mirror of
https://github.com/dashpay/dash.git
synced 2024-12-26 12:32:48 +01:00
b046e091c9
Co-authored-by: UdjinM6 <UdjinM6@users.noreply.github.com>
6022 lines
230 KiB
C++
6022 lines
230 KiB
C++
// Copyright (c) 2009-2010 Satoshi Nakamoto
|
|
// Copyright (c) 2009-2020 The Bitcoin Core developers
|
|
// Copyright (c) 2014-2024 The Dash Core developers
|
|
// Distributed under the MIT software license, see the accompanying
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
#include <wallet/wallet.h>
|
|
|
|
#include <chain.h>
|
|
#include <chainparams.h>
|
|
#include <consensus/amount.h>
|
|
#include <consensus/consensus.h>
|
|
#include <consensus/validation.h>
|
|
#include <crypto/common.h>
|
|
#include <fs.h>
|
|
#include <interfaces/chain.h>
|
|
#include <interfaces/wallet.h>
|
|
#include <key.h>
|
|
#include <key_io.h>
|
|
#include <policy/fees.h>
|
|
#include <policy/policy.h>
|
|
#include <policy/settings.h>
|
|
#include <primitives/block.h>
|
|
#include <primitives/transaction.h>
|
|
#include <script/descriptor.h>
|
|
#include <script/script.h>
|
|
#include <script/sign.h>
|
|
#include <script/signingprovider.h>
|
|
#include <support/cleanse.h>
|
|
#include <txmempool.h>
|
|
#include <util/bip32.h>
|
|
#include <util/check.h>
|
|
#include <util/error.h>
|
|
#include <util/fees.h>
|
|
#include <util/moneystr.h>
|
|
#include <util/string.h>
|
|
#include <util/translation.h>
|
|
#ifdef USE_BDB
|
|
#include <wallet/bdb.h>
|
|
#endif
|
|
#include <wallet/coincontrol.h>
|
|
#include <wallet/coinselection.h>
|
|
#include <wallet/fees.h>
|
|
#include <warnings.h>
|
|
|
|
#include <coinjoin/common.h>
|
|
#include <coinjoin/options.h>
|
|
#include <evo/providertx.h>
|
|
|
|
#include <univalue.h>
|
|
|
|
#include <algorithm>
|
|
#include <assert.h>
|
|
|
|
using interfaces::FoundBlock;
|
|
|
|
const std::map<uint64_t,std::string> WALLET_FLAG_CAVEATS{
|
|
{WALLET_FLAG_AVOID_REUSE,
|
|
"You need to rescan the blockchain in order to correctly mark used "
|
|
"destinations in the past. Until this is done, some destinations may "
|
|
"be considered unused, even if the opposite is the case."
|
|
},
|
|
};
|
|
|
|
static constexpr size_t OUTPUT_GROUP_MAX_ENTRIES{100};
|
|
|
|
RecursiