandoned and will require manual broadcast if the user wants them.
1347
1348
0
    RecursiveUpdateTxState(tx.GetHash(), try_updating_state);
1349
1350
0
    return true;
1351
0
}
1352
1353
void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const uint256& hashTx)
1354
0
{
1355
0
    LOCK(cs_wallet);
1356
1357
    // If number of conflict confirms cannot be determined, this means
1358
    // that the block is still unknown or not yet part of the main chain,
1359
    // for example when loading the wallet during a reindex. Do nothing in that
1360
    // case.
1361
0
    if (m_last_block_processed_height < 0 || conflicting_height < 0) {
1362
0
        return;
1363
0
    }
1364
0
    int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1;
1365
0
    if (conflictconfirms >= 0)
1366
0
        return;
1367
1368
0
    auto try_updating_state = [&](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1369
0
        if (conflictconfirms < GetTxDepthInMainChain(wtx)) {
1370
            // Block is 'more conflicted' than current confirm; update.
1371
            // Mark transaction as conflicted with this block.
1372
0
            wtx.m_state = TxStateBlockConflicted{hashBlock, conflicting_height};
1373
0
            return TxUpdate::CHANGED;
1374
0
        }
1375
0
        return TxUpdate::UNCHANGED;
1376
0
    };
1377
1378
    // Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too.
1379
0
    RecursiveUpdateTxState(hashTx, try_updating_state);
1380
1381
0
}
1382
1383
0
void CWallet::RecursiveUpdateTxState(const uint256& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1384
    // Do not flush the wallet here for performance reasons
1385
0
    WalletBatch batch(GetDatabase(), false);
1386
0
    RecursiveUpdateTxState(&batch, tx_hash, try_updating_state);
1387
0
}
1388
1389
317k
void CWallet::RecursiveUpdateTxState(WalletBatch* batch, const uint256& tx_hash, const TryUpdatingStateFn& try_updating_state) {
1390
317k
    std::set<uint256> todo;
1391
317k
    std::set<uint256> done;
1392
1393
317k
    todo.insert(tx_hash);
1394
1395
635k
    while (!todo.empty()) {
1396
317k
        uint256 now = *todo.begin();
1397
317k
        todo.erase(now);
1398
317k
        done.insert(now);
1399
317k
        auto it = mapWallet.find(now);
1400
317k
        assert(it != mapWallet.end());
1401
317k
        CWalletTx& wtx = it->second;
1402
1403
317k
        TxUpdate update_state = try_updating_state(wtx);
1404
317k
        if (update_state != TxUpdate::UNCHANGED) {
1405
0
            wtx.MarkDirty();
1406
0
            if (batch) batch->WriteTx(wtx);
1407
            // Iterate over all its outputs, and update those tx states as well (if applicable)
1408
0
            for (unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
1409
0
                std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(COutPoint(Txid::FromUint256(now), i));
1410
0
                for (TxSpends::const_iterator iter = range.first; iter != range.second; ++iter) {
1411
0
                    if (!done.count(iter->second)) {
1412
0
                        todo.insert(iter->second);
1413
0
                    }
1414
0
                }
1415
0
            }
1416
1417
0
            if (update_state == TxUpdate::NOTIFY_CHANGED) {
1418
0
                NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED);
1419
0
            }
1420
1421
            // If a transaction changes its tx state, that usually changes the balance
1422
            // available of the outputs it spends. So force those to be recomputed
1423
0
            MarkInputsDirty(wtx.tx);
1424
0
        }
1425
317k
    }
1426
317k
}
1427
1428
void CWallet::SyncTransaction(const CTransactionRef& ptx, const SyncTxState& state, bool update_tx, bool rescanning_old_block)
1429
114k
{
1430
114k
    if (!AddToWalletIfInvolvingMe(ptx, state, update_tx, rescanning_old_block))
1431
30.3k
        return; // Not one of ours
1432
1433
    // If a transaction changes 'conflicted' state, that changes the balance
1434
    // available of the outputs it spends. So force those to be
1435
    // recomputed, also:
1436
84.3k
    MarkInputsDirty(ptx);
1437
84.3k
}
1438
1439
0
void CWallet::transactionAddedToMempool(const CTransactionRef& tx) {
1440
0
    LOCK(cs_wallet);
1441
0
    SyncTransaction(tx, TxStateInMempool{});
1442
1443
0
    auto it = mapWallet.find(tx->GetHash());
1444
0
    if (it != mapWallet.end()) {
1445
0
        RefreshMempoolStatus(it->second, chain());
1446
0
    }
1447
1448
0
    const Txid& txid = tx->GetHash();
1449
1450
0
    for (const CTxIn& tx_in : tx->vin) {
1451
        // For each wallet transaction spending this prevout..
1452
0
        for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1453
0
            const uint256& spent_id = range.first->second;
1454
            // Skip the recently added tx
1455
0
            if (spent_id == txid) continue;
1456
0
            RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1457
0
                return wtx.mempool_conflicts.insert(txid).second ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1458
0
            });
1459
0
        }
1460
0
    }
1461
0
}
1462
1463
114k
void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason) {
1464
114k
    LOCK(cs_wallet);
1465
114k
    auto it = mapWallet.find(tx->GetHash());
1466
114k
    if (it != mapWallet.end()) {
1467
84.3k
        RefreshMempoolStatus(it->second, chain());
1468
84.3k
    }
1469
    // Handle transactions that were removed from the mempool because they
1470
    // conflict with transactions in a newly connected block.
1471
114k
    if (reason == MemPoolRemovalReason::CONFLICT) {
1472
        // Trigger external -walletnotify notifications for these transactions.
1473
        // Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons:
1474
        //
1475
        // 1. The transactionRemovedFromMempool callback does not currently
1476
        //    provide the conflicting block's hash and height, and for backwards
1477
        //    compatibility reasons it may not be not safe to store conflicted
1478
        //    wallet transactions with a null block hash. See
1479
        //    https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993.
1480
        // 2. For most of these transactions, the wallet's internal conflict
1481
        //    detection in the blockConnected handler will subsequently call
1482
        //    MarkConflicted and update them with CONFLICTED status anyway. This
1483
        //    applies to any wallet transaction that has inputs spent in the
1484
        //    block, or that has ancestors in the wallet with inputs spent by
1485
        //    the block.
1486
        // 3. Longstanding behavior since the sync implementation in
1487
        //    https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync
1488
        //    implementation before that was to mark these transactions
1489
        //    unconfirmed rather than conflicted.
1490
        //
1491
        // Nothing described above should be seen as an unchangeable requirement
1492
        // when improving this code in the future. The wallet's heuristics for
1493
        // distinguishing between conflicted and unconfirmed transactions are
1494
        // imperfect, and could be improved in general, see
1495
        // https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking
1496
0
        SyncTransaction(tx, TxStateInactive{});
1497
0
    }
1498
1499
114k
    const Txid& txid = tx->GetHash();
1500
1501
386k
    for (const CTxIn& tx_in : tx->vin) {
1502
        // Iterate over all wallet transactions spending txin.prev
1503
        // and recursively mark them as no longer conflicting with
1504
        // txid
1505
704k
        for (auto range = mapTxSpends.equal_range(tx_in.prevout); range.first != range.second; range.first++) {
1506
317k
            const uint256& spent_id = range.first->second;
1507
1508
317k
            RecursiveUpdateTxState(/*batch=*/nullptr, spent_id, [&txid](CWalletTx& wtx) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
1509
317k
                return wtx.mempool_conflicts.erase(txid) ? TxUpdate::CHANGED : TxUpdate::UNCHANGED;
1510
317k
            });
1511
317k
        }
1512
386k
    }
1513
114k
}
1514
1515
void CWallet::blockConnected(ChainstateRole role, const interfaces::BlockInfo& block)
1516
13.7k
{
1517
13.7k
    if (role == ChainstateRole::BACKGROUND) {
1518
0
        return;
1519
0
    }
1520
13.7k
    assert(block.data);
1521
13.7k
    LOCK(cs_wallet);
1522
1523
13.7k
    m_last_block_processed_height = block.height;
1524
13.7k
    m_last_block_processed = block.hash;
1525
1526
    // No need to scan block if it was created before the wallet birthday.
1527
    // Uses chain max time and twice the grace period to adjust time for block time variability.
1528
13.7k
    if (block.chain_time_max < m_birth_time.load() - (TIMESTAMP_WINDOW * 2)) return;
1529
1530
    // Scan block
1531
128k
    for (size_t index = 0; index < block.data->vtx.size(); index++) {
1532
114k
        SyncTransaction(block.data->vtx[index], TxStateConfirmed{block.hash, block.height, static_cast<int>(index)});
1533
114k
        transactionRemovedFromMempool(block.data->vtx[index], MemPoolRemovalReason::BLOCK);
1534
114k
    }
1535
13.7k
}
1536
1537
void CWallet::blockDisconnected(const interfaces::BlockInfo& block)
1538
0
{
1539
0
    assert(block.data);
1540
0
    LOCK(cs_wallet);
1541
1542
    // At block disconnection, this will change an abandoned transaction to
1543
    // be unconfirmed, whether or not the transaction is added back to the mempool.
1544
    // User may have to call abandontransaction again. It may be addressed in the
1545
    // future with a stickier abandoned state or even removing abandontransaction call.
1546
0
    m_last_block_processed_height = block.height - 1;
1547
0
    m_last_block_processed = *Assert(block.prev_hash);
1548
1549
0
    int disconnect_height = block.height;
1550
1551
0
    for (size_t index = 0; index < block.data->vtx.size(); index++) {
1552
0
        const CTransactionRef& ptx = Assert(block.data)->vtx[index];
1553
        // Coinbase transactions are not only inactive but also abandoned,
1554
        // meaning they should never be relayed standalone via the p2p protocol.
1555
0
        SyncTransaction(ptx, TxStateInactive{/*abandoned=*/index == 0});
1556
1557
0
        for (const CTxIn& tx_in : ptx->vin) {
1558
            // No other wallet transactions conflicted with this transaction
1559
0
            if (mapTxSpends.count(tx_in.prevout) < 1) continue;
1560
1561
0
            std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(tx_in.prevout);
1562
1563
            // For all of the spends that conflict with this transaction
1564
0
            for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it) {
1565
0
                CWalletTx& wtx = mapWallet.find(_it->second)->second;
1566
1567
0
                if (!wtx.isBlockConflicted()) continue;
1568
1569
0
                auto try_updating_state = [&](CWalletTx& tx) {
1570
0
                    if (!tx.isBlockConflicted()) return TxUpdate::UNCHANGED;
1571
0
                    if (tx.state<TxStateBlockConflicted>()->conflicting_block_height >= disconnect_height) {
1572
0
                        tx.m_state = TxStateInactive{};
1573
0
                        return TxUpdate::CHANGED;
1574
0
                    }
1575
0
                    return TxUpdate::UNCHANGED;
1576
0
                };
1577
1578
0
                RecursiveUpdateTxState(wtx.tx->GetHash(), try_updating_state);
1579
0
            }
1580
0
        }
1581
0
    }
1582
0
}
1583
1584
void CWallet::updatedBlockTip()
1585
0
{
1586
0
    m_best_block_time = GetTime();
1587
0
}
1588
1589
0
void CWallet::BlockUntilSyncedToCurrentChain() const {
1590
0
    AssertLockNotHeld(cs_wallet);
1591
    // Skip the queue-draining stuff if we know we're caught up with
1592
    // chain().Tip(), otherwise put a callback in the validation interface queue and wait
1593
    // for the queue to drain enough to execute it (indicating we are caught up
1594
    // at least with the time we entered this function).
1595
0
    uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed);
1596
0
    chain().waitForNotificationsIfTipChanged(last_block_hash);
1597
0
}
1598
1599
// Note that this function doesn't distinguish between a 0-valued input,
1600
// and a not-"is mine" (according to the filter) input.
1601
CAmount CWallet::GetDebit(const CTxIn &txin, const isminefilter& filter) const
1602
549k
{
1603
549k
    {
1604
549k
        LOCK(cs_wallet);
1605
549k
        const auto mi = mapWallet.find(txin.prevout.hash);
1606
549k
        if (mi != mapWallet.end())
1607
427k
        {
1608
427k
            const CWalletTx& prev = (*mi).second;
1609
427k
            if (txin.prevout.n < prev.tx->vout.size())
1610
427k
                if (IsMine(prev.tx->vout[txin.prevout.n]) & filter)
1611
298k
                    return prev.tx->vout[txin.prevout.n].nValue;
1612
427k
        }
1613
549k
    }
1614
251k
    return 0;
1615
549k
}
1616
1617
isminetype CWallet::IsMine(const CTxOut& txout) const
1618
5.85M
{
1619
5.85M
    AssertLockHeld(cs_wallet);
1620
5.85M
    return IsMine(txout.scriptPubKey);
1621
5.85M
}
1622
1623
isminetype CWallet::IsMine(const CTxDestination& dest) const
1624
214k
{
1625
214k
    AssertLockHeld(cs_wallet);
1626
214k
    return IsMine(GetScriptForDestination(dest));
1627
214k
}
1628
1629
isminetype CWallet::IsMine(const CScript& script) const
1630
6.07M
{
1631
6.07M
    AssertLockHeld(cs_wallet);
1632
1633
    // Search the cache so that IsMine is called only on the relevant SPKMs instead of on everything in m_spk_managers
1634
6.07M
    const auto& it = m_cached_spks.find(script);
1635
6.07M
    if (it != m_cached_spks.end()) {
1636
4.43M
        isminetype res = ISMINE_NO;
1637
4.43M
        for (const auto& spkm : it->second) {
1638
4.43M
            res = std::max(res, spkm->IsMine(script));
1639
4.43M
        }
1640
4.43M
        Assume(res == ISMINE_SPENDABLE);
1641
4.43M
        return res;
1642
4.43M
    }
1643
1644
    // Legacy wallet
1645
1.63M
    if (LegacyScriptPubKeyMan* spkm = GetLegacyScriptPubKeyMan()) {
1646
0
        return spkm->IsMine(script);
1647
0
    }
1648
1649
1.63M
    return ISMINE_NO;
1650
1.63M
}
1651
1652
bool CWallet::IsMine(const CTransaction& tx) const
1653
114k
{
1654
114k
    AssertLockHeld(cs_wallet);
1655
114k
    for (const CTxOut& txout : tx.vout)
1656
254k
        if (IsMine(txout))
1657
63.0k
            return true;
1658
51.5k
    return false;
1659
114k
}
1660
1661
isminetype CWallet::IsMine(const COutPoint& outpoint) const
1662
199k
{
1663
199k
    AssertLockHeld(cs_wallet);
1664
199k
    auto wtx = GetWalletTx(outpoint.hash);
1665
199k
    if (!wtx) {
1666
30.6k
        return ISMINE_NO;
1667
30.6k
    }
1668
168k
    if (outpoint.n >= wtx->tx->vout.size()) {
1669
0
        return ISMINE_NO;
1670
0
    }
1671
168k
    return IsMine(wtx->tx->vout[outpoint.n]);
1672
168k
}
1673
1674
bool CWallet::IsFromMe(const CTransaction& tx) const
1675
51.5k
{
1676
51.5k
    return (GetDebit(tx, ISMINE_ALL) > 0);
1677
51.5k
}
1678
1679
CAmount CWallet::GetDebit(const CTransaction& tx, const isminefilter& filter) const
1680
156k
{
1681
156k
    CAmount nDebit = 0;
1682
156k
    for (const CTxIn& txin : tx.vin)
1683
549k
    {
1684
549k
        nDebit += GetDebit(txin, filter);
1685
549k
        if (!MoneyRange(nDebit))
1686
0
            throw std::runtime_error(std::string(__func__) + ": value out of range");
1687
549k
    }
1688
156k
    return nDebit;
1689
156k
}
1690
1691
bool CWallet::IsHDEnabled() const
1692
0
{
1693
    // All Active ScriptPubKeyMans must be HD for this to be true
1694
0
    bool result = false;
1695
0
    for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
1696
0
        if (!spk_man->IsHDEnabled()) return false;
1697
0
        result = true;
1698
0
    }
1699
0
    return result;
1700
0
}
1701
1702
bool CWallet::CanGetAddresses(bool internal) const
1703
0
{
1704
0
    LOCK(cs_wallet);
1705
0
    if (m_spk_managers.empty()) return false;
1706
0
    for (OutputType t : OUTPUT_TYPES) {
1707
0
        auto spk_man = GetScriptPubKeyMan(t, internal);
1708
0
        if (spk_man && spk_man->CanGetAddresses(internal)) {
1709
0
            return true;
1710
0
        }
1711
0
    }
1712
0
    return false;
1713
0
}
1714
1715
void CWallet::SetWalletFlag(uint64_t flags)
1716
7.85k
{
1717
7.85k
    WalletBatch batch(GetDatabase());
1718
7.85k
    return SetWalletFlagWithDB(batch, flags);
1719
7.85k
}
1720
1721
void CWallet::SetWalletFlagWithDB(WalletBatch& batch, uint64_t flags)
1722
7.85k
{
1723
7.85k
    LOCK(cs_wallet);
1724
7.85k
    m_wallet_flags |= flags;
1725
7.85k
    if (!batch.WriteWalletFlags(m_wallet_flags))
1726
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1727
7.85k
}
1728
1729
void CWallet::UnsetWalletFlag(uint64_t flag)
1730
0
{
1731
0
    WalletBatch batch(GetDatabase());
1732
0
    UnsetWalletFlagWithDB(batch, flag);
1733
0
}
1734
1735
void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag)
1736
0
{
1737
0
    LOCK(cs_wallet);
1738
0
    m_wallet_flags &= ~flag;
1739
0
    if (!batch.WriteWalletFlags(m_wallet_flags))
1740
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1741
0
}
1742
1743
void CWallet::UnsetBlankWalletFlag(WalletBatch& batch)
1744
0
{
1745
0
    UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET);
1746
0
}
1747
1748
bool CWallet::IsWalletFlagSet(uint64_t flag) const
1749
3.19M
{
1750
3.19M
    return (m_wallet_flags & flag);
1751
3.19M
}
1752
1753
bool CWallet::LoadWalletFlags(uint64_t flags)
1754
0
{
1755
0
    LOCK(cs_wallet);
1756
0
    if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) {
1757
        // contains unknown non-tolerable wallet flags
1758
0
        return false;
1759
0
    }
1760
0
    m_wallet_flags = flags;
1761
1762
0
    return true;
1763
0
}
1764
1765
void CWallet::InitWalletFlags(uint64_t flags)
1766
0
{
1767
0
    LOCK(cs_wallet);
1768
1769
    // We should never be writing unknown non-tolerable wallet flags
1770
0
    assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32));
1771
    // This should only be used once, when creating a new wallet - so current flags are expected to be blank
1772
0
    assert(m_wallet_flags == 0);
1773
1774
0
    if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) {
1775
0
        throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
1776
0
    }
1777
1778
0
    if (!LoadWalletFlags(flags)) assert(false);
1779
0
}
1780
1781
bool CWallet::ImportScripts(const std::set<CScript> scripts, int64_t timestamp)
1782
0
{
1783
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1784
0
    if (!spk_man) {
1785
0
        return false;
1786
0
    }
1787
0
    LOCK(spk_man->cs_KeyStore);
1788
0
    return spk_man->ImportScripts(scripts, timestamp);
1789
0
}
1790
1791
bool CWallet::ImportPrivKeys(const std::map<CKeyID, CKey>& privkey_map, const int64_t timestamp)
1792
0
{
1793
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1794
0
    if (!spk_man) {
1795
0
        return false;
1796
0
    }
1797
0
    LOCK(spk_man->cs_KeyStore);
1798
0
    return spk_man->ImportPrivKeys(privkey_map, timestamp);
1799
0
}
1800
1801
bool CWallet::ImportPubKeys(const std::vector<std::pair<CKeyID, bool>>& ordered_pubkeys, const std::map<CKeyID, CPubKey>& pubkey_map, const std::map<CKeyID, std::pair<CPubKey, KeyOriginInfo>>& key_origins, const bool add_keypool, const int64_t timestamp)
1802
0
{
1803
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1804
0
    if (!spk_man) {
1805
0
        return false;
1806
0
    }
1807
0
    LOCK(spk_man->cs_KeyStore);
1808
0
    return spk_man->ImportPubKeys(ordered_pubkeys, pubkey_map, key_origins, add_keypool, timestamp);
1809
0
}
1810
1811
bool CWallet::ImportScriptPubKeys(const std::string& label, const std::set<CScript>& script_pub_keys, const bool have_solving_data, const bool apply_label, const int64_t timestamp)
1812
0
{
1813
0
    auto spk_man = GetLegacyScriptPubKeyMan();
1814
0
    if (!spk_man) {
1815
0
        return false;
1816
0
    }
1817
0
    LOCK(spk_man->cs_KeyStore);
1818
0
    if (!spk_man->ImportScriptPubKeys(script_pub_keys, have_solving_data, timestamp)) {
1819
0
        return false;
1820
0
    }
1821
0
    if (apply_label) {
1822
0
        WalletBatch batch(GetDatabase());
1823
0
        for (const CScript& script : script_pub_keys) {
1824
0
            CTxDestination dest;
1825
0
            ExtractDestination(script, dest);
1826
0
            if (IsValidDestination(dest)) {
1827
0
                SetAddressBookWithDB(batch, dest, label, AddressPurpose::RECEIVE);
1828
0
            }
1829
0
        }
1830
0
    }
1831
0
    return true;
1832
0
}
1833
1834
void CWallet::MaybeUpdateBirthTime(int64_t time)
1835
112k
{
1836
112k
    int64_t birthtime = m_birth_time.load();
1837
112k
    if (time < birthtime) {
1838
6.94k
        m_birth_time = time;
1839
6.94k
    }
1840
112k
}
1841
1842
/**
1843
 * Scan active chain for relevant transactions after importing keys. This should
1844
 * be called whenever new keys are added to the wallet, with the oldest key
1845
 * creation time.
1846
 *
1847
 * @return Earliest timestamp that could be successfully scanned from. Timestamp
1848
 * returned will be higher than startTime if relevant blocks could not be read.
1849
 */
1850
int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update)
1851
0
{
1852
    // Find starting block. May be null if nCreateTime is greater than the
1853
    // highest blockchain timestamp, in which case there is nothing that needs
1854
    // to be scanned.
1855
0
    int start_height = 0;
1856
0
    uint256 start_block;
1857
0
    bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height));
1858
0
    WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);
1859
1860
0
    if (start) {
1861
        // TODO: this should take into account failure by ScanResult::USER_ABORT
1862
0
        ScanResult result = ScanForWalletTransactions(start_block, start_height, /*max_height=*/{}, reserver, /*fUpdate=*/update, /*save_progress=*/false);
1863
0
        if (result.status == ScanResult::FAILURE) {
1864
0
            int64_t time_max;
1865
0
            CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max)));
1866
0
            return time_max + TIMESTAMP_WINDOW + 1;
1867
0
        }
1868
0
    }
1869
0
    return startTime;
1870
0
}
1871
1872
/**
1873
 * Scan the block chain (starting in start_block) for transactions
1874
 * from or to us. If fUpdate is true, found transactions that already
1875
 * exist in the wallet will be updated. If max_height is not set, the
1876
 * mempool will be scanned as well.
1877
 *
1878
 * @param[in] start_block Scan starting block. If block is not on the active
1879
 *                        chain, the scan will return SUCCESS immediately.
1880
 * @param[in] start_height Height of start_block
1881
 * @param[in] max_height  Optional max scanning height. If unset there is
1882
 *                        no maximum and scanning can continue to the tip
1883
 *
1884
 * @return ScanResult returning scan information and indicating success or
1885
 *         failure. Return status will be set to SUCCESS if scan was
1886
 *         successful. FAILURE if a complete rescan was not possible (due to
1887
 *         pruning or corruption). USER_ABORT if the rescan was aborted before
1888
 *         it could complete.
1889
 *
1890
 * @pre Caller needs to make sure start_block (and the optional stop_block) are on
1891
 * the main chain after to the addition of any new keys you want to detect
1892
 * transactions for.
1893
 */
1894
CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate, const bool save_progress)
1895
0
{
1896
0
    constexpr auto INTERVAL_TIME{60s};
1897
0
    auto current_time{reserver.now()};
1898
0
    auto start_time{reserver.now()};
1899
1900
0
    assert(reserver.isReserved());
1901
1902
0
    uint256 block_hash = start_block;
1903
0
    ScanResult result;
1904
1905
0
    std::unique_ptr<FastWalletRescanFilter> fast_rescan_filter;
1906
0
    if (!IsLegacy() && chain().hasBlockFilterIndex(BlockFilterType::BASIC)) fast_rescan_filter = std::make_unique<FastWalletRescanFilter>(*this);
1907
1908
0
    WalletLogPrintf("Rescan started from block %s... (%s)\n", start_block.ToString(),
1909
0
                    fast_rescan_filter ? "fast variant using block filters" : "slow variant inspecting all blocks");
1910
1911
0
    fAbortRescan = false;
1912
0
    ShowProgress(strprintf("%s %s", GetDisplayName(), _("Rescanning…")), 0); // show rescan progress in GUI as dialog or on splashscreen, if rescan required on startup (e.g. due to corruption)
1913
0
    uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
1914
0
    uint256 end_hash = tip_hash;
1915
0
    if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash));
1916
0
    double progress_begin = chain().guessVerificationProgress(block_hash);
1917
0
    double progress_end = chain().guessVerificationProgress(end_hash);
1918
0
    double progress_current = progress_begin;
1919
0
    int block_height = start_height;
1920
0
    while (!fAbortRescan && !chain().shutdownRequested()) {
1921
0
        if (progress_end - progress_begin > 0.0) {
1922
0
            m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin);
1923
0
        } else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal)
1924
0
            m_scanning_progress = 0;
1925
0
        }
1926
0
        if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) {
1927
0
            ShowProgress(strprintf("%s %s", GetDisplayName(), _("Rescanning…")), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));
1928
0
        }
1929
1930
0
        bool next_interval = reserver.now() >= current_time + INTERVAL_TIME;
1931
0
        if (next_interval) {
1932
0
            current_time = reserver.now();
1933
0
            WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current);
1934
0
        }
1935
1936
0
        bool fetch_block{true};
1937
0
        if (fast_rescan_filter) {
1938
0
            fast_rescan_filter->UpdateIfNeeded();
1939
0
            auto matches_block{fast_rescan_filter->MatchesBlock(block_hash)};
1940
0
            if (matches_block.has_value()) {
1941
0
                if (*matches_block) {
1942
0
                    LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (filter matched)\n", block_height, block_hash.ToString());
1943
0
                } else {
1944
0
                    result.last_scanned_block = block_hash;
1945
0
                    result.last_scanned_height = block_height;
1946
0
                    fetch_block = false;
1947
0
                }
1948
0
            } else {
1949
0
                LogDebug(BCLog::SCAN, "Fast rescan: inspect block %d [%s] (WARNING: block filter not found!)\n", block_height, block_hash.ToString());
1950
0
            }
1951
0
        }
1952
1953
        // Find next block separately from reading data above, because reading
1954
        // is slow and there might be a reorg while it is read.
1955
0
        bool block_still_active = false;
1956
0
        bool next_block = false;
1957
0
        uint256 next_block_hash;
1958
0
        chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash)));
1959
1960
0
        if (fetch_block) {
1961
            // Read block data
1962
0
            CBlock block;
1963
0
            chain().findBlock(block_hash, FoundBlock().data(block));
1964
1965
0
            if (!block.IsNull()) {
1966
0
                LOCK(cs_wallet);
1967
0
                if (!block_still_active) {
1968
                    // Abort scan if current block is no longer active, to prevent
1969
                    // marking transactions as coming from the wrong block.
1970
0
                    result.last_failed_block = block_hash;
1971
0
                    result.status = ScanResult::FAILURE;
1972
0
                    break;
1973
0
                }
1974
0
                for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) {
1975
0
                    SyncTransaction(block.vtx[posInBlock], TxStateConfirmed{block_hash, block_height, static_cast<int>(posInBlock)}, fUpdate, /*rescanning_old_block=*/true);
1976
0
                }
1977
                // scan succeeded, record block as most recent successfully scanned
1978
0
                result.last_scanned_block = block_hash;
1979
0
                result.last_scanned_height = block_height;
1980
1981
0
                if (save_progress && next_interval) {
1982
0
                    CBlockLocator loc = m_chain->getActiveChainLocator(block_hash);
1983
1984
0
                    if (!loc.IsNull()) {
1985
0
                        WalletLogPrintf("Saving scan progress %d.\n", block_height);
1986
0
                        WalletBatch batch(GetDatabase());
1987
0
                        batch.WriteBestBlock(loc);
1988
0
                    }
1989
0
                }
1990
0
            } else {
1991
                // could not scan block, keep scanning but record this block as the most recent failure
1992
0
                result.last_failed_block = block_hash;
1993
0
                result.status = ScanResult::FAILURE;
1994
0
            }
1995
0
        }
1996
0
        if (max_height && block_height >= *max_height) {
1997
0
            break;
1998
0
        }
1999
        // If rescanning was triggered with cs_wallet permanently locked (AttachChain), additional blocks that were connected during the rescan
2000
        // aren't processed here but will be processed with the pending blockConnected notifications after the lock is released.
2001
        // If rescanning without a permanent cs_wallet lock, additional blocks that were added during the rescan will be re-processed if
2002
        // the notification was processed and the last block height was updated.
2003
0
        if (block_height >= WITH_LOCK(cs_wallet, return GetLastBlockHeight())) {
2004
0
            break;
2005
0
        }
2006
2007
0
        {
2008
0
            if (!next_block) {
2009
                // break successfully when rescan has reached the tip, or
2010
                // previous block is no longer on the chain due to a reorg
2011
0
                break;
2012
0
            }
2013
2014
            // increment block and verification progress
2015
0
            block_hash = next_block_hash;
2016
0
            ++block_height;
2017
0
            progress_current = chain().guessVerificationProgress(block_hash);
2018
2019
            // handle updated tip hash
2020
0
            const uint256 prev_tip_hash = tip_hash;
2021
0
            tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
2022
0
            if (!max_height && prev_tip_hash != tip_hash) {
2023
                // in case the tip has changed, update progress max
2024
0
                progress_end = chain().guessVerificationProgress(tip_hash);
2025
0
            }
2026
0
        }
2027
0
    }
2028
0
    if (!max_height) {
2029
0
        WalletLogPrintf("Scanning current mempool transactions.\n");
2030
0
        WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
2031
0
    }
2032
0
    ShowProgress(strprintf("%s %s", GetDisplayName(), _("Rescanning…")), 100); // hide progress dialog in GUI
2033
0
    if (block_height && fAbortRescan) {
2034
0
        WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current);
2035
0
        result.status = ScanResult::USER_ABORT;
2036
0
    } else if (block_height && chain().shutdownRequested()) {
2037
0
        WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current);
2038
0
        result.status = ScanResult::USER_ABORT;
2039
0
    } else {
2040
0
        WalletLogPrintf("Rescan completed in %15dms\n", Ticks<std::chrono::milliseconds>(reserver.now() - start_time));
2041
0
    }
2042
0
    return result;
2043
0
}
2044
2045
bool CWallet::SubmitTxMemoryPoolAndRelay(CWalletTx& wtx, std::string& err_string, bool relay) const
2046
0
{
2047
0
    AssertLockHeld(cs_wallet);
2048
2049
    // Can't relay if wallet is not broadcasting
2050
0
    if (!GetBroadcastTransactions()) return false;
2051
    // Don't relay abandoned transactions
2052
0
    if (wtx.isAbandoned()) return false;
2053
    // Don't try to submit coinbase transactions. These would fail anyway but would
2054
    // cause log spam.
2055
0
    if (wtx.IsCoinBase()) return false;
2056
    // Don't try to submit conflicted or confirmed transactions.
2057
0
    if (GetTxDepthInMainChain(wtx) != 0) return false;
2058
2059
    // Submit transaction to mempool for relay
2060
0
    WalletLogPrintf("Submitting wtx %s to mempool for relay\n", wtx.GetHash().ToString());
2061
    // We must set TxStateInMempool here. Even though it will also be set later by the
2062
    // entered-mempool callback, if we did not there would be a race where a
2063
    // user could call sendmoney in a loop and hit spurious out of funds errors
2064
    // because we think that this newly generated transaction's change is
2065
    // unavailable as we're not yet aware that it is in the mempool.
2066
    //
2067
    // If broadcast fails for any reason, trying to set wtx.m_state here would be incorrect.
2068
    // If transaction was previously in the mempool, it should be updated when
2069
    // TransactionRemovedFromMempool fires.
2070
0
    bool ret = chain().broadcastTransaction(wtx.tx, m_default_max_tx_fee, relay, err_string);
2071
0
    if (ret) wtx.m_state = TxStateInMempool{};
2072
0
    return ret;
2073
0
}
2074
2075
std::set<uint256> CWallet::GetTxConflicts(const CWalletTx& wtx) const
2076
0
{
2077
0
    AssertLockHeld(cs_wallet);
2078
2079
0
    const uint256 myHash{wtx.GetHash()};
2080
0
    std::set<uint256> result{GetConflicts(myHash)};
2081
0
    result.erase(myHash);
2082
0
    return result;
2083
0
}
2084
2085
bool CWallet::ShouldResend() const
2086
0
{
2087
    // Don't attempt to resubmit if the wallet is configured to not broadcast
2088
0
    if (!fBroadcastTransactions) return false;
2089
2090
    // During reindex, importing and IBD, old wallet transactions become
2091
    // unconfirmed. Don't resend them as that would spam other nodes.
2092
    // We only allow forcing mempool submission when not relaying to avoid this spam.
2093
0
    if (!chain().isReadyToBroadcast()) return false;
2094
2095
    // Do this infrequently and randomly to avoid giving away
2096
    // that these are our transactions.
2097
0
    if (NodeClock::now() < m_next_resend) return false;
2098
2099
0
    return true;
2100
0
}
2101
2102
7.85k
NodeClock::time_point CWallet::GetDefaultNextResend() { return FastRandomContext{}.rand_uniform_delay(NodeClock::now() + 12h, 24h); }
2103
2104
// Resubmit transactions from the wallet to the mempool, optionally asking the
2105
// mempool to relay them. On startup, we will do this for all unconfirmed
2106
// transactions but will not ask the mempool to relay them. We do this on startup
2107
// to ensure that our own mempool is aware of our transactions. There
2108
// is a privacy side effect here as not broadcasting on startup also means that we won't
2109
// inform the world of our wallet's state, particularly if the wallet (or node) is not
2110
// yet synced.
2111
//
2112
// Otherwise this function is called periodically in order to relay our unconfirmed txs.
2113
// We do this on a random timer to slightly obfuscate which transactions
2114
// come from our wallet.
2115
//
2116
// TODO: Ideally, we'd only resend transactions that we think should have been
2117
// mined in the most recent block. Any transaction that wasn't in the top
2118
// blockweight of transactions in the mempool shouldn't have been mined,
2119
// and so is probably just sitting in the mempool waiting to be confirmed.
2120
// Rebroadcasting does nothing to speed up confirmation and only damages
2121
// privacy.
2122
//
2123
// The `force` option results in all unconfirmed transactions being submitted to
2124
// the mempool. This does not necessarily result in those transactions being relayed,
2125
// that depends on the `relay` option. Periodic rebroadcast uses the pattern
2126
// relay=true force=false, while loading into the mempool
2127
// (on start, or after import) uses relay=false force=true.
2128
void CWallet::ResubmitWalletTransactions(bool relay, bool force)
2129
0
{
2130
    // Don't attempt to resubmit if the wallet is configured to not broadcast,
2131
    // even if forcing.
2132
0
    if (!fBroadcastTransactions) return;
2133
2134
0
    int submitted_tx_count = 0;
2135
2136
0
    { // cs_wallet scope
2137
0
        LOCK(cs_wallet);
2138
2139
        // First filter for the transactions we want to rebroadcast.
2140
        // We use a set with WalletTxOrderComparator so that rebroadcasting occurs in insertion order
2141
0
        std::set<CWalletTx*, WalletTxOrderComparator> to_submit;
2142
0
        for (auto& [txid, wtx] : mapWallet) {
2143
            // Only rebroadcast unconfirmed txs
2144
0
            if (!wtx.isUnconfirmed()) continue;
2145
2146
            // Attempt to rebroadcast all txes more than 5 minutes older than
2147
            // the last block, or all txs if forcing.
2148
0
            if (!force && wtx.nTimeReceived > m_best_block_time - 5 * 60) continue;
2149
0
            to_submit.insert(&wtx);
2150
0
        }
2151
        // Now try submitting the transactions to the memory pool and (optionally) relay them.
2152
0
        for (auto wtx : to_submit) {
2153
0
            std::string unused_err_string;
2154
0
            if (SubmitTxMemoryPoolAndRelay(*wtx, unused_err_string, relay)) ++submitted_tx_count;
2155
0
        }
2156
0
    } // cs_wallet
2157
2158
0
    if (submitted_tx_count > 0) {
2159
0
        WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count);
2160
0
    }
2161
0
}
2162
2163
/** @} */ // end of mapWallet
2164
2165
void MaybeResendWalletTxs(WalletContext& context)
2166
0
{
2167
0
    for (const std::shared_ptr<CWallet>& pwallet : GetWallets(context)) {
2168
0
        if (!pwallet->ShouldResend()) continue;
2169
0
        pwallet->ResubmitWalletTransactions(/*relay=*/true, /*force=*/false);
2170
0
        pwallet->SetNextResend();
2171
0
    }
2172
0
}
2173
2174
2175
/** @defgroup Actions
2176
 *
2177
 * @{
2178
 */
2179
2180
bool CWallet::SignTransaction(CMutableTransaction& tx) const
2181
1.23k
{
2182
1.23k
    AssertLockHeld(cs_wallet);
2183
2184
    // Build coins map
2185
1.23k
    std::map<COutPoint, Coin> coins;
2186
44.9k
    for (auto& input : tx.vin) {
2187
44.9k
        const auto mi = mapWallet.find(input.prevout.hash);
2188
44.9k
        if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) {
2189
0
            return false;
2190
0
        }
2191
44.9k
        const CWalletTx& wtx = mi->second;
2192
44.9k
        int prev_height = wtx.state<TxStateConfirmed>() ? wtx.state<TxStateConfirmed>()->confirmed_block_height : 0;
2193
44.9k
        coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], prev_height, wtx.IsCoinBase());
2194
44.9k
    }
2195
1.23k
    std::map<int, bilingual_str> input_errors;
2196
1.23k
    return SignTransaction(tx, coins, SIGHASH_DEFAULT, input_errors);
2197
1.23k
}
2198
2199
bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const
2200
1.23k
{
2201
    // Try to sign with all ScriptPubKeyMans
2202
6.97k
    for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2203
        // spk_man->SignTransaction will return true if the transaction is complete,
2204
        // so we can exit early and return true if that happens
2205
6.97k
        if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) {
2206
1.23k
            return true;
2207
1.23k
        }
2208
6.97k
    }
2209
2210
    // At this point, one input was not fully signed otherwise we would have exited already
2211
0
    return false;
2212
1.23k
}
2213
2214
std::optional<PSBTError> CWallet::FillPSBT(PartiallySignedTransaction& psbtx, bool& complete, int sighash_type, bool sign, bool bip32derivs, size_t * n_signed, bool finalize) const
2215
0
{
2216
0
    if (n_signed) {
2217
0
        *n_signed = 0;
2218
0
    }
2219
0
    LOCK(cs_wallet);
2220
    // Get all of the previous transactions
2221
0
    for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
2222
0
        const CTxIn& txin = psbtx.tx->vin[i];
2223
0
        PSBTInput& input = psbtx.inputs.at(i);
2224
2225
0
        if (PSBTInputSigned(input)) {
2226
0
            continue;
2227
0
        }
2228
2229
        // If we have no utxo, grab it from the wallet.
2230
0
        if (!input.non_witness_utxo) {
2231
0
            const uint256& txhash = txin.prevout.hash;
2232
0
            const auto it = mapWallet.find(txhash);
2233
0
            if (it != mapWallet.end()) {
2234
0
                const CWalletTx& wtx = it->second;
2235
                // We only need the non_witness_utxo, which is a superset of the witness_utxo.
2236
                //   The signing code will switch to the smaller witness_utxo if this is ok.
2237
0
                input.non_witness_utxo = wtx.tx;
2238
0
            }
2239
0
        }
2240
0
    }
2241
2242
0
    const PrecomputedTransactionData txdata = PrecomputePSBTData(psbtx);
2243
2244
    // Fill in information from ScriptPubKeyMans
2245
0
    for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
2246
0
        int n_signed_this_spkm = 0;
2247
0
        const auto error{spk_man->FillPSBT(psbtx, txdata, sighash_type, sign, bip32derivs, &n_signed_this_spkm, finalize)};
2248
0
        if (error) {
2249
0
            return error;
2250
0
        }
2251
2252
0
        if (n_signed) {
2253
0
            (*n_signed) += n_signed_this_spkm;
2254
0
        }
2255
0
    }
2256
2257
0
    RemoveUnnecessaryTransactions(psbtx, sighash_type);
2258
2259
    // Complete if every input is now signed
2260
0
    complete = true;
2261
0
    for (size_t i = 0; i < psbtx.inputs.size(); ++i) {
2262
0
        complete &= PSBTInputSignedAndVerified(psbtx, i, &txdata);
2263
0
    }
2264
2265
0
    return {};
2266
0
}
2267
2268
SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const
2269
0
{
2270
0
    SignatureData sigdata;
2271
0
    CScript script_pub_key = GetScriptForDestination(pkhash);
2272
0
    for (const auto& spk_man_pair : m_spk_managers) {
2273
0
        if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
2274
0
            LOCK(cs_wallet);  // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
2275
0
            return spk_man_pair.second->SignMessage(message, pkhash, str_sig);
2276
0
        }
2277
0
    }
2278
0
    return SigningResult::PRIVATE_KEY_NOT_AVAILABLE;
2279
0
}
2280
2281
OutputType CWallet::TransactionChangeType(const std::optional<OutputType>& change_type, const std::vector<CRecipient>& vecSend) const
2282
71.2k
{
2283
    // If -changetype is specified, always use that change type.
2284
71.2k
    if (change_type) {
2285
12.6k
        return *change_type;
2286
12.6k
    }
2287
2288
    // if m_default_address_type is legacy, use legacy address as change.
2289
58.5k
    if (m_default_address_type == OutputType::LEGACY) {
2290
0
        return OutputType::LEGACY;
2291
0
    }
2292
2293
58.5k
    bool any_tr{false};
2294
58.5k
    bool any_wpkh{false};
2295
58.5k
    bool any_sh{false};
2296
58.5k
    bool any_pkh{false};
2297
2298
168k
    for (const auto& recipient : vecSend) {
2299
168k
        if (std::get_if<WitnessV1Taproot>(&recipient.dest)) {
2300
24.9k
            any_tr = true;
2301
143k
        } else if (std::get_if<WitnessV0KeyHash>(&recipient.dest)) {
2302
1.96k
            any_wpkh = true;
2303
142k
        } else if (std::get_if<ScriptHash>(&recipient.dest)) {
2304
52.0k
            any_sh = true;
2305
89.9k
        } else if (std::get_if<PKHash>(&recipient.dest)) {
2306
88.3k
            any_pkh = true;
2307
88.3k
        }
2308
168k
    }
2309
2310
58.5k
    const bool has_bech32m_spkman(GetScriptPubKeyMan(OutputType::BECH32M, /*internal=*/true));
2311
58.5k
    if (has_bech32m_spkman && any_tr) {
2312
        // Currently tr is the only type supported by the BECH32M spkman
2313
6.42k
        return OutputType::BECH32M;
2314
6.42k
    }
2315
52.1k
    const bool has_bech32_spkman(GetScriptPubKeyMan(OutputType::BECH32, /*internal=*/true));
2316
52.1k
    if (has_bech32_spkman && any_wpkh) {
2317
        // Currently wpkh is the only type supported by the BECH32 spkman
2318
641
        return OutputType::BECH32;
2319
641
    }
2320
51.4k
    const bool has_p2sh_segwit_spkman(GetScriptPubKeyMan(OutputType::P2SH_SEGWIT, /*internal=*/true));
2321
51.4k
    if (has_p2sh_segwit_spkman && any_sh) {
2322
        // Currently sh_wpkh is the only type supported by the P2SH_SEGWIT spkman
2323
        // As of 2021 about 80% of all SH are wrapping WPKH, so use that
2324
3.27k
        return OutputType::P2SH_SEGWIT;
2325
3.27k
    }
2326
48.2k
    const bool has_legacy_spkman(GetScriptPubKeyMan(OutputType::LEGACY, /*internal=*/true));
2327
48.2k
    if (has_legacy_spkman && any_pkh) {
2328
        // Currently pkh is the only type supported by the LEGACY spkman
2329
48.1k
        return OutputType::LEGACY;
2330
48.1k
    }
2331
2332
114
    if (has_bech32m_spkman) {
2333
114
        return OutputType::BECH32M;
2334
114
    }
2335
0
    if (has_bech32_spkman) {
2336
0
        return OutputType::BECH32;
2337
0
    }
2338
    // else use m_default_address_type for change
2339
0
    return m_default_address_type;
2340
0
}
2341
2342
void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm)
2343
0
{
2344
0
    LOCK(cs_wallet);
2345
0
    WalletLogPrintf("CommitTransaction:\n%s\n", util::RemoveSuffixView(tx->ToString(), "\n"));
2346
2347
    // Add tx to wallet, because if it has change it's also ours,
2348
    // otherwise just for transaction history.
2349
0
    CWalletTx* wtx = AddToWallet(tx, TxStateInactive{}, [&](CWalletTx& wtx, bool new_tx) {
2350
0
        CHECK_NONFATAL(wtx.mapValue.empty());
2351
0
        CHECK_NONFATAL(wtx.vOrderForm.empty());
2352
0
        wtx.mapValue = std::move(mapValue);
2353
0
        wtx.vOrderForm = std::move(orderForm);
2354
0
        wtx.fTimeReceivedIsTxTime = true;
2355
0
        wtx.fFromMe = true;
2356
0
        return true;
2357
0
    });
2358
2359
    // wtx can only be null if the db write failed.
2360
0
    if (!wtx) {
2361
0
        throw std::runtime_error(std::string(__func__) + ": Wallet db error, transaction commit failed");
2362
0
    }
2363
2364
    // Notify that old coins are spent
2365
0
    for (const CTxIn& txin : tx->vin) {
2366
0
        CWalletTx &coin = mapWallet.at(txin.prevout.hash);
2367
0
        coin.MarkDirty();
2368
0
        NotifyTransactionChanged(coin.GetHash(), CT_UPDATED);
2369
0
    }
2370
2371
0
    if (!fBroadcastTransactions) {
2372
        // Don't submit tx to the mempool
2373
0
        return;
2374
0
    }
2375
2376
0
    std::string err_string;
2377
0
    if (!SubmitTxMemoryPoolAndRelay(*wtx, err_string, true)) {
2378
0
        WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string);
2379
        // TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure.
2380
0
    }
2381
0
}
2382
2383
DBErrors CWallet::LoadWallet()
2384
0
{
2385
0
    LOCK(cs_wallet);
2386
2387
0
    Assert(m_spk_managers.empty());
2388
0
    Assert(m_wallet_flags == 0);
2389
0
    DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this);
2390
0
    if (nLoadWalletRet == DBErrors::NEED_REWRITE)
2391
0
    {
2392
0
        if (GetDatabase().Rewrite("\x04pool"))
2393
0
        {
2394
0
            for (const auto& spk_man_pair : m_spk_managers) {
2395
0
                spk_man_pair.second->RewriteDB();
2396
0
            }
2397
0
        }
2398
0
    }
2399
2400
0
    if (m_spk_managers.empty()) {
2401
0
        assert(m_external_spk_managers.empty());
2402
0
        assert(m_internal_spk_managers.empty());
2403
0
    }
2404
2405
0
    return nLoadWalletRet;
2406
0
}
2407
2408
util::Result<void> CWallet::RemoveTxs(std::vector<uint256>& txs_to_remove)
2409
0
{
2410
0
    AssertLockHeld(cs_wallet);
2411
0
    bilingual_str str_err;  // future: make RunWithinTxn return a util::Result
2412
0
    bool was_txn_committed = RunWithinTxn(GetDatabase(), /*process_desc=*/"remove transactions", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
2413
0
        util::Result<void> result{RemoveTxs(batch, txs_to_remove)};
2414
0
        if (!result) str_err = util::ErrorString(result);
2415
0
        return result.has_value();
2416
0
    });
2417
0
    if (!str_err.empty()) return util::Error{str_err};
2418
0
    if (!was_txn_committed) return util::Error{_("Error starting/committing db txn for wallet transactions removal process")};
2419
0
    return {}; // all good
2420
0
}
2421
2422
util::Result<void> CWallet::RemoveTxs(WalletBatch& batch, std::vector<uint256>& txs_to_remove)
2423
0
{
2424
0
    AssertLockHeld(cs_wallet);
2425
0
    if (!batch.HasActiveTxn()) return util::Error{strprintf(_("The transactions removal process can only be executed within a db txn"))};
2426
2427
    // Check for transaction existence and remove entries from disk
2428
0
    using TxIterator = std::unordered_map<uint256, CWalletTx, SaltedTxidHasher>::const_iterator;
2429
0
    std::vector<TxIterator> erased_txs;
2430
0
    bilingual_str str_err;
2431
0
    for (const uint256& hash : txs_to_remove) {
2432
0
        auto it_wtx = mapWallet.find(hash);
2433
0
        if (it_wtx == mapWallet.end()) {
2434
0
            return util::Error{strprintf(_("Transaction %s does not belong to this wallet"), hash.GetHex())};
2435
0
        }
2436
0
        if (!batch.EraseTx(hash)) {
2437
0
            return util::Error{strprintf(_("Failure removing transaction: %s"), hash.GetHex())};
2438
0
        }
2439
0
        erased_txs.emplace_back(it_wtx);
2440
0
    }
2441
2442
    // Register callback to update the memory state only when the db txn is actually dumped to disk
2443
0
    batch.RegisterTxnListener({.on_commit=[&, erased_txs]() EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) {
2444
        // Update the in-memory state and notify upper layers about the removals
2445
0
        for (const auto& it : erased_txs) {
2446
0
            const uint256 hash{it->first};
2447
0
            wtxOrdered.erase(it->second.m_it_wtxOrdered);
2448
0
            for (const auto& txin : it->second.tx->vin)
2449
0
                mapTxSpends.erase(txin.prevout);
2450
0
            mapWallet.erase(it);
2451
0
            NotifyTransactionChanged(hash, CT_DELETED);
2452
0
        }
2453
2454
0
        MarkDirty();
2455
0
    }, .on_abort={}});
2456
2457
0
    return {};
2458
0
}
2459
2460
bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& new_purpose)
2461
214k
{
2462
214k
    bool fUpdated = false;
2463
214k
    bool is_mine;
2464
214k
    std::optional<AddressPurpose> purpose;
2465
214k
    {
2466
214k
        LOCK(cs_wallet);
2467
214k
        std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address);
2468
214k
        fUpdated = mi != m_address_book.end() && !mi->second.IsChange();
2469
2470
214k
        CAddressBookData& record = mi != m_address_book.end() ? mi->second : m_address_book[address];
2471
214k
        record.SetLabel(strName);
2472
214k
        is_mine = IsMine(address) != ISMINE_NO;
2473
214k
        if (new_purpose) { /* update purpose only if requested */
2474
214k
            record.purpose = new_purpose;
2475
214k
        }
2476
214k
        purpose = record.purpose;
2477
214k
    }
2478
2479
214k
    const std::string& encoded_dest = EncodeDestination(address);
2480
214k
    if (new_purpose && !batch.WritePurpose(encoded_dest, PurposeToString(*new_purpose))) {
2481
0
        WalletLogPrintf("Error: fail to write address book 'purpose' entry\n");
2482
0
        return false;
2483
0
    }
2484
214k
    if (!batch.WriteName(encoded_dest, strName)) {
2485
0
        WalletLogPrintf("Error: fail to write address book 'name' entry\n");
2486
0
        return false;
2487
0
    }
2488
2489
    // In very old wallets, address purpose may not be recorded so we derive it from IsMine
2490
214k
    NotifyAddressBookChanged(address, strName, is_mine,
2491
214k
                             purpose.value_or(is_mine ? AddressPurpose::RECEIVE : AddressPurpose::SEND),
2492
214k
                             (fUpdated ? CT_UPDATED : CT_NEW));
2493
214k
    return true;
2494
214k
}
2495
2496
bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::optional<AddressPurpose>& purpose)
2497
214k
{
2498
214k
    WalletBatch batch(GetDatabase());
2499
214k
    return SetAddressBookWithDB(batch, address, strName, purpose);
2500
214k
}
2501
2502
bool CWallet::DelAddressBook(const CTxDestination& address)
2503
0
{
2504
0
    return RunWithinTxn(GetDatabase(), /*process_desc=*/"address book entry removal", [&](WalletBatch& batch){
2505
0
        return DelAddressBookWithDB(batch, address);
2506
0
    });
2507
0
}
2508
2509
bool CWallet::DelAddressBookWithDB(WalletBatch& batch, const CTxDestination& address)
2510
0
{
2511
0
    const std::string& dest = EncodeDestination(address);
2512
0
    {
2513
0
        LOCK(cs_wallet);
2514
        // If we want to delete receiving addresses, we should avoid calling EraseAddressData because it will delete the previously_spent value. Could instead just erase the label so it becomes a change address, and keep the data.
2515
        // NOTE: This isn't a problem for sending addresses because they don't have any data that needs to be kept.
2516
        // When adding new address data, it should be considered here whether to retain or delete it.
2517
0
        if (IsMine(address)) {
2518
0
            WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, CLIENT_BUGREPORT);
2519
0
            return false;
2520
0
        }
2521
        // Delete data rows associated with this address
2522
0
        if (!batch.EraseAddressData(address)) {
2523
0
            WalletLogPrintf("Error: cannot erase address book entry data\n");
2524
0
            return false;
2525
0
        }
2526
2527
        // Delete purpose entry
2528
0
        if (!batch.ErasePurpose(dest)) {
2529
0
            WalletLogPrintf("Error: cannot erase address book entry purpose\n");
2530
0
            return false;
2531
0
        }
2532
2533
        // Delete name entry
2534
0
        if (!batch.EraseName(dest)) {
2535
0
            WalletLogPrintf("Error: cannot erase address book entry name\n");
2536
0
            return false;
2537
0
        }
2538
2539
        // finally, remove it from the map
2540
0
        m_address_book.erase(address);
2541
0
    }
2542
2543
    // All good, signal changes
2544
0
    NotifyAddressBookChanged(address, "", /*is_mine=*/false, AddressPurpose::SEND, CT_DELETED);
2545
0
    return true;
2546
0
}
2547
2548
size_t CWallet::KeypoolCountExternalKeys() const
2549
0
{
2550
0
    AssertLockHeld(cs_wallet);
2551
2552
0
    auto legacy_spk_man = GetLegacyScriptPubKeyMan();
2553
0
    if (legacy_spk_man) {
2554
0
        return legacy_spk_man->KeypoolCountExternalKeys();
2555
0
    }
2556
2557
0
    unsigned int count = 0;
2558
0
    for (auto spk_man : m_external_spk_managers) {
2559
0
        count += spk_man.second->GetKeyPoolSize();
2560
0
    }
2561
2562
0
    return count;
2563
0
}
2564
2565
unsigned int CWallet::GetKeyPoolSize() const
2566
0
{
2567
0
    AssertLockHeld(cs_wallet);
2568
2569
0
    unsigned int count = 0;
2570
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
2571
0
        count += spk_man->GetKeyPoolSize();
2572
0
    }
2573
0
    return count;
2574
0
}
2575
2576
bool CWallet::TopUpKeyPool(unsigned int kpSize)
2577
0
{
2578
0
    LOCK(cs_wallet);
2579
0
    bool res = true;
2580
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
2581
0
        res &= spk_man->TopUp(kpSize);
2582
0
    }
2583
0
    return res;
2584
0
}
2585
2586
util::Result<CTxDestination> CWallet::GetNewDestination(const OutputType type, const std::string label)
2587
213k
{
2588
213k
    LOCK(cs_wallet);
2589
213k
    auto spk_man = GetScriptPubKeyMan(type, /*internal=*/false);
2590
213k
    if (!spk_man) {
2591
0
        return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2592
0
    }
2593
2594
213k
    auto op_dest = spk_man->GetNewDestination(type);
2595
213k
    if (op_dest) {
2596
213k
        SetAddressBook(*op_dest, label, AddressPurpose::RECEIVE);
2597
213k
    }
2598
2599
213k
    return op_dest;
2600
213k
}
2601
2602
util::Result<CTxDestination> CWallet::GetNewChangeDestination(const OutputType type)
2603
156k
{
2604
156k
    LOCK(cs_wallet);
2605
2606
156k
    ReserveDestination reservedest(this, type);
2607
156k
    auto op_dest = reservedest.GetReservedDestination(true);
2608
156k
    if (op_dest) reservedest.KeepDestination();
2609
2610
156k
    return op_dest;
2611
156k
}
2612
2613
std::optional<int64_t> CWallet::GetOldestKeyPoolTime() const
2614
0
{
2615
0
    LOCK(cs_wallet);
2616
0
    if (m_spk_managers.empty()) {
2617
0
        return std::nullopt;
2618
0
    }
2619
2620
0
    std::optional<int64_t> oldest_key{std::numeric_limits<int64_t>::max()};
2621
0
    for (const auto& spk_man_pair : m_spk_managers) {
2622
0
        oldest_key = std::min(oldest_key, spk_man_pair.second->GetOldestKeyPoolTime());
2623
0
    }
2624
0
    return oldest_key;
2625
0
}
2626
2627
0
void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) {
2628
0
    for (auto& entry : mapWallet) {
2629
0
        CWalletTx& wtx = entry.second;
2630
0
        if (wtx.m_is_cache_empty) continue;
2631
0
        for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
2632
0
            CTxDestination dst;
2633
0
            if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.count(dst)) {
2634
0
                wtx.MarkDirty();
2635
0
                break;
2636
0
            }
2637
0
        }
2638
0
    }
2639
0
}
2640
2641
void CWallet::ForEachAddrBookEntry(const ListAddrBookFunc& func) const
2642
0
{
2643
0
    AssertLockHeld(cs_wallet);
2644
0
    for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book) {
2645
0
        const auto& entry = item.second;
2646
0
        func(item.first, entry.GetLabel(), entry.IsChange(), entry.purpose);
2647
0
    }
2648
0
}
2649
2650
std::vector<CTxDestination> CWallet::ListAddrBookAddresses(const std::optional<AddrBookFilter>& _filter) const
2651
0
{
2652
0
    AssertLockHeld(cs_wallet);
2653
0
    std::vector<CTxDestination> result;
2654
0
    AddrBookFilter filter = _filter ? *_filter : AddrBookFilter();
2655
0
    ForEachAddrBookEntry([&result, &filter](const CTxDestination& dest, const std::string& label, bool is_change, const std::optional<AddressPurpose>& purpose) {
2656
        // Filter by change
2657
0
        if (filter.ignore_change && is_change) return;
2658
        // Filter by label
2659
0
        if (filter.m_op_label && *filter.m_op_label != label) return;
2660
        // All good
2661
0
        result.emplace_back(dest);
2662
0
    });
2663
0
    return result;
2664
0
}
2665
2666
std::set<std::string> CWallet::ListAddrBookLabels(const std::optional<AddressPurpose> purpose) const
2667
0
{
2668
0
    AssertLockHeld(cs_wallet);
2669
0
    std::set<std::string> label_set;
2670
0
    ForEachAddrBookEntry([&](const CTxDestination& _dest, const std::string& _label,
2671
0
                             bool _is_change, const std::optional<AddressPurpose>& _purpose) {
2672
0
        if (_is_change) return;
2673
0
        if (!purpose || purpose == _purpose) {
2674
0
            label_set.insert(_label);
2675
0
        }
2676
0
    });
2677
0
    return label_set;
2678
0
}
2679
2680
util::Result<CTxDestination> ReserveDestination::GetReservedDestination(bool internal)
2681
163k
{
2682
163k
    m_spk_man = pwallet->GetScriptPubKeyMan(type, internal);
2683
163k
    if (!m_spk_man) {
2684
0
        return util::Error{strprintf(_("Error: No %s addresses available."), FormatOutputType(type))};
2685
0
    }
2686
2687
163k
    if (nIndex == -1) {
2688
163k
        CKeyPool keypool;
2689
163k
        int64_t index;
2690
163k
        auto op_address = m_spk_man->GetReservedDestination(type, internal, index, keypool);
2691
163k
        if (!op_address) return op_address;
2692
163k
        nIndex = index;
2693
163k
        address = *op_address;
2694
163k
        fInternal = keypool.fInternal;
2695
163k
    }
2696
163k
    return address;
2697
163k
}
2698
2699
void ReserveDestination::KeepDestination()
2700
193k
{
2701
193k
    if (nIndex != -1) {
2702
159k
        m_spk_man->KeepDestination(nIndex, type);
2703
159k
    }
2704
193k
    nIndex = -1;
2705
193k
    address = CNoDestination();
2706
193k
}
2707
2708
void ReserveDestination::ReturnDestination()
2709
227k
{
2710
227k
    if (nIndex != -1) {
2711
4.20k
        m_spk_man->ReturnDestination(nIndex, fInternal, address);
2712
4.20k
    }
2713
227k
    nIndex = -1;
2714
227k
    address = CNoDestination();
2715
227k
}
2716
2717
util::Result<void> CWallet::DisplayAddress(const CTxDestination& dest)
2718
0
{
2719
0
    CScript scriptPubKey = GetScriptForDestination(dest);
2720
0
    for (const auto& spk_man : GetScriptPubKeyMans(scriptPubKey)) {
2721
0
        auto signer_spk_man = dynamic_cast<ExternalSignerScriptPubKeyMan *>(spk_man);
2722
0
        if (signer_spk_man == nullptr) {
2723
0
            continue;
2724
0
        }
2725
0
        ExternalSigner signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
2726
0
        return signer_spk_man->DisplayAddress(dest, signer);
2727
0
    }
2728
0
    return util::Error{_("There is no ScriptPubKeyManager for this address")};
2729
0
}
2730
2731
bool CWallet::LockCoin(const COutPoint& output, WalletBatch* batch)
2732
0
{
2733
0
    AssertLockHeld(cs_wallet);
2734
0
    setLockedCoins.insert(output);
2735
0
    if (batch) {
2736
0
        return batch->WriteLockedUTXO(output);
2737
0
    }
2738
0
    return true;
2739
0
}
2740
2741
bool CWallet::UnlockCoin(const COutPoint& output, WalletBatch* batch)
2742
317k
{
2743
317k
    AssertLockHeld(cs_wallet);
2744
317k
    bool was_locked = setLockedCoins.erase(output);
2745
317k
    if (batch && was_locked) {
2746
0
        return batch->EraseLockedUTXO(output);
2747
0
    }
2748
317k
    return true;
2749
317k
}
2750
2751
bool CWallet::UnlockAllCoins()
2752
0
{
2753
0
    AssertLockHeld(cs_wallet);
2754
0
    bool success = true;
2755
0
    WalletBatch batch(GetDatabase());
2756
0
    for (auto it = setLockedCoins.begin(); it != setLockedCoins.end(); ++it) {
2757
0
        success &= batch.EraseLockedUTXO(*it);
2758
0
    }
2759
0
    setLockedCoins.clear();
2760
0
    return success;
2761
0
}
2762
2763
bool CWallet::IsLockedCoin(const COutPoint& output) const
2764
12.6M
{
2765
12.6M
    AssertLockHeld(cs_wallet);
2766
12.6M
    return setLockedCoins.count(output) > 0;
2767
12.6M
}
2768
2769
void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const
2770
0
{
2771
0
    AssertLockHeld(cs_wallet);
2772
0
    for (std::set<COutPoint>::iterator it = setLockedCoins.begin();
2773
0
         it != setLockedCoins.end(); it++) {
2774
0
        COutPoint outpt = (*it);
2775
0
        vOutpts.push_back(outpt);
2776
0
    }
2777
0
}
2778
2779
/** @} */ // end of Actions
2780
2781
0
void CWallet::GetKeyBirthTimes(std::map<CKeyID, int64_t>& mapKeyBirth) const {
2782
0
    AssertLockHeld(cs_wallet);
2783
0
    mapKeyBirth.clear();
2784
2785
    // map in which we'll infer heights of other keys
2786
0
    std::map<CKeyID, const TxStateConfirmed*> mapKeyFirstBlock;
2787
0
    TxStateConfirmed max_confirm{uint256{}, /*height=*/-1, /*index=*/-1};
2788
0
    max_confirm.confirmed_block_height = GetLastBlockHeight() > 144 ? GetLastBlockHeight() - 144 : 0; // the tip can be reorganized; use a 144-block safety margin
2789
0
    CHECK_NONFATAL(chain().findAncestorByHeight(GetLastBlockHash(), max_confirm.confirmed_block_height, FoundBlock().hash(max_confirm.confirmed_block_hash)));
2790
2791
0
    {
2792
0
        LegacyScriptPubKeyMan* spk_man = GetLegacyScriptPubKeyMan();
2793
0
        assert(spk_man != nullptr);
2794
0
        LOCK(spk_man->cs_KeyStore);
2795
2796
        // get birth times for keys with metadata
2797
0
        for (const auto& entry : spk_man->mapKeyMetadata) {
2798
0
            if (entry.second.nCreateTime) {
2799
0
                mapKeyBirth[entry.first] = entry.second.nCreateTime;
2800
0
            }
2801
0
        }
2802
2803
        // Prepare to infer birth heights for keys without metadata
2804
0
        for (const CKeyID &keyid : spk_man->GetKeys()) {
2805
0
            if (mapKeyBirth.count(keyid) == 0)
2806
0
                mapKeyFirstBlock[keyid] = &max_confirm;
2807
0
        }
2808
2809
        // if there are no such keys, we're done
2810
0
        if (mapKeyFirstBlock.empty())
2811
0
            return;
2812
2813
        // find first block that affects those keys, if there are any left
2814
0
        for (const auto& entry : mapWallet) {
2815
            // iterate over all wallet transactions...
2816
0
            const CWalletTx &wtx = entry.second;
2817
0
            if (auto* conf = wtx.state<TxStateConfirmed>()) {
2818
                // ... which are already in a block
2819
0
                for (const CTxOut &txout : wtx.tx->vout) {
2820
                    // iterate over all their outputs
2821
0
                    for (const auto &keyid : GetAffectedKeys(txout.scriptPubKey, *spk_man)) {
2822
                        // ... and all their affected keys
2823
0
                        auto rit = mapKeyFirstBlock.find(keyid);
2824
0
                        if (rit != mapKeyFirstBlock.end() && conf->confirmed_block_height < rit->second->confirmed_block_height) {
2825
0
                            rit->second = conf;
2826
0
                        }
2827
0
                    }
2828
0
                }
2829
0
            }
2830
0
        }
2831
0
    }
2832
2833
    // Extract block timestamps for those keys
2834
0
    for (const auto& entry : mapKeyFirstBlock) {
2835
0
        int64_t block_time;
2836
0
        CHECK_NONFATAL(chain().findBlock(entry.second->confirmed_block_hash, FoundBlock().time(block_time)));
2837
0
        mapKeyBirth[entry.first] = block_time - TIMESTAMP_WINDOW; // block times can be 2h off
2838
0
    }
2839
0
}
2840
2841
/**
2842
 * Compute smart timestamp for a transaction being added to the wallet.
2843
 *
2844
 * Logic:
2845
 * - If sending a transaction, assign its timestamp to the current time.
2846
 * - If receiving a transaction outside a block, assign its timestamp to the
2847
 *   current time.
2848
 * - If receiving a transaction during a rescanning process, assign all its
2849
 *   (not already known) transactions' timestamps to the block time.
2850
 * - If receiving a block with a future timestamp, assign all its (not already
2851
 *   known) transactions' timestamps to the current time.
2852
 * - If receiving a block with a past timestamp, before the most recent known
2853
 *   transaction (that we care about), assign all its (not already known)
2854
 *   transactions' timestamps to the same timestamp as that most-recent-known
2855
 *   transaction.
2856
 * - If receiving a block with a past timestamp, but after the most recent known
2857
 *   transaction, assign all its (not already known) transactions' timestamps to
2858
 *   the block time.
2859
 *
2860
 * For more information see CWalletTx::nTimeSmart,
2861
 * https://bitcointalk.org/?topic=54527, or
2862
 * https://github.com/bitcoin/bitcoin/pull/1393.
2863
 */
2864
unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx, bool rescanning_old_block) const
2865
84.3k
{
2866
84.3k
    std::optional<uint256> block_hash;
2867
84.3k
    if (auto* conf = wtx.state<TxStateConfirmed>()) {
2868
84.3k
        block_hash = conf->confirmed_block_hash;
2869
84.3k
    } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
2870
0
        block_hash = conf->conflicting_block_hash;
2871
0
    }
2872
2873
84.3k
    unsigned int nTimeSmart = wtx.nTimeReceived;
2874
84.3k
    if (block_hash) {
2875
84.3k
        int64_t blocktime;
2876
84.3k
        int64_t block_max_time;
2877
84.3k
        if (chain().findBlock(*block_hash, FoundBlock().time(blocktime).maxTime(block_max_time))) {
2878
0
            if (rescanning_old_block) {
2879
0
                nTimeSmart = block_max_time;
2880
0
            } else {
2881
0
                int64_t latestNow = wtx.nTimeReceived;
2882
0
                int64_t latestEntry = 0;
2883
2884
                // Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future
2885
0
                int64_t latestTolerated = latestNow + 300;
2886
0
                const TxItems& txOrdered = wtxOrdered;
2887
0
                for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) {
2888
0
                    CWalletTx* const pwtx = it->second;
2889
0
                    if (pwtx == &wtx) {
2890
0
                        continue;
2891
0
                    }
2892
0
                    int64_t nSmartTime;
2893
0
                    nSmartTime = pwtx->nTimeSmart;
2894
0
                    if (!nSmartTime) {
2895
0
                        nSmartTime = pwtx->nTimeReceived;
2896
0
                    }
2897
0
                    if (nSmartTime <= latestTolerated) {
2898
0
                        latestEntry = nSmartTime;
2899
0
                        if (nSmartTime > latestNow) {
2900
0
                            latestNow = nSmartTime;
2901
0
                        }
2902
0
                        break;
2903
0
                    }
2904
0
                }
2905
2906
0
                nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow));
2907
0
            }
2908
84.3k
        } else {
2909
84.3k
            WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), block_hash->ToString());
2910
84.3k
        }
2911
84.3k
    }
2912
84.3k
    return nTimeSmart;
2913
84.3k
}
2914
2915
bool CWallet::SetAddressPreviouslySpent(WalletBatch& batch, const CTxDestination& dest, bool used)
2916
0
{
2917
0
    if (std::get_if<CNoDestination>(&dest))
2918
0
        return false;
2919
2920
0
    if (!used) {
2921
0
        if (auto* data{common::FindKey(m_address_book, dest)}) data->previously_spent = false;
2922
0
        return batch.WriteAddressPreviouslySpent(dest, false);
2923
0
    }
2924
2925
0
    LoadAddressPreviouslySpent(dest);
2926
0
    return batch.WriteAddressPreviouslySpent(dest, true);
2927
0
}
2928
2929
void CWallet::LoadAddressPreviouslySpent(const CTxDestination& dest)
2930
0
{
2931
0
    m_address_book[dest].previously_spent = true;
2932
0
}
2933
2934
void CWallet::LoadAddressReceiveRequest(const CTxDestination& dest, const std::string& id, const std::string& request)
2935
0
{
2936
0
    m_address_book[dest].receive_requests[id] = request;
2937
0
}
2938
2939
bool CWallet::IsAddressPreviouslySpent(const CTxDestination& dest) const
2940
0
{
2941
0
    if (auto* data{common::FindKey(m_address_book, dest)}) return data->previously_spent;
2942
0
    return false;
2943
0
}
2944
2945
std::vector<std::string> CWallet::GetAddressReceiveRequests() const
2946
0
{
2947
0
    std::vector<std::string> values;
2948
0
    for (const auto& [dest, entry] : m_address_book) {
2949
0
        for (const auto& [id, request] : entry.receive_requests) {
2950
0
            values.emplace_back(request);
2951
0
        }
2952
0
    }
2953
0
    return values;
2954
0
}
2955
2956
bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value)
2957
0
{
2958
0
    if (!batch.WriteAddressReceiveRequest(dest, id, value)) return false;
2959
0
    m_address_book[dest].receive_requests[id] = value;
2960
0
    return true;
2961
0
}
2962
2963
bool CWallet::EraseAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id)
2964
0
{
2965
0
    if (!batch.EraseAddressReceiveRequest(dest, id)) return false;
2966
0
    m_address_book[dest].receive_requests.erase(id);
2967
0
    return true;
2968
0
}
2969
2970
static util::Result<fs::path> GetWalletPath(const std::string& name)
2971
0
{
2972
    // Do some checking on wallet path. It should be either a:
2973
    //
2974
    // 1. Path where a directory can be created.
2975
    // 2. Path to an existing directory.
2976
    // 3. Path to a symlink to a directory.
2977
    // 4. For backwards compatibility, the name of a data file in -walletdir.
2978
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(name));
2979
0
    fs::file_type path_type = fs::symlink_status(wallet_path).type();
2980
0
    if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory ||
2981
0
          (path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) ||
2982
0
          (path_type == fs::file_type::regular && fs::PathFromString(name).filename() == fs::PathFromString(name)))) {
2983
0
        return util::Error{Untranslated(strprintf(
2984
0
              "Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and "
2985
0
              "database/log.?????????? files can be stored, a location where such a directory could be created, "
2986
0
              "or (for backwards compatibility) the name of an existing data file in -walletdir (%s)",
2987
0
              name, fs::quoted(fs::PathToString(GetWalletDir()))))};
2988
0
    }
2989
0
    return wallet_path;
2990
0
}
2991
2992
std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string)
2993
0
{
2994
0
    const auto& wallet_path = GetWalletPath(name);
2995
0
    if (!wallet_path) {
2996
0
        error_string = util::ErrorString(wallet_path);
2997
0
        status = DatabaseStatus::FAILED_BAD_PATH;
2998
0
        return nullptr;
2999
0
    }
3000
0
    return MakeDatabase(*wallet_path, options, status, error_string);
3001
0
}
3002
3003
std::shared_ptr<CWallet> CWallet::Create(WalletContext& context, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings)
3004
0
{
3005
0
    interfaces::Chain* chain = context.chain;
3006
0
    ArgsManager& args = *Assert(context.args);
3007
0
    const std::string& walletFile = database->Filename();
3008
3009
0
    const auto start{SteadyClock::now()};
3010
    // TODO: Can't use std::make_shared because we need a custom deleter but
3011
    // should be possible to use std::allocate_shared.
3012
0
    std::shared_ptr<CWallet> walletInstance(new CWallet(chain, name, std::move(database)), FlushAndDeleteWallet);
3013
0
    walletInstance->m_keypool_size = std::max(args.GetIntArg("-keypool", DEFAULT_KEYPOOL_SIZE), int64_t{1});
3014
0
    walletInstance->m_notify_tx_changed_script = args.GetArg("-walletnotify", "");
3015
3016
    // Load wallet
3017
0
    bool rescan_required = false;
3018
0
    DBErrors nLoadWalletRet = walletInstance->LoadWallet();
3019
0
    if (nLoadWalletRet != DBErrors::LOAD_OK) {
3020
0
        if (nLoadWalletRet == DBErrors::CORRUPT) {
3021
0
            error = strprintf(_("Error loading %s: Wallet corrupted"), walletFile);
3022
0
            return nullptr;
3023
0
        }
3024
0
        else if (nLoadWalletRet == DBErrors::NONCRITICAL_ERROR)
3025
0
        {
3026
0
            warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"
3027
0
                                           " or address metadata may be missing or incorrect."),
3028
0
                walletFile));
3029
0
        }
3030
0
        else if (nLoadWalletRet == DBErrors::TOO_NEW) {
3031
0
            error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), walletFile, CLIENT_NAME);
3032
0
            return nullptr;
3033
0
        }
3034
0
        else if (nLoadWalletRet == DBErrors::EXTERNAL_SIGNER_SUPPORT_REQUIRED) {
3035
0
            error = strprintf(_("Error loading %s: External signer wallet being loaded without external signer support compiled"), walletFile);
3036
0
            return nullptr;
3037
0
        }
3038
0
        else if (nLoadWalletRet == DBErrors::NEED_REWRITE)
3039
0
        {
3040
0
            error = strprintf(_("Wallet needed to be rewritten: restart %s to complete"), CLIENT_NAME);
3041
0
            return nullptr;
3042
0
        } else if (nLoadWalletRet == DBErrors::NEED_RESCAN) {
3043
0
            warnings.push_back(strprintf(_("Error reading %s! Transaction data may be missing or incorrect."
3044
0
                                           " Rescanning wallet."), walletFile));
3045
0
            rescan_required = true;
3046
0
        } else if (nLoadWalletRet == DBErrors::UNKNOWN_DESCRIPTOR) {
3047
0
            error = strprintf(_("Unrecognized descriptor found. Loading wallet %s\n\n"
3048
0
                                "The wallet might had been created on a newer version.\n"
3049
0
                                "Please try running the latest software version.\n"), walletFile);
3050
0
            return nullptr;
3051
0
        } else if (nLoadWalletRet == DBErrors::UNEXPECTED_LEGACY_ENTRY) {
3052
0
            error = strprintf(_("Unexpected legacy entry in descriptor wallet found. Loading wallet %s\n\n"
3053
0
                                "The wallet might have been tampered with or created with malicious intent.\n"), walletFile);
3054
0
            return nullptr;
3055
0
        } else {
3056
0
            error = strprintf(_("Error loading %s"), walletFile);
3057
0
            return nullptr;
3058
0
        }
3059
0
    }
3060
3061
    // This wallet is in its first run if there are no ScriptPubKeyMans and it isn't blank or no privkeys
3062
0
    const bool fFirstRun = walletInstance->m_spk_managers.empty() &&
3063
0
                     !walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) &&
3064
0
                     !walletInstance->IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET);
3065
0
    if (fFirstRun)
3066
0
    {
3067
        // ensure this wallet.dat can only be opened by clients supporting HD with chain split and expects no default key
3068
0
        walletInstance->SetMinVersion(FEATURE_LATEST);
3069
3070
0
        walletInstance->InitWalletFlags(wallet_creation_flags);
3071
3072
        // Only create LegacyScriptPubKeyMan when not descriptor wallet
3073
0
        if (!walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3074
0
            walletInstance->SetupLegacyScriptPubKeyMan();
3075
0
        }
3076
3077
0
        if ((wallet_creation_flags & WALLET_FLAG_EXTERNAL_SIGNER) || !(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) {
3078
0
            LOCK(walletInstance->cs_wallet);
3079
0
            if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3080
0
                walletInstance->SetupDescriptorScriptPubKeyMans();
3081
                // SetupDescriptorScriptPubKeyMans already calls SetupGeneration for us so we don't need to call SetupGeneration separately
3082
0
            } else {
3083
                // Legacy wallets need SetupGeneration here.
3084
0
                for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
3085
0
                    if (!spk_man->SetupGeneration()) {
3086
0
                        error = _("Unable to generate initial keys");
3087
0
                        return nullptr;
3088
0
                    }
3089
0
                }
3090
0
            }
3091
0
        }
3092
3093
0
        if (chain) {
3094
0
            walletInstance->chainStateFlushed(ChainstateRole::NORMAL, chain->getTipLocator());
3095
0
        }
3096
0
    } else if (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS) {
3097
        // Make it impossible to disable private keys after creation
3098
0
        error = strprintf(_("Error loading %s: Private keys can only be disabled during creation"), walletFile);
3099
0
        return nullptr;
3100
0
    } else if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
3101
0
        for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
3102
0
            if (spk_man->HavePrivateKeys()) {
3103
0
                warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));
3104
0
                break;
3105
0
            }
3106
0
        }
3107
0
    }
3108
3109
0
    if (!args.GetArg("-addresstype", "").empty()) {
3110
0
        std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-addresstype", ""));
3111
0
        if (!parsed) {
3112
0
            error = strprintf(_("Unknown address type '%s'"), args.GetArg("-addresstype", ""));
3113
0
            return nullptr;
3114
0
        }
3115
0
        walletInstance->m_default_address_type = parsed.value();
3116
0
    }
3117
3118
0
    if (!args.GetArg("-changetype", "").empty()) {
3119
0
        std::optional<OutputType> parsed = ParseOutputType(args.GetArg("-changetype", ""));
3120
0
        if (!parsed) {
3121
0
            error = strprintf(_("Unknown change type '%s'"), args.GetArg("-changetype", ""));
3122
0
            return nullptr;
3123
0
        }
3124
0
        walletInstance->m_default_change_type = parsed.value();
3125
0
    }
3126
3127
0
    if (const auto arg{args.GetArg("-mintxfee")}) {
3128
0
        std::optional<CAmount> min_tx_fee = ParseMoney(*arg);
3129
0
        if (!min_tx_fee) {
3130
0
            error = AmountErrMsg("mintxfee", *arg);
3131
0
            return nullptr;
3132
0
        } else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
3133
0
            warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") +
3134
0
                               _("This is the minimum transaction fee you pay on every transaction."));
3135
0
        }
3136
3137
0
        walletInstance->m_min_fee = CFeeRate{min_tx_fee.value()};
3138
0
    }
3139
3140
0
    if (const auto arg{args.GetArg("-maxapsfee")}) {
3141
0
        const std::string& max_aps_fee{*arg};
3142
0
        if (max_aps_fee == "-1") {
3143
0
            walletInstance->m_max_aps_fee = -1;
3144
0
        } else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) {
3145
0
            if (max_fee.value() > HIGH_APS_FEE) {
3146
0
                warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") +
3147
0
                                  _("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection."));
3148
0
            }
3149
0
            walletInstance->m_max_aps_fee = max_fee.value();
3150
0
        } else {
3151
0
            error = AmountErrMsg("maxapsfee", max_aps_fee);
3152
0
            return nullptr;
3153
0
        }
3154
0
    }
3155
3156
0
    if (const auto arg{args.GetArg("-fallbackfee")}) {
3157
0
        std::optional<CAmount> fallback_fee = ParseMoney(*arg);
3158
0
        if (!fallback_fee) {
3159
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-fallbackfee", *arg);
3160
0
            return nullptr;
3161
0
        } else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) {
3162
0
            warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") +
3163
0
                               _("This is the transaction fee you may pay when fee estimates are not available."));
3164
0
        }
3165
0
        walletInstance->m_fallback_fee = CFeeRate{fallback_fee.value()};
3166
0
    }
3167
3168
    // Disable fallback fee in case value was set to 0, enable if non-null value
3169
0
    walletInstance->m_allow_fallback_fee = walletInstance->m_fallback_fee.GetFeePerK() != 0;
3170
3171
0
    if (const auto arg{args.GetArg("-discardfee")}) {
3172
0
        std::optional<CAmount> discard_fee = ParseMoney(*arg);
3173
0
        if (!discard_fee) {
3174
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s'"), "-discardfee", *arg);
3175
0
            return nullptr;
3176
0
        } else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) {
3177
0
            warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") +
3178
0
                               _("This is the transaction fee you may discard if change is smaller than dust at this level"));
3179
0
        }
3180
0
        walletInstance->m_discard_rate = CFeeRate{discard_fee.value()};
3181
0
    }
3182
3183
0
    if (const auto arg{args.GetArg("-paytxfee")}) {
3184
0
        warnings.push_back(_("-paytxfee is deprecated and will be fully removed in v31.0."));
3185
3186
0
        std::optional<CAmount> pay_tx_fee = ParseMoney(*arg);
3187
0
        if (!pay_tx_fee) {
3188
0
            error = AmountErrMsg("paytxfee", *arg);
3189
0
            return nullptr;
3190
0
        } else if (pay_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
3191
0
            warnings.push_back(AmountHighWarn("-paytxfee") + Untranslated(" ") +
3192
0
                               _("This is the transaction fee you will pay if you send a transaction."));
3193
0
        }
3194
3195
0
        walletInstance->m_pay_tx_fee = CFeeRate{pay_tx_fee.value(), 1000};
3196
3197
0
        if (chain && walletInstance->m_pay_tx_fee < chain->relayMinFee()) {
3198
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least %s)"),
3199
0
                "-paytxfee", *arg, chain->relayMinFee().ToString());
3200
0
            return nullptr;
3201
0
        }
3202
0
    }
3203
3204
0
    if (const auto arg{args.GetArg("-maxtxfee")}) {
3205
0
        std::optional<CAmount> max_fee = ParseMoney(*arg);
3206
0
        if (!max_fee) {
3207
0
            error = AmountErrMsg("maxtxfee", *arg);
3208
0
            return nullptr;
3209
0
        } else if (max_fee.value() > HIGH_MAX_TX_FEE) {
3210
0
            warnings.push_back(strprintf(_("%s is set very high! Fees this large could be paid on a single transaction."), "-maxtxfee"));
3211
0
        }
3212
3213
0
        if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) {
3214
0
            error = strprintf(_("Invalid amount for %s=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),
3215
0
                "-maxtxfee", *arg, chain->relayMinFee().ToString());
3216
0
            return nullptr;
3217
0
        }
3218
3219
0
        walletInstance->m_default_max_tx_fee = max_fee.value();
3220
0
    }
3221
3222
0
    if (const auto arg{args.GetArg("-consolidatefeerate")}) {
3223
0
        if (std::optional<CAmount> consolidate_feerate = ParseMoney(*arg)) {
3224
0
            walletInstance->m_consolidate_feerate = CFeeRate(*consolidate_feerate);
3225
0
        } else {
3226
0
            error = AmountErrMsg("consolidatefeerate", *arg);
3227
0
            return nullptr;
3228
0
        }
3229
0
    }
3230
3231
0
    if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB) {
3232
0
        warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") +
3233
0
                           _("The wallet will avoid paying less than the minimum relay fee."));
3234
0
    }
3235
3236
0
    walletInstance->m_confirm_target = args.GetIntArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET);
3237
0
    walletInstance->m_spend_zero_conf_change = args.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE);
3238
0
    walletInstance->m_signal_rbf = args.GetBoolArg("-walletrbf", DEFAULT_WALLET_RBF);
3239
3240
0
    walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
3241
3242
    // Try to top up keypool. No-op if the wallet is locked.
3243
0
    walletInstance->TopUpKeyPool();
3244
3245
    // Cache the first key time
3246
0
    std::optional<int64_t> time_first_key;
3247
0
    for (auto spk_man : walletInstance->GetAllScriptPubKeyMans()) {
3248
0
        int64_t time = spk_man->GetTimeFirstKey();
3249
0
        if (!time_first_key || time < *time_first_key) time_first_key = time;
3250
0
    }
3251
0
    if (time_first_key) walletInstance->MaybeUpdateBirthTime(*time_first_key);
3252
3253
0
    if (chain && !AttachChain(walletInstance, *chain, rescan_required, error, warnings)) {
3254
0
        walletInstance->m_chain_notifications_handler.reset(); // Reset this pointer so that the wallet will actually be unloaded
3255
0
        return nullptr;
3256
0
    }
3257
3258
0
    {
3259
0
        LOCK(walletInstance->cs_wallet);
3260
0
        walletInstance->SetBroadcastTransactions(args.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST));
3261
0
        walletInstance->WalletLogPrintf("setKeyPool.size() = %u\n",      walletInstance->GetKeyPoolSize());
3262
0
        walletInstance->WalletLogPrintf("mapWallet.size() = %u\n",       walletInstance->mapWallet.size());
3263
0
        walletInstance->WalletLogPrintf("m_address_book.size() = %u\n",  walletInstance->m_address_book.size());
3264
0
    }
3265
3266
0
    return walletInstance;
3267
0
}
3268
3269
bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, const bool rescan_required, bilingual_str& error, std::vector<bilingual_str>& warnings)
3270
0
{
3271
0
    LOCK(walletInstance->cs_wallet);
3272
    // allow setting the chain if it hasn't been set already but prevent changing it
3273
0
    assert(!walletInstance->m_chain || walletInstance->m_chain == &chain);
3274
0
    walletInstance->m_chain = &chain;
3275
3276
    // Unless allowed, ensure wallet files are not reused across chains:
3277
0
    if (!gArgs.GetBoolArg("-walletcrosschain", DEFAULT_WALLETCROSSCHAIN)) {
3278
0
        WalletBatch batch(walletInstance->GetDatabase());
3279
0
        CBlockLocator locator;
3280
0
        if (batch.ReadBestBlock(locator) && locator.vHave.size() > 0 && chain.getHeight()) {
3281
            // Wallet is assumed to be from another chain, if genesis block in the active
3282
            // chain differs from the genesis block known to the wallet.
3283
0
            if (chain.getBlockHash(0) != locator.vHave.back()) {
3284
0
                error = Untranslated("Wallet files should not be reused across chains. Restart bitcoind with -walletcrosschain to override.");
3285
0
                return false;
3286
0
            }
3287
0
        }
3288
0
    }
3289
3290
    // Register wallet with validationinterface. It's done before rescan to avoid
3291
    // missing block connections during the rescan.
3292
    // Because of the wallet lock being held, block connection notifications are going to
3293
    // be pending on the validation-side until lock release. Blocks that are connected while the
3294
    // rescan is ongoing will not be processed in the rescan but with the block connected notifications,
3295
    // so the wallet will only be completeley synced after the notifications delivery.
3296
    // chainStateFlushed notifications are ignored until the rescan is finished
3297
    // so that in case of a shutdown event, the rescan will be repeated at the next start.
3298
    // This is temporary until rescan and notifications delivery are unified under same
3299
    // interface.
3300
0
    walletInstance->m_attaching_chain = true; //ignores chainStateFlushed notifications
3301
0
    walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance);
3302
3303
    // If rescan_required = true, rescan_height remains equal to 0
3304
0
    int rescan_height = 0;
3305
0
    if (!rescan_required)
3306
0
    {
3307
0
        WalletBatch batch(walletInstance->GetDatabase());
3308
0
        CBlockLocator locator;
3309
0
        if (batch.ReadBestBlock(locator)) {
3310
0
            if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) {
3311
0
                rescan_height = *fork_height;
3312
0
            }
3313
0
        }
3314
0
    }
3315
3316
0
    const std::optional<int> tip_height = chain.getHeight();
3317
0
    if (tip_height) {
3318
0
        walletInstance->m_last_block_processed = chain.getBlockHash(*tip_height);
3319
0
        walletInstance->m_last_block_processed_height = *tip_height;
3320
0
    } else {
3321
0
        walletInstance->m_last_block_processed.SetNull();
3322
0
        walletInstance->m_last_block_processed_height = -1;
3323
0
    }
3324
3325
0
    if (tip_height && *tip_height != rescan_height)
3326
0
    {
3327
        // No need to read and scan block if block was created before
3328
        // our wallet birthday (as adjusted for block time variability)
3329
0
        std::optional<int64_t> time_first_key = walletInstance->m_birth_time.load();
3330
0
        if (time_first_key) {
3331
0
            FoundBlock found = FoundBlock().height(rescan_height);
3332
0
            chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, found);
3333
0
            if (!found.found) {
3334
                // We were unable to find a block that had a time more recent than our earliest timestamp
3335
                // or a height higher than the wallet was synced to, indicating that the wallet is newer than the
3336
                // current chain tip. Skip rescanning in this case.
3337
0
                rescan_height = *tip_height;
3338
0
            }
3339
0
        }
3340
3341
        // Technically we could execute the code below in any case, but performing the
3342
        // `while` loop below can make startup very slow, so only check blocks on disk
3343
        // if necessary.
3344
0
        if (chain.havePruned() || chain.hasAssumedValidChain()) {
3345
0
            int block_height = *tip_height;
3346
0
            while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) {
3347
0
                --block_height;
3348
0
            }
3349
3350
0
            if (rescan_height != block_height) {
3351
                // We can't rescan beyond blocks we don't have data for, stop and throw an error.
3352
                // This might happen if a user uses an old wallet within a pruned node
3353
                // or if they ran -disablewallet for a longer time, then decided to re-enable
3354
                // Exit early and print an error.
3355
                // It also may happen if an assumed-valid chain is in use and therefore not
3356
                // all block data is available.
3357
                // If a block is pruned after this check, we will load the wallet,
3358
                // but fail the rescan with a generic error.
3359
3360
0
                error = chain.havePruned() ?
3361
0
                     _("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of pruned node)") :
3362
0
                     strprintf(_(
3363
0
                        "Error loading wallet. Wallet requires blocks to be downloaded, "
3364
0
                        "and software does not currently support loading wallets while "
3365
0
                        "blocks are being downloaded out of order when using assumeutxo "
3366
0
                        "snapshots. Wallet should be able to load successfully after "
3367
0
                        "node sync reaches height %s"), block_height);
3368
0
                return false;
3369
0
            }
3370
0
        }
3371
3372
0
        chain.initMessage(_("Rescanning…"));
3373
0
        walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height);
3374
3375
0
        {
3376
0
            WalletRescanReserver reserver(*walletInstance);
3377
0
            if (!reserver.reserve() || (ScanResult::SUCCESS != walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, /*max_height=*/{}, reserver, /*fUpdate=*/true, /*save_progress=*/true).status)) {
3378
0
                error = _("Failed to rescan the wallet during initialization");
3379
0
                return false;
3380
0
            }
3381
0
        }
3382
0
        walletInstance->m_attaching_chain = false;
3383
0
        walletInstance->chainStateFlushed(ChainstateRole::NORMAL, chain.getTipLocator());
3384
0
        walletInstance->GetDatabase().IncrementUpdateCounter();
3385
0
    }
3386
0
    walletInstance->m_attaching_chain = false;
3387
3388
0
    return true;
3389
0
}
3390
3391
const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const
3392
0
{
3393
0
    const auto& address_book_it = m_address_book.find(dest);
3394
0
    if (address_book_it == m_address_book.end()) return nullptr;
3395
0
    if ((!allow_change) && address_book_it->second.IsChange()) {
3396
0
        return nullptr;
3397
0
    }
3398
0
    return &address_book_it->second;
3399
0
}
3400
3401
bool CWallet::UpgradeWallet(int version, bilingual_str& error)
3402
0
{
3403
0
    int prev_version = GetVersion();
3404
0
    if (version == 0) {
3405
0
        WalletLogPrintf("Performing wallet upgrade to %i\n", FEATURE_LATEST);
3406
0
        version = FEATURE_LATEST;
3407
0
    } else {
3408
0
        WalletLogPrintf("Allowing wallet upgrade up to %i\n", version);
3409
0
    }
3410
0
    if (version < prev_version) {
3411
0
        error = strprintf(_("Cannot downgrade wallet from version %i to version %i. Wallet version unchanged."), prev_version, version);
3412
0
        return false;
3413
0
    }
3414
3415
0
    LOCK(cs_wallet);
3416
3417
    // Do not upgrade versions to any version between HD_SPLIT and FEATURE_PRE_SPLIT_KEYPOOL unless already supporting HD_SPLIT
3418
0
    if (!CanSupportFeature(FEATURE_HD_SPLIT) && version >= FEATURE_HD_SPLIT && version < FEATURE_PRE_SPLIT_KEYPOOL) {
3419
0
        error = strprintf(_("Cannot upgrade a non HD split wallet from version %i to version %i without upgrading to support pre-split keypool. Please use version %i or no version specified."), prev_version, version, FEATURE_PRE_SPLIT_KEYPOOL);
3420
0
        return false;
3421
0
    }
3422
3423
    // Permanently upgrade to the version
3424
0
    SetMinVersion(GetClosestWalletFeature(version));
3425
3426
0
    for (auto spk_man : GetActiveScriptPubKeyMans()) {
3427
0
        if (!spk_man->Upgrade(prev_version, version, error)) {
3428
0
            return false;
3429
0
        }
3430
0
    }
3431
0
    return true;
3432
0
}
3433
3434
void CWallet::postInitProcess()
3435
0
{
3436
    // Add wallet transactions that aren't already in a block to mempool
3437
    // Do this here as mempool requires genesis block to be loaded
3438
0
    ResubmitWalletTransactions(/*relay=*/false, /*force=*/true);
3439
3440
    // Update wallet transactions with current mempool transactions.
3441
0
    WITH_LOCK(cs_wallet, chain().requestMempoolTransactions(*this));
3442
0
}
3443
3444
bool CWallet::BackupWallet(const std::string& strDest) const
3445
0
{
3446
0
    if (m_chain) {
3447
0
        CBlockLocator loc;
3448
0
        WITH_LOCK(cs_wallet, chain().findBlock(m_last_block_processed, FoundBlock().locator(loc)));
3449
0
        if (!loc.IsNull()) {
3450
0
            WalletBatch batch(GetDatabase());
3451
0
            batch.WriteBestBlock(loc);
3452
0
        }
3453
0
    }
3454
0
    return GetDatabase().Backup(strDest);
3455
0
}
3456
3457
CKeyPool::CKeyPool()
3458
163k
{
3459
163k
    nTime = GetTime();
3460
163k
    fInternal = false;
3461
163k
    m_pre_split = false;
3462
163k
}
3463
3464
CKeyPool::CKeyPool(const CPubKey& vchPubKeyIn, bool internalIn)
3465
0
{
3466
0
    nTime = GetTime();
3467
0
    vchPubKey = vchPubKeyIn;
3468
0
    fInternal = internalIn;
3469
0
    m_pre_split = false;
3470
0
}
3471
3472
int CWallet::GetTxDepthInMainChain(const CWalletTx& wtx) const
3473
3.89M
{
3474
3.89M
    AssertLockHeld(cs_wallet);
3475
3.89M
    if (auto* conf = wtx.state<TxStateConfirmed>()) {
3476
3.89M
        assert(conf->confirmed_block_height >= 0);
3477
3.89M
        return GetLastBlockHeight() - conf->confirmed_block_height + 1;
3478
3.89M
    } else if (auto* conf = wtx.state<TxStateBlockConflicted>()) {
3479
0
        assert(conf->conflicting_block_height >= 0);
3480
0
        return -1 * (GetLastBlockHeight() - conf->conflicting_block_height + 1);
3481
0
    } else {
3482
0
        return 0;
3483
0
    }
3484
3.89M
}
3485
3486
int CWallet::GetTxBlocksToMaturity(const CWalletTx& wtx) const
3487
5.77M
{
3488
5.77M
    AssertLockHeld(cs_wallet);
3489
3490
5.77M
    if (!wtx.IsCoinBase()) {
3491
5.77M
        return 0;
3492
5.77M
    }
3493
0
    int chain_depth = GetTxDepthInMainChain(wtx);
3494
0
    assert(chain_depth >= 0); // coinbase tx should not be conflicted
3495
0
    return std::max(0, (COINBASE_MATURITY+1) - chain_depth);
3496
0
}
3497
3498
bool CWallet::IsTxImmatureCoinBase(const CWalletTx& wtx) const
3499
5.77M
{
3500
5.77M
    AssertLockHeld(cs_wallet);
3501
3502
    // note GetBlocksToMaturity is 0 for non-coinbase tx
3503
5.77M
    return GetTxBlocksToMaturity(wtx) > 0;
3504
5.77M
}
3505
3506
bool CWallet::IsCrypted() const
3507
0
{
3508
0
    return HasEncryptionKeys();
3509
0
}
3510
3511
bool CWallet::IsLocked() const
3512
0
{
3513
0
    if (!IsCrypted()) {
3514
0
        return false;
3515
0
    }
3516
0
    LOCK(cs_wallet);
3517
0
    return vMasterKey.empty();
3518
0
}
3519
3520
bool CWallet::Lock()
3521
0
{
3522
0
    if (!IsCrypted())
3523
0
        return false;
3524
3525
0
    {
3526
0
        LOCK2(m_relock_mutex, cs_wallet);
3527
0
        if (!vMasterKey.empty()) {
3528
0
            memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type));
3529
0
            vMasterKey.clear();
3530
0
        }
3531
0
    }
3532
3533
0
    NotifyStatusChanged(this);
3534
0
    return true;
3535
0
}
3536
3537
bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn)
3538
0
{
3539
0
    {
3540
0
        LOCK(cs_wallet);
3541
0
        for (const auto& spk_man_pair : m_spk_managers) {
3542
0
            if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn)) {
3543
0
                return false;
3544
0
            }
3545
0
        }
3546
0
        vMasterKey = vMasterKeyIn;
3547
0
    }
3548
0
    NotifyStatusChanged(this);
3549
0
    return true;
3550
0
}
3551
3552
std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const
3553
0
{
3554
0
    std::set<ScriptPubKeyMan*> spk_mans;
3555
0
    for (bool internal : {false, true}) {
3556
0
        for (OutputType t : OUTPUT_TYPES) {
3557
0
            auto spk_man = GetScriptPubKeyMan(t, internal);
3558
0
            if (spk_man) {
3559
0
                spk_mans.insert(spk_man);
3560
0
            }
3561
0
        }
3562
0
    }
3563
0
    return spk_mans;
3564
0
}
3565
3566
bool CWallet::IsActiveScriptPubKeyMan(const ScriptPubKeyMan& spkm) const
3567
0
{
3568
0
    for (const auto& [_, ext_spkm] : m_external_spk_managers) {
3569
0
        if (ext_spkm == &spkm) return true;
3570
0
    }
3571
0
    for (const auto& [_, int_spkm] : m_internal_spk_managers) {
3572
0
        if (int_spkm == &spkm) return true;
3573
0
    }
3574
0
    return false;
3575
0
}
3576
3577
std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const
3578
1.23k
{
3579
1.23k
    std::set<ScriptPubKeyMan*> spk_mans;
3580
9.88k
    for (const auto& spk_man_pair : m_spk_managers) {
3581
9.88k
        spk_mans.insert(spk_man_pair.second.get());
3582
9.88k
    }
3583
1.23k
    return spk_mans;
3584
1.23k
}
3585
3586
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const OutputType& type, bool internal) const
3587
587k
{
3588
587k
    const std::map<OutputType, ScriptPubKeyMan*>& spk_managers = internal ? m_internal_spk_managers : m_external_spk_managers;
3589
587k
    std::map<OutputType, ScriptPubKeyMan*>::const_iterator it = spk_managers.find(type);
3590
587k
    if (it == spk_managers.end()) {
3591
0
        return nullptr;
3592
0
    }
3593
587k
    return it->second;
3594
587k
}
3595
3596
std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script) const
3597
571k
{
3598
571k
    std::set<ScriptPubKeyMan*> spk_mans;
3599
3600
    // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3601
571k
    const auto& it = m_cached_spks.find(script);
3602
571k
    if (it != m_cached_spks.end()) {
3603
457k
        spk_mans.insert(it->second.begin(), it->second.end());
3604
457k
    }
3605
571k
    SignatureData sigdata;
3606
571k
    Assume(std::all_of(spk_mans.begin(), spk_mans.end(), [&script, &sigdata](ScriptPubKeyMan* spkm) { return spkm->CanProvide(script, sigdata); }));
3607
3608
    // Legacy wallet
3609
571k
    LegacyScriptPubKeyMan* spkm = GetLegacyScriptPubKeyMan();
3610
571k
    if (spkm && spkm->CanProvide(script, sigdata)) spk_mans.insert(spkm);
3611
3612
571k
    return spk_mans;
3613
571k
}
3614
3615
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const
3616
0
{
3617
0
    if (m_spk_managers.count(id) > 0) {
3618
0
        return m_spk_managers.at(id).get();
3619
0
    }
3620
0
    return nullptr;
3621
0
}
3622
3623
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const
3624
3.48M
{
3625
3.48M
    SignatureData sigdata;
3626
3.48M
    return GetSolvingProvider(script, sigdata);
3627
3.48M
}
3628
3629
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const
3630
3.48M
{
3631
    // Search the cache for relevant SPKMs instead of iterating m_spk_managers
3632
3.48M
    const auto& it = m_cached_spks.find(script);
3633
3.48M
    if (it != m_cached_spks.end()) {
3634
        // All spkms for a given script must already be able to make a SigningProvider for the script, so just return the first one.
3635
3.48M
        Assume(it->second.at(0)->CanProvide(script, sigdata));
3636
3.48M
        return it->second.at(0)->GetSolvingProvider(script);
3637
3.48M
    }
3638
3639
    // Legacy wallet
3640
355
    LegacyScriptPubKeyMan* spkm = GetLegacyScriptPubKeyMan();
3641
355
    if (spkm && spkm->CanProvide(script, sigdata)) return spkm->GetSolvingProvider(script);
3642
3643
355
    return nullptr;
3644
355
}
3645
3646
std::vector<WalletDescriptor> CWallet::GetWalletDescriptors(const CScript& script) const
3647
0
{
3648
0
    std::vector<WalletDescriptor> descs;
3649
0
    for (const auto spk_man: GetScriptPubKeyMans(script)) {
3650
0
        if (const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man)) {
3651
0
            LOCK(desc_spk_man->cs_desc_man);
3652
0
            descs.push_back(desc_spk_man->GetWalletDescriptor());
3653
0
        }
3654
0
    }
3655
0
    return descs;
3656
0
}
3657
3658
LegacyScriptPubKeyMan* CWallet::GetLegacyScriptPubKeyMan() const
3659
2.20M
{
3660
2.20M
    if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3661
2.20M
        return nullptr;
3662
2.20M
    }
3663
    // Legacy wallets only have one ScriptPubKeyMan which is a LegacyScriptPubKeyMan.
3664
    // Everything in m_internal_spk_managers and m_external_spk_managers point to the same legacyScriptPubKeyMan.
3665
0
    auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3666
0
    if (it == m_internal_spk_managers.end()) return nullptr;
3667
0
    return dynamic_cast<LegacyScriptPubKeyMan*>(it->second);
3668
0
}
3669
3670
LegacyDataSPKM* CWallet::GetLegacyDataSPKM() const
3671
0
{
3672
0
    if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3673
0
        return nullptr;
3674
0
    }
3675
0
    auto it = m_internal_spk_managers.find(OutputType::LEGACY);
3676
0
    if (it == m_internal_spk_managers.end()) return nullptr;
3677
0
    return dynamic_cast<LegacyDataSPKM*>(it->second);
3678
0
}
3679
3680
LegacyScriptPubKeyMan* CWallet::GetOrCreateLegacyScriptPubKeyMan()
3681
0
{
3682
0
    SetupLegacyScriptPubKeyMan();
3683
0
    return GetLegacyScriptPubKeyMan();
3684
0
}
3685
3686
void CWallet::AddScriptPubKeyMan(const uint256& id, std::unique_ptr<ScriptPubKeyMan> spkm_man)
3687
28.2k
{
3688
    // Add spkm_man to m_spk_managers before calling any method
3689
    // that might access it.
3690
28.2k
    const auto& spkm = m_spk_managers[id] = std::move(spkm_man);
3691
3692
    // Update birth time if needed
3693
28.2k
    MaybeUpdateBirthTime(spkm->GetTimeFirstKey());
3694
28.2k
}
3695
3696
LegacyDataSPKM* CWallet::GetOrCreateLegacyDataSPKM()
3697
0
{
3698
0
    SetupLegacyScriptPubKeyMan();
3699
0
    return GetLegacyDataSPKM();
3700
0
}
3701
3702
void CWallet::SetupLegacyScriptPubKeyMan()
3703
0
{
3704
0
    if (!m_internal_spk_managers.empty() || !m_external_spk_managers.empty() || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3705
0
        return;
3706
0
    }
3707
3708
0
    std::unique_ptr<ScriptPubKeyMan> spk_manager = m_database->Format() == "bdb_ro" ?
3709
0
        std::make_unique<LegacyDataSPKM>(*this) :
3710
0
        std::make_unique<LegacyScriptPubKeyMan>(*this, m_keypool_size);
3711
3712
0
    for (const auto& type : LEGACY_OUTPUT_TYPES) {
3713
0
        m_internal_spk_managers[type] = spk_manager.get();
3714
0
        m_external_spk_managers[type] = spk_manager.get();
3715
0
    }
3716
0
    uint256 id = spk_manager->GetID();
3717
0
    AddScriptPubKeyMan(id, std::move(spk_manager));
3718
0
}
3719
3720
bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const
3721
0
{
3722
0
    LOCK(cs_wallet);
3723
0
    return cb(vMasterKey);
3724
0
}
3725
3726
bool CWallet::HasEncryptionKeys() const
3727
708k
{
3728
708k
    return !mapMasterKeys.empty();
3729
708k
}
3730
3731
bool CWallet::HaveCryptedKeys() const
3732
0
{
3733
0
    for (const auto& spkm : GetAllScriptPubKeyMans()) {
3734
0
        if (spkm->HaveCryptedKeys()) return true;
3735
0
    }
3736
0
    return false;
3737
0
}
3738
3739
void CWallet::ConnectScriptPubKeyManNotifiers()
3740
0
{
3741
0
    for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
3742
0
        spk_man->NotifyWatchonlyChanged.connect(NotifyWatchonlyChanged);
3743
0
        spk_man->NotifyCanGetAddressesChanged.connect(NotifyCanGetAddressesChanged);
3744
0
        spk_man->NotifyFirstKeyTimeChanged.connect(std::bind(&CWallet::MaybeUpdateBirthTime, this, std::placeholders::_2));
3745
0
    }
3746
0
}
3747
3748
DescriptorScriptPubKeyMan& CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc)
3749
0
{
3750
0
    DescriptorScriptPubKeyMan* spk_manager;
3751
0
    if (IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3752
0
        spk_manager = new ExternalSignerScriptPubKeyMan(*this, desc, m_keypool_size);
3753
0
    } else {
3754
0
        spk_manager = new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size);
3755
0
    }
3756
0
    AddScriptPubKeyMan(id, std::unique_ptr<ScriptPubKeyMan>(spk_manager));
3757
0
    return *spk_manager;
3758
0
}
3759
3760
DescriptorScriptPubKeyMan& CWallet::SetupDescriptorScriptPubKeyMan(WalletBatch& batch, const CExtKey& master_key, const OutputType& output_type, bool internal)
3761
0
{
3762
0
    AssertLockHeld(cs_wallet);
3763
0
    auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, m_keypool_size));
3764
0
    if (IsCrypted()) {
3765
0
        if (IsLocked()) {
3766
0
            throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors");
3767
0
        }
3768
0
        if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, &batch)) {
3769
0
            throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors");
3770
0
        }
3771
0
    }
3772
0
    spk_manager->SetupDescriptorGeneration(batch, master_key, output_type, internal);
3773
0
    DescriptorScriptPubKeyMan* out = spk_manager.get();
3774
0
    uint256 id = spk_manager->GetID();
3775
0
    AddScriptPubKeyMan(id, std::move(spk_manager));
3776
0
    AddActiveScriptPubKeyManWithDb(batch, id, output_type, internal);
3777
0
    return *out;
3778
0
}
3779
3780
void CWallet::SetupDescriptorScriptPubKeyMans(WalletBatch& batch, const CExtKey& master_key)
3781
0
{
3782
0
    AssertLockHeld(cs_wallet);
3783
0
    for (bool internal : {false, true}) {
3784
0
        for (OutputType t : OUTPUT_TYPES) {
3785
0
            SetupDescriptorScriptPubKeyMan(batch, master_key, t, internal);
3786
0
        }
3787
0
    }
3788
0
}
3789
3790
void CWallet::SetupOwnDescriptorScriptPubKeyMans(WalletBatch& batch)
3791
0
{
3792
0
    AssertLockHeld(cs_wallet);
3793
0
    assert(!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER));
3794
    // Make a seed
3795
0
    CKey seed_key = GenerateRandomKey();
3796
0
    CPubKey seed = seed_key.GetPubKey();
3797
0
    assert(seed_key.VerifyPubKey(seed));
3798
3799
    // Get the extended key
3800
0
    CExtKey master_key;
3801
0
    master_key.SetSeed(seed_key);
3802
3803
0
    SetupDescriptorScriptPubKeyMans(batch, master_key);
3804
0
}
3805
3806
void CWallet::SetupDescriptorScriptPubKeyMans()
3807
0
{
3808
0
    AssertLockHeld(cs_wallet);
3809
3810
0
    if (!IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER)) {
3811
0
        if (!RunWithinTxn(GetDatabase(), /*process_desc=*/"setup descriptors", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet){
3812
0
            SetupOwnDescriptorScriptPubKeyMans(batch);
3813
0
            return true;
3814
0
        })) throw std::runtime_error("Error: cannot process db transaction for descriptors setup");
3815
0
    } else {
3816
0
        ExternalSigner signer = ExternalSignerScriptPubKeyMan::GetExternalSigner();
3817
3818
        // TODO: add account parameter
3819
0
        int account = 0;
3820
0
        UniValue signer_res = signer.GetDescriptors(account);
3821
3822
0
        if (!signer_res.isObject()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
3823
3824
0
        WalletBatch batch(GetDatabase());
3825
0
        if (!batch.TxnBegin()) throw std::runtime_error("Error: cannot create db transaction for descriptors import");
3826
3827
0
        for (bool internal : {false, true}) {
3828
0
            const UniValue& descriptor_vals = signer_res.find_value(internal ? "internal" : "receive");
3829
0
            if (!descriptor_vals.isArray()) throw std::runtime_error(std::string(__func__) + ": Unexpected result");
3830
0
            for (const UniValue& desc_val : descriptor_vals.get_array().getValues()) {
3831
0
                const std::string& desc_str = desc_val.getValStr();
3832
0
                FlatSigningProvider keys;
3833
0
                std::string desc_error;
3834
0
                auto descs = Parse(desc_str, keys, desc_error, false);
3835
0
                if (descs.empty()) {
3836
0
                    throw std::runtime_error(std::string(__func__) + ": Invalid descriptor \"" + desc_str + "\" (" + desc_error + ")");
3837
0
                }
3838
0
                auto& desc = descs.at(0);
3839
0
                if (!desc->GetOutputType()) {
3840
0
                    continue;
3841
0
                }
3842
0
                OutputType t =  *desc->GetOutputType();
3843
0
                auto spk_manager = std::unique_ptr<ExternalSignerScriptPubKeyMan>(new ExternalSignerScriptPubKeyMan(*this, m_keypool_size));
3844
0
                spk_manager->SetupDescriptor(batch, std::move(desc));
3845
0
                uint256 id = spk_manager->GetID();
3846
0
                AddScriptPubKeyMan(id, std::move(spk_manager));
3847
0
                AddActiveScriptPubKeyManWithDb(batch, id, t, internal);
3848
0
            }
3849
0
        }
3850
3851
        // Ensure imported descriptors are committed to disk
3852
0
        if (!batch.TxnCommit()) throw std::runtime_error("Error: cannot commit db transaction for descriptors import");
3853
0
    }
3854
0
}
3855
3856
void CWallet::AddActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3857
24.3k
{
3858
24.3k
    WalletBatch batch(GetDatabase());
3859
24.3k
    return AddActiveScriptPubKeyManWithDb(batch, id, type, internal);
3860
24.3k
}
3861
3862
void CWallet::AddActiveScriptPubKeyManWithDb(WalletBatch& batch, uint256 id, OutputType type, bool internal)
3863
24.3k
{
3864
24.3k
    if (!batch.WriteActiveScriptPubKeyMan(static_cast<uint8_t>(type), id, internal)) {
3865
0
        throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed");
3866
0
    }
3867
24.3k
    LoadActiveScriptPubKeyMan(id, type, internal);
3868
24.3k
}
3869
3870
void CWallet::LoadActiveScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3871
24.3k
{
3872
    // Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets.
3873
    // Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types.
3874
24.3k
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
3875
3876
24.3k
    WalletLogPrintf("Setting spkMan to active: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3877
24.3k
    auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3878
24.3k
    auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers;
3879
24.3k
    auto spk_man = m_spk_managers.at(id).get();
3880
24.3k
    spk_mans[type] = spk_man;
3881
3882
24.3k
    const auto it = spk_mans_other.find(type);
3883
24.3k
    if (it != spk_mans_other.end() && it->second == spk_man) {
3884
0
        spk_mans_other.erase(type);
3885
0
    }
3886
3887
24.3k
    NotifyCanGetAddressesChanged();
3888
24.3k
}
3889
3890
void CWallet::DeactivateScriptPubKeyMan(uint256 id, OutputType type, bool internal)
3891
0
{
3892
0
    auto spk_man = GetScriptPubKeyMan(type, internal);
3893
0
    if (spk_man != nullptr && spk_man->GetID() == id) {
3894
0
        WalletLogPrintf("Deactivate spkMan: id = %s, type = %s, internal = %s\n", id.ToString(), FormatOutputType(type), internal ? "true" : "false");
3895
0
        WalletBatch batch(GetDatabase());
3896
0
        if (!batch.EraseActiveScriptPubKeyMan(static_cast<uint8_t>(type), internal)) {
3897
0
            throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed");
3898
0
        }
3899
3900
0
        auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
3901
0
        spk_mans.erase(type);
3902
0
    }
3903
3904
0
    NotifyCanGetAddressesChanged();
3905
0
}
3906
3907
bool CWallet::IsLegacy() const
3908
0
{
3909
0
    return !IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS);
3910
0
}
3911
3912
DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const
3913
56.6k
{
3914
174k
    for (auto& spk_man_pair : m_spk_managers) {
3915
        // Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match
3916
174k
        DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair.second.get());
3917
174k
        if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) {
3918
4.08k
            return spk_manager;
3919
4.08k
        }
3920
174k
    }
3921
3922
52.5k
    return nullptr;
3923
56.6k
}
3924
3925
std::optional<bool> CWallet::IsInternalScriptPubKeyMan(ScriptPubKeyMan* spk_man) const
3926
0
{
3927
    // Legacy script pubkey man can't be either external or internal
3928
0
    if (IsLegacy()) {
3929
0
        return std::nullopt;
3930
0
    }
3931
3932
    // only active ScriptPubKeyMan can be internal
3933
0
    if (!GetActiveScriptPubKeyMans().count(spk_man)) {
3934
0
        return std::nullopt;
3935
0
    }
3936
3937
0
    const auto desc_spk_man = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man);
3938
0
    if (!desc_spk_man) {
3939
0
        throw std::runtime_error(std::string(__func__) + ": unexpected ScriptPubKeyMan type.");
3940
0
    }
3941
3942
0
    LOCK(desc_spk_man->cs_desc_man);
3943
0
    const auto& type = desc_spk_man->GetWalletDescriptor().descriptor->GetOutputType();
3944
0
    assert(type.has_value());
3945
3946
0
    return GetScriptPubKeyMan(*type, /* internal= */ true) == desc_spk_man;
3947
0
}
3948
3949
ScriptPubKeyMan* CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal)
3950
28.3k
{
3951
28.3k
    AssertLockHeld(cs_wallet);
3952
3953
28.3k
    if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
3954
0
        WalletLogPrintf("Cannot add WalletDescriptor to a non-descriptor wallet\n");
3955
0
        return nullptr;
3956
0
    }
3957
3958
28.3k
    auto spk_man = GetDescriptorScriptPubKeyMan(desc);
3959
28.3k
    if (spk_man) {
3960
90
        WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString());
3961
90
        spk_man->UpdateWalletDescriptor(desc);
3962
28.2k
    } else {
3963
28.2k
        auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc, m_keypool_size));
3964
28.2k
        spk_man = new_spk_man.get();
3965
3966
        // Save the descriptor to memory
3967
28.2k
        uint256 id = new_spk_man->GetID();
3968
28.2k
        AddScriptPubKeyMan(id, std::move(new_spk_man));
3969
28.2k
    }
3970
3971
    // Add the private keys to the descriptor
3972
28.3k
    for (const auto& entry : signing_provider.keys) {
3973
27.5k
        const CKey& key = entry.second;
3974
27.5k
        spk_man->AddDescriptorKey(key, key.GetPubKey());
3975
27.5k
    }
3976
3977
    // Top up key pool, the manager will generate new scriptPubKeys internally
3978
28.3k
    if (!spk_man->TopUp()) {
3979
1.05k
        WalletLogPrintf("Could not top up scriptPubKeys\n");
3980
1.05k
        return nullptr;
3981
1.05k
    }
3982
3983
    // Apply the label if necessary
3984
    // Note: we disable labels for ranged descriptors
3985
27.2k
    if (!desc.descriptor->IsRange()) {
3986
2.03k
        auto script_pub_keys = spk_man->GetScriptPubKeys();
3987
2.03k
        if (script_pub_keys.empty()) {
3988
0
            WalletLogPrintf("Could not generate scriptPubKeys (cache is empty)\n");
3989
0
            return nullptr;
3990
0
        }
3991
3992
2.03k
        if (!internal) {
3993
2.25k
            for (const auto& script : script_pub_keys) {
3994
2.25k
                CTxDestination dest;
3995
2.25k
                if (ExtractDestination(script, dest)) {
3996
822
                    SetAddressBook(dest, label, AddressPurpose::RECEIVE);
3997
822
                }
3998
2.25k
            }
3999
2.03k
        }
4000
2.03k
    }
4001
4002
    // Save the descriptor to DB
4003
27.2k
    spk_man->WriteDescriptor();
4004
4005
27.2k
    return spk_man;
4006
27.2k
}
4007
4008
bool CWallet::MigrateToSQLite(bilingual_str& error)
4009
0
{
4010
0
    AssertLockHeld(cs_wallet);
4011
4012
0
    WalletLogPrintf("Migrating wallet storage database from BerkeleyDB to SQLite.\n");
4013
4014
0
    if (m_database->Format() == "sqlite") {
4015
0
        error = _("Error: This wallet already uses SQLite");
4016
0
        return false;
4017
0
    }
4018
4019
    // Get all of the records for DB type migration
4020
0
    std::unique_ptr<DatabaseBatch> batch = m_database->MakeBatch();
4021
0
    std::unique_ptr<DatabaseCursor> cursor = batch->GetNewCursor();
4022
0
    std::vector<std::pair<SerializeData, SerializeData>> records;
4023
0
    if (!cursor) {
4024
0
        error = _("Error: Unable to begin reading all records in the database");
4025
0
        return false;
4026
0
    }
4027
0
    DatabaseCursor::Status status = DatabaseCursor::Status::FAIL;
4028
0
    while (true) {
4029
0
        DataStream ss_key{};
4030
0
        DataStream ss_value{};
4031
0
        status = cursor->Next(ss_key, ss_value);
4032
0
        if (status != DatabaseCursor::Status::MORE) {
4033
0
            break;
4034
0
        }
4035
0
        SerializeData key(ss_key.begin(), ss_key.end());
4036
0
        SerializeData value(ss_value.begin(), ss_value.end());
4037
0
        records.emplace_back(key, value);
4038
0
    }
4039
0
    cursor.reset();
4040
0
    batch.reset();
4041
0
    if (status != DatabaseCursor::Status::DONE) {
4042
0
        error = _("Error: Unable to read all records in the database");
4043
0
        return false;
4044
0
    }
4045
4046
    // Close this database and delete the file
4047
0
    fs::path db_path = fs::PathFromString(m_database->Filename());
4048
0
    m_database->Close();
4049
0
    fs::remove(db_path);
4050
4051
    // Generate the path for the location of the migrated wallet
4052
    // Wallets that are plain files rather than wallet directories will be migrated to be wallet directories.
4053
0
    const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(m_name));
4054
4055
    // Make new DB
4056
0
    DatabaseOptions opts;
4057
0
    opts.require_create = true;
4058
0
    opts.require_format = DatabaseFormat::SQLITE;
4059
0
    DatabaseStatus db_status;
4060
0
    std::unique_ptr<WalletDatabase> new_db = MakeDatabase(wallet_path, opts, db_status, error);
4061
0
    assert(new_db); // This is to prevent doing anything further with this wallet. The original file was deleted, but a backup exists.
4062
0
    m_database.reset();
4063
0
    m_database = std::move(new_db);
4064
4065
    // Write existing records into the new DB
4066
0
    batch = m_database->MakeBatch();
4067
0
    bool began = batch->TxnBegin();
4068
0
    assert(began); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
4069
0
    for (const auto& [key, value] : records) {
4070
0
        if (!batch->Write(std::span{key}, std::span{value})) {
4071
0
            batch->TxnAbort();
4072
0
            m_database->Close();
4073
0
            fs::remove(m_database->Filename());
4074
0
            assert(false); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
4075
0
        }
4076
0
    }
4077
0
    bool committed = batch->TxnCommit();
4078
0
    assert(committed); // This is a critical error, the new db could not be written to. The original db exists as a backup, but we should not continue execution.
4079
0
    return true;
4080
0
}
4081
4082
std::optional<MigrationData> CWallet::GetDescriptorsForLegacy(bilingual_str& error) const
4083
0
{
4084
0
    AssertLockHeld(cs_wallet);
4085
4086
0
    LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
4087
0
    if (!Assume(legacy_spkm)) {
4088
        // This shouldn't happen
4089
0
        error = Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"));
4090
0
        return std::nullopt;
4091
0
    }
4092
4093
0
    std::optional<MigrationData> res = legacy_spkm->MigrateToDescriptor();
4094
0
    if (res == std::nullopt) {
4095
0
        error = _("Error: Unable to produce descriptors for this legacy wallet. Make sure to provide the wallet's passphrase if it is encrypted.");
4096
0
        return std::nullopt;
4097
0
    }
4098
0
    return res;
4099
0
}
4100
4101
util::Result<void> CWallet::ApplyMigrationData(WalletBatch& local_wallet_batch, MigrationData& data)
4102
0
{
4103
0
    AssertLockHeld(cs_wallet);
4104
4105
0
    LegacyDataSPKM* legacy_spkm = GetLegacyDataSPKM();
4106
0
    if (!Assume(legacy_spkm)) {
4107
        // This shouldn't happen
4108
0
        return util::Error{Untranslated(STR_INTERNAL_BUG("Error: Legacy wallet data missing"))};
4109
0
    }
4110
4111
    // Get all invalid or non-watched scripts that will not be migrated
4112
0
    std::set<CTxDestination> not_migrated_dests;
4113
0
    for (const auto& script : legacy_spkm->GetNotMineScriptPubKeys()) {
4114
0
        CTxDestination dest;
4115
0
        if (ExtractDestination(script, dest)) not_migrated_dests.emplace(dest);
4116
0
    }
4117
4118
    // When the legacy wallet has no spendable scripts, the main wallet will be empty, leaving its script cache empty as well.
4119
    // The watch-only and/or solvable wallet(s) will contain the scripts in their respective caches.
4120
0
    if (!data.desc_spkms.empty()) Assume(!m_cached_spks.empty());
4121
0
    if (!data.watch_descs.empty()) Assume(!data.watchonly_wallet->m_cached_spks.empty());
4122
0
    if (!data.solvable_descs.empty()) Assume(!data.solvable_wallet->m_cached_spks.empty());
4123
4124
0
    for (auto& desc_spkm : data.desc_spkms) {
4125
0
        if (m_spk_managers.count(desc_spkm->GetID()) > 0) {
4126
0
            return util::Error{_("Error: Duplicate descriptors created during migration. Your wallet may be corrupted.")};
4127
0
        }
4128
0
        uint256 id = desc_spkm->GetID();
4129
0
        AddScriptPubKeyMan(id, std::move(desc_spkm));
4130
0
    }
4131
4132
    // Remove the LegacyScriptPubKeyMan from disk
4133
0
    if (!legacy_spkm->DeleteRecordsWithDB(local_wallet_batch)) {
4134
0
        return util::Error{_("Error: cannot remove legacy wallet records")};
4135
0
    }
4136
4137
    // Remove the LegacyScriptPubKeyMan from memory
4138
0
    m_spk_managers.erase(legacy_spkm->GetID());
4139
0
    m_external_spk_managers.clear();
4140
0
    m_internal_spk_managers.clear();
4141
4142
    // Setup new descriptors
4143
0
    SetWalletFlagWithDB(local_wallet_batch, WALLET_FLAG_DESCRIPTORS);
4144
0
    if (!IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
4145
        // Use the existing master key if we have it
4146
0
        if (data.master_key.key.IsValid()) {
4147
0
            SetupDescriptorScriptPubKeyMans(local_wallet_batch, data.master_key);
4148
0
        } else {
4149
            // Setup with a new seed if we don't.
4150
0
            SetupOwnDescriptorScriptPubKeyMans(local_wallet_batch);
4151
0
        }
4152
0
    }
4153
4154
    // Get best block locator so that we can copy it to the watchonly and solvables
4155
0
    CBlockLocator best_block_locator;
4156
0
    if (!local_wallet_batch.ReadBestBlock(best_block_locator)) {
4157
0
        return util::Error{_("Error: Unable to read wallet's best block locator record")};
4158
0
    }
4159
4160
    // Check if the transactions in the wallet are still ours. Either they belong here, or they belong in the watchonly wallet.
4161
    // We need to go through these in the tx insertion order so that lookups to spends works.
4162
0
    std::vector<uint256> txids_to_delete;
4163
0
    std::unique_ptr<WalletBatch> watchonly_batch;
4164
0
    if (data.watchonly_wallet) {
4165
0
        watchonly_batch = std::make_unique<WalletBatch>(data.watchonly_wallet->GetDatabase());
4166
0
        if (!watchonly_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.watchonly_wallet->GetName())};
4167
        // Copy the next tx order pos to the watchonly wallet
4168
0
        LOCK(data.watchonly_wallet->cs_wallet);
4169
0
        data.watchonly_wallet->nOrderPosNext = nOrderPosNext;
4170
0
        watchonly_batch->WriteOrderPosNext(data.watchonly_wallet->nOrderPosNext);
4171
        // Write the best block locator to avoid rescanning on reload
4172
0
        if (!watchonly_batch->WriteBestBlock(best_block_locator)) {
4173
0
            return util::Error{_("Error: Unable to write watchonly wallet best block locator record")};
4174
0
        }
4175
0
    }
4176
0
    std::unique_ptr<WalletBatch> solvables_batch;
4177
0
    if (data.solvable_wallet) {
4178
0
        solvables_batch = std::make_unique<WalletBatch>(data.solvable_wallet->GetDatabase());
4179
0
        if (!solvables_batch->TxnBegin()) return util::Error{strprintf(_("Error: database transaction cannot be executed for wallet %s"), data.solvable_wallet->GetName())};
4180
        // Write the best block locator to avoid rescanning on reload
4181
0
        if (!solvables_batch->WriteBestBlock(best_block_locator)) {
4182
0
            return util::Error{_("Error: Unable to write solvable wallet best block locator record")};
4183
0
        }
4184
0
    }
4185
0
    for (const auto& [_pos, wtx] : wtxOrdered) {
4186
        // Check it is the watchonly wallet's
4187
        // solvable_wallet doesn't need to be checked because transactions for those scripts weren't being watched for
4188
0
        bool is_mine = IsMine(*wtx->tx) || IsFromMe(*wtx->tx);
4189
0
        if (data.watchonly_wallet) {
4190
0
            LOCK(data.watchonly_wallet->cs_wallet);
4191
0
            if (data.watchonly_wallet->IsMine(*wtx->tx) || data.watchonly_wallet->IsFromMe(*wtx->tx)) {
4192
                // Add to watchonly wallet
4193
0
                const uint256& hash = wtx->GetHash();
4194
0
                const CWalletTx& to_copy_wtx = *wtx;
4195
0
                if (!data.watchonly_wallet->LoadToWallet(hash, [&](CWalletTx& ins_wtx, bool new_tx) EXCLUSIVE_LOCKS_REQUIRED(data.watchonly_wallet->cs_wallet) {
4196
0
                    if (!new_tx) return false;
4197
0
                    ins_wtx.SetTx(to_copy_wtx.tx);
4198
0
                    ins_wtx.CopyFrom(to_copy_wtx);
4199
0
                    return true;
4200
0
                })) {
4201
0
                    return util::Error{strprintf(_("Error: Could not add watchonly tx %s to watchonly wallet"), wtx->GetHash().GetHex())};
4202
0
                }
4203
0
                watchonly_batch->WriteTx(data.watchonly_wallet->mapWallet.at(hash));
4204
                // Mark as to remove from the migrated wallet only if it does not also belong to it
4205
0
                if (!is_mine) {
4206
0
                    txids_to_delete.push_back(hash);
4207
0
                }
4208
0
                continue;
4209
0
            }
4210
0
        }
4211
0
        if (!is_mine) {
4212
            // Both not ours and not in the watchonly wallet
4213
0
            return util::Error{strprintf(_("Error: Transaction %s in wallet cannot be identified to belong to migrated wallets"), wtx->GetHash().GetHex())};
4214
0
        }
4215
0
    }
4216
4217
    // Do the removes
4218
0
    if (txids_to_delete.size() > 0) {
4219
0
        if (auto res = RemoveTxs(local_wallet_batch, txids_to_delete); !res) {
4220
0
            return util::Error{_("Error: Could not delete watchonly transactions. ") + util::ErrorString(res)};
4221
0
        }
4222
0
    }
4223
4224
    // Pair external wallets with their corresponding db handler
4225
0
    std::vector<std::pair<std::shared_ptr<CWallet>, std::unique_ptr<WalletBatch>>> wallets_vec;
4226
0
    if (data.watchonly_wallet) wallets_vec.emplace_back(data.watchonly_wallet, std::move(watchonly_batch));
4227
0
    if (data.solvable_wallet) wallets_vec.emplace_back(data.solvable_wallet, std::move(solvables_batch));
4228
4229
    // Write address book entry to disk
4230
0
    auto func_store_addr = [](WalletBatch& batch, const CTxDestination& dest, const CAddressBookData& entry) {
4231
0
        auto address{EncodeDestination(dest)};
4232
0
        if (entry.purpose) batch.WritePurpose(address, PurposeToString(*entry.purpose));
4233
0
        if (entry.label) batch.WriteName(address, *entry.label);
4234
0
        for (const auto& [id, request] : entry.receive_requests) {
4235
0
            batch.WriteAddressReceiveRequest(dest, id, request);
4236
0
        }
4237
0
        if (entry.previously_spent) batch.WriteAddressPreviouslySpent(dest, true);
4238
0
    };
4239
4240
    // Check the address book data in the same way we did for transactions
4241
0
    std::vector<CTxDestination> dests_to_delete;
4242
0
    for (const auto& [dest, record] : m_address_book) {
4243
        // Ensure "receive" entries that are no longer part of the original wallet are transferred to another wallet
4244
        // Entries for everything else ("send") will be cloned to all wallets.
4245
0
        bool require_transfer = record.purpose == AddressPurpose::RECEIVE && !IsMine(dest);
4246
0
        bool copied = false;
4247
0
        for (auto& [wallet, batch] : wallets_vec) {
4248
0
            LOCK(wallet->cs_wallet);
4249
0
            if (require_transfer && !wallet->IsMine(dest)) continue;
4250
4251
            // Copy the entire address book entry
4252
0
            wallet->m_address_book[dest] = record;
4253
0
            func_store_addr(*batch, dest, record);
4254
4255
0
            copied = true;
4256
            // Only delete 'receive' records that are no longer part of the original wallet
4257
0
            if (require_transfer) {
4258
0
                dests_to_delete.push_back(dest);
4259
0
                break;
4260
0
            }
4261
0
        }
4262
4263
        // Fail immediately if we ever found an entry that was ours and cannot be transferred
4264
        // to any of the created wallets (watch-only, solvable).
4265
        // Means that no inferred descriptor maps to the stored entry. Which mustn't happen.
4266
0
        if (require_transfer && !copied) {
4267
4268
            // Skip invalid/non-watched scripts that will not be migrated
4269
0
            if (not_migrated_dests.count(dest) > 0) {
4270
0
                dests_to_delete.push_back(dest);
4271
0
                continue;
4272
0
            }
4273
4274
0
            return util::Error{_("Error: Address book data in wallet cannot be identified to belong to migrated wallets")};
4275
0
        }
4276
0
    }
4277
4278
    // Persist external wallets address book entries
4279
0
    for (auto& [wallet, batch] : wallets_vec) {
4280
0
        if (!batch->TxnCommit()) {
4281
0
            return util::Error{strprintf(_("Error: Unable to write data to disk for wallet %s"), wallet->GetName())};
4282
0
        }
4283
0
    }
4284
4285
    // Remove the things to delete in this wallet
4286
0
    if (dests_to_delete.size() > 0) {
4287
0
        for (const auto& dest : dests_to_delete) {
4288
0
            if (!DelAddressBookWithDB(local_wallet_batch, dest)) {
4289
0
                return util::Error{_("Error: Unable to remove watchonly address book data")};
4290
0
            }
4291
0
        }
4292
0
    }
4293
4294
0
    return {}; // all good
4295
0
}
4296
4297
bool CWallet::CanGrindR() const
4298
468k
{
4299
468k
    return !IsWalletFlagSet(WALLET_FLAG_EXTERNAL_SIGNER);
4300
468k
}
4301
4302
bool DoMigration(CWallet& wallet, WalletContext& context, bilingual_str& error, MigrationResult& res) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet)
4303
0
{
4304
0
    AssertLockHeld(wallet.cs_wallet);
4305
4306
    // Get all of the descriptors from the legacy wallet
4307
0
    std::optional<MigrationData> data = wallet.GetDescriptorsForLegacy(error);
4308
0
    if (data == std::nullopt) return false;
4309
4310
    // Create the watchonly and solvable wallets if necessary
4311
0
    if (data->watch_descs.size() > 0 || data->solvable_descs.size() > 0) {
4312
0
        DatabaseOptions options;
4313
0
        options.require_existing = false;
4314
0
        options.require_create = true;
4315
0
        options.require_format = DatabaseFormat::SQLITE;
4316
4317
0
        WalletContext empty_context;
4318
0
        empty_context.args = context.args;
4319
4320
        // Make the wallets
4321
0
        options.create_flags = WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET | WALLET_FLAG_DESCRIPTORS;
4322
0
        if (wallet.IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
4323
0
            options.create_flags |= WALLET_FLAG_AVOID_REUSE;
4324
0
        }
4325
0
        if (wallet.IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
4326
0
            options.create_flags |= WALLET_FLAG_KEY_ORIGIN_METADATA;
4327
0
        }
4328
0
        if (data->watch_descs.size() > 0) {
4329
0
            wallet.WalletLogPrintf("Making a new watchonly wallet containing the watched scripts\n");
4330
4331
0
            DatabaseStatus status;
4332
0
            std::vector<bilingual_str> warnings;
4333
0
            std::string wallet_name = wallet.GetName() + "_watchonly";
4334
0
            std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4335
0
            if (!database) {
4336
0
                error = strprintf(_("Wallet file creation failed: %s"), error);
4337
0
                return false;
4338
0
            }
4339
4340
0
            data->watchonly_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4341
0
            if (!data->watchonly_wallet) {
4342
0
                error = _("Error: Failed to create new watchonly wallet");
4343
0
                return false;
4344
0
            }
4345
0
            res.watchonly_wallet = data->watchonly_wallet;
4346
0
            LOCK(data->watchonly_wallet->cs_wallet);
4347
4348
            // Parse the descriptors and add them to the new wallet
4349
0
            for (const auto& [desc_str, creation_time] : data->watch_descs) {
4350
                // Parse the descriptor
4351
0
                FlatSigningProvider keys;
4352
0
                std::string parse_err;
4353
0
                std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4354
0
                assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4355
0
                assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
4356
4357
                // Add to the wallet
4358
0
                WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
4359
0
                data->watchonly_wallet->AddWalletDescriptor(w_desc, keys, "", false);
4360
0
            }
4361
4362
            // Add the wallet to settings
4363
0
            UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4364
0
        }
4365
0
        if (data->solvable_descs.size() > 0) {
4366
0
            wallet.WalletLogPrintf("Making a new watchonly wallet containing the unwatched solvable scripts\n");
4367
4368
0
            DatabaseStatus status;
4369
0
            std::vector<bilingual_str> warnings;
4370
0
            std::string wallet_name = wallet.GetName() + "_solvables";
4371
0
            std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4372
0
            if (!database) {
4373
0
                error = strprintf(_("Wallet file creation failed: %s"), error);
4374
0
                return false;
4375
0
            }
4376
4377
0
            data->solvable_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4378
0
            if (!data->solvable_wallet) {
4379
0
                error = _("Error: Failed to create new watchonly wallet");
4380
0
                return false;
4381
0
            }
4382
0
            res.solvables_wallet = data->solvable_wallet;
4383
0
            LOCK(data->solvable_wallet->cs_wallet);
4384
4385
            // Parse the descriptors and add them to the new wallet
4386
0
            for (const auto& [desc_str, creation_time] : data->solvable_descs) {
4387
                // Parse the descriptor
4388
0
                FlatSigningProvider keys;
4389
0
                std::string parse_err;
4390
0
                std::vector<std::unique_ptr<Descriptor>> descs = Parse(desc_str, keys, parse_err, /* require_checksum */ true);
4391
0
                assert(descs.size() == 1); // It shouldn't be possible to have the LegacyScriptPubKeyMan make an invalid descriptor or a multipath descriptors
4392
0
                assert(!descs.at(0)->IsRange()); // It shouldn't be possible to have LegacyScriptPubKeyMan make a ranged watchonly descriptor
4393
4394
                // Add to the wallet
4395
0
                WalletDescriptor w_desc(std::move(descs.at(0)), creation_time, 0, 0, 0);
4396
0
                data->solvable_wallet->AddWalletDescriptor(w_desc, keys, "", false);
4397
0
            }
4398
4399
            // Add the wallet to settings
4400
0
            UpdateWalletSetting(*context.chain, wallet_name, /*load_on_startup=*/true, warnings);
4401
0
        }
4402
0
    }
4403
4404
    // Add the descriptors to wallet, remove LegacyScriptPubKeyMan, and cleanup txs and address book data
4405
0
    return RunWithinTxn(wallet.GetDatabase(), /*process_desc=*/"apply migration process", [&](WalletBatch& batch) EXCLUSIVE_LOCKS_REQUIRED(wallet.cs_wallet){
4406
0
        if (auto res_migration = wallet.ApplyMigrationData(batch, *data); !res_migration) {
4407
0
            error = util::ErrorString(res_migration);
4408
0
            return false;
4409
0
        }
4410
0
        wallet.WalletLogPrintf("Wallet migration complete.\n");
4411
0
        return true;
4412
0
    });
4413
0
}
4414
4415
util::Result<MigrationResult> MigrateLegacyToDescriptor(const std::string& wallet_name, const SecureString& passphrase, WalletContext& context)
4416
0
{
4417
0
    std::vector<bilingual_str> warnings;
4418
0
    bilingual_str error;
4419
4420
    // If the wallet is still loaded, unload it so that nothing else tries to use it while we're changing it
4421
0
    bool was_loaded = false;
4422
0
    if (auto wallet = GetWallet(context, wallet_name)) {
4423
0
        if (wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4424
0
            return util::Error{_("Error: This wallet is already a descriptor wallet")};
4425
0
        }
4426
4427
        // Flush chain state before unloading wallet
4428
0
        CBlockLocator locator;
4429
0
        WITH_LOCK(wallet->cs_wallet, context.chain->findBlock(wallet->GetLastBlockHash(), FoundBlock().locator(locator)));
4430
0
        if (!locator.IsNull()) wallet->chainStateFlushed(ChainstateRole::NORMAL, locator);
4431
4432
0
        if (!RemoveWallet(context, wallet, /*load_on_start=*/std::nullopt, warnings)) {
4433
0
            return util::Error{_("Unable to unload the wallet before migrating")};
4434
0
        }
4435
0
        WaitForDeleteWallet(std::move(wallet));
4436
0
        was_loaded = true;
4437
0
    } else {
4438
        // Check if the wallet is BDB
4439
0
        const auto& wallet_path = GetWalletPath(wallet_name);
4440
0
        if (!wallet_path) {
4441
0
            return util::Error{util::ErrorString(wallet_path)};
4442
0
        }
4443
0
        if (!fs::exists(*wallet_path)) {
4444
0
            return util::Error{_("Error: Wallet does not exist")};
4445
0
        }
4446
0
        if (!IsBDBFile(BDBDataFile(*wallet_path))) {
4447
0
            return util::Error{_("Error: This wallet is already a descriptor wallet")};
4448
0
        }
4449
0
    }
4450
4451
    // Load the wallet but only in the context of this function.
4452
    // No signals should be connected nor should anything else be aware of this wallet
4453
0
    WalletContext empty_context;
4454
0
    empty_context.args = context.args;
4455
0
    DatabaseOptions options;
4456
0
    options.require_existing = true;
4457
0
    options.require_format = DatabaseFormat::BERKELEY_RO;
4458
0
    DatabaseStatus status;
4459
0
    std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(wallet_name, options, status, error);
4460
0
    if (!database) {
4461
0
        return util::Error{Untranslated("Wallet file verification failed.") + Untranslated(" ") + error};
4462
0
    }
4463
4464
    // Make the local wallet
4465
0
    std::shared_ptr<CWallet> local_wallet = CWallet::Create(empty_context, wallet_name, std::move(database), options.create_flags, error, warnings);
4466
0
    if (!local_wallet) {
4467
0
        return util::Error{Untranslated("Wallet loading failed.") + Untranslated(" ") + error};
4468
0
    }
4469
4470
0
    return MigrateLegacyToDescriptor(std::move(local_wallet), passphrase, context, was_loaded);
4471
0
}
4472
4473
util::Result<MigrationResult> MigrateLegacyToDescriptor(std::shared_ptr<CWallet> local_wallet, const SecureString& passphrase, WalletContext& context, bool was_loaded)
4474
0
{
4475
0
    MigrationResult res;
4476
0
    bilingual_str error;
4477
0
    std::vector<bilingual_str> warnings;
4478
4479
0
    DatabaseOptions options;
4480
0
    options.require_existing = true;
4481
0
    DatabaseStatus status;
4482
4483
0
    const std::string wallet_name = local_wallet->GetName();
4484
4485
    // Helper to reload as normal for some of our exit scenarios
4486
0
    const auto& reload_wallet = [&](std::shared_ptr<CWallet>& to_reload) {
4487
0
        assert(to_reload.use_count() == 1);
4488
0
        std::string name = to_reload->GetName();
4489
0
        to_reload.reset();
4490
0
        to_reload = LoadWallet(context, name, /*load_on_start=*/std::nullopt, options, status, error, warnings);
4491
0
        return to_reload != nullptr;
4492
0
    };
4493
4494
    // Before anything else, check if there is something to migrate.
4495
0
    if (local_wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
4496
0
        if (was_loaded) {
4497
0
            reload_wallet(local_wallet);
4498
0
        }
4499
0
        return util::Error{_("Error: This wallet is already a descriptor wallet")};
4500
0
    }
4501
4502
    // Make a backup of the DB
4503
0
    fs::path this_wallet_dir = fs::absolute(fs::PathFromString(local_wallet->GetDatabase().Filename())).parent_path();
4504
0
    fs::path backup_filename = fs::PathFromString(strprintf("%s_%d.legacy.bak", (wallet_name.empty() ? "default_wallet" : wallet_name), GetTime()));
4505
0
    fs::path backup_path = this_wallet_dir / backup_filename;
4506
0
    if (!local_wallet->BackupWallet(fs::PathToString(backup_path))) {
4507
0
        if (was_loaded) {
4508
0
            reload_wallet(local_wallet);
4509
0
        }
4510
0
        return util::Error{_("Error: Unable to make a backup of your wallet")};
4511
0
    }
4512
0
    res.backup_path = backup_path;
4513
4514
0
    bool success = false;
4515
4516
    // Unlock the wallet if needed
4517
0
    if (local_wallet->IsLocked() && !local_wallet->Unlock(passphrase)) {
4518
0
        if (was_loaded) {
4519
0
            reload_wallet(local_wallet);
4520
0
        }
4521
0
        if (passphrase.find('\0') == std::string::npos) {
4522
0
            return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase was not provided or was incorrect.")};
4523
0
        } else {
4524
0
            return util::Error{Untranslated("Error: Wallet decryption failed, the wallet passphrase entered was incorrect. "
4525
0
                                            "The passphrase contains a null character (ie - a zero byte). "
4526
0
                                            "If this passphrase was set with a version of this software prior to 25.0, "
4527
0
                                            "please try again with only the characters up to — but not including — "
4528
0
                                            "the first null character.")};
4529
0
        }
4530
0
    }
4531
4532
0
    {
4533
0
        LOCK(local_wallet->cs_wallet);
4534
        // First change to using SQLite
4535
0
        if (!local_wallet->MigrateToSQLite(error)) return util::Error{error};
4536
4537
        // Do the migration of keys and scripts for non-blank wallets, and cleanup if it fails
4538
0
        success = local_wallet->IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET);
4539
0
        if (!success) {
4540
0
            success = DoMigration(*local_wallet, context, error, res);
4541
0
        } else {
4542
            // Make sure that descriptors flag is actually set
4543
0
            local_wallet->SetWalletFlag(WALLET_FLAG_DESCRIPTORS);
4544
0
        }
4545
0
    }
4546
4547
    // In case of reloading failure, we need to remember the wallet dirs to remove
4548
    // Set is used as it may be populated with the same wallet directory paths multiple times,
4549
    // both before and after reloading. This ensures the set is complete even if one of the wallets
4550
    // fails to reload.
4551
0
    std::set<fs::path> wallet_dirs;
4552
0
    if (success) {
4553
        // Migration successful, unload all wallets locally, then reload them.
4554
        // Reload the main wallet
4555
0
        wallet_dirs.insert(fs::PathFromString(local_wallet->GetDatabase().Filename()).parent_path());
4556
0
        success = reload_wallet(local_wallet);
4557
0
        res.wallet = local_wallet;
4558
0
        res.wallet_name = wallet_name;
4559
0
        if (success && res.watchonly_wallet) {
4560
            // Reload watchonly
4561
0
            wallet_dirs.insert(fs::PathFromString(res.watchonly_wallet->GetDatabase().Filename()).parent_path());
4562
0
            success = reload_wallet(res.watchonly_wallet);
4563
0
        }
4564
0
        if (success && res.solvables_wallet) {
4565
            // Reload solvables
4566
0
            wallet_dirs.insert(fs::PathFromString(res.solvables_wallet->GetDatabase().Filename()).parent_path());
4567
0
            success = reload_wallet(res.solvables_wallet);
4568
0
        }
4569
0
    }
4570
0
    if (!success) {
4571
        // Migration failed, cleanup
4572
        // Before deleting the wallet's directory, copy the backup file to the top-level wallets dir
4573
0
        fs::path temp_backup_location = fsbridge::AbsPathJoin(GetWalletDir(), backup_filename);
4574
0
        fs::copy_file(backup_path, temp_backup_location, fs::copy_options::none);
4575
4576
        // Make list of wallets to cleanup
4577
0
        std::vector<std::shared_ptr<CWallet>> created_wallets;
4578
0
        if (local_wallet) created_wallets.push_back(std::move(local_wallet));
4579
0
        if (res.watchonly_wallet) created_wallets.push_back(std::move(res.watchonly_wallet));
4580
0
        if (res.solvables_wallet) created_wallets.push_back(std::move(res.solvables_wallet));
4581
4582
        // Get the directories to remove after unloading
4583
0
        for (std::shared_ptr<CWallet>& w : created_wallets) {
4584
0
            wallet_dirs.emplace(fs::PathFromString(w->GetDatabase().Filename()).parent_path());
4585
0
        }
4586
4587
        // Unload the wallets
4588
0
        for (std::shared_ptr<CWallet>& w : created_wallets) {
4589
0
            if (w->HaveChain()) {
4590
                // Unloading for wallets that were loaded for normal use
4591
0
                if (!RemoveWallet(context, w, /*load_on_start=*/false)) {
4592
0
                    error += _("\nUnable to cleanup failed migration");
4593
0
                    return util::Error{error};
4594
0
                }
4595
0
                WaitForDeleteWallet(std::move(w));
4596
0
            } else {
4597
                // Unloading for wallets in local context
4598
0
                assert(w.use_count() == 1);
4599
0
                w.reset();
4600
0
            }
4601
0
        }
4602
4603
        // Delete the wallet directories
4604
0
        for (const fs::path& dir : wallet_dirs) {
4605
0
            fs::remove_all(dir);
4606
0
        }
4607
4608
        // Restore the backup
4609
        // Convert the backup file to the wallet db file by renaming it and moving it into the wallet's directory.
4610
        // Reload it into memory if the wallet was previously loaded.
4611
0
        bilingual_str restore_error;
4612
0
        const auto& ptr_wallet = RestoreWallet(context, temp_backup_location, wallet_name, /*load_on_start=*/std::nullopt, status, restore_error, warnings, /*load_after_restore=*/was_loaded);
4613
0
        if (!restore_error.empty()) {
4614
0
            error += restore_error + _("\nUnable to restore backup of wallet.");
4615
0
            return util::Error{error};
4616
0
        }
4617
4618
        // The wallet directory has been restored, but just in case, copy the previously created backup to the wallet dir
4619
0
        fs::copy_file(temp_backup_location, backup_path, fs::copy_options::none);
4620
0
        fs::remove(temp_backup_location);
4621
4622
        // Verify that there is no dangling wallet: when the wallet wasn't loaded before, expect null.
4623
        // This check is performed after restoration to avoid an early error before saving the backup.
4624
0
        bool wallet_reloaded = ptr_wallet != nullptr;
4625
0
        assert(was_loaded == wallet_reloaded);
4626
4627
0
        return util::Error{error};
4628
0
    }
4629
0
    return res;
4630
0
}
4631
4632
void CWallet::CacheNewScriptPubKeys(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4633
624k
{
4634
624k
    for (const auto& script : spks) {
4635
399k
        m_cached_spks[script].push_back(spkm);
4636
399k
    }
4637
624k
}
4638
4639
void CWallet::TopUpCallback(const std::set<CScript>& spks, ScriptPubKeyMan* spkm)
4640
624k
{
4641
    // Update scriptPubKey cache
4642
624k
    CacheNewScriptPubKeys(spks, spkm);
4643
624k
}
4644
4645
std::set<CExtPubKey> CWallet::GetActiveHDPubKeys() const
4646
0
{
4647
0
    AssertLockHeld(cs_wallet);
4648
4649
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4650
4651
0
    std::set<CExtPubKey> active_xpubs;
4652
0
    for (const auto& spkm : GetActiveScriptPubKeyMans()) {
4653
0
        const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4654
0
        assert(desc_spkm);
4655
0
        LOCK(desc_spkm->cs_desc_man);
4656
0
        WalletDescriptor w_desc = desc_spkm->GetWalletDescriptor();
4657
4658
0
        std::set<CPubKey> desc_pubkeys;
4659
0
        std::set<CExtPubKey> desc_xpubs;
4660
0
        w_desc.descriptor->GetPubKeys(desc_pubkeys, desc_xpubs);
4661
0
        active_xpubs.merge(std::move(desc_xpubs));
4662
0
    }
4663
0
    return active_xpubs;
4664
0
}
4665
4666
std::optional<CKey> CWallet::GetKey(const CKeyID& keyid) const
4667
0
{
4668
0
    Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
4669
4670
0
    for (const auto& spkm : GetAllScriptPubKeyMans()) {
4671
0
        const DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
4672
0
        assert(desc_spkm);
4673
0
        LOCK(desc_spkm->cs_desc_man);
4674
0
        if (std::optional<CKey> key = desc_spkm->GetKey(keyid)) {
4675
0
            return key;
4676
0
        }
4677
0
    }
4678
0
    return std::nullopt;
4679
0
}
4680
} // namespace wallet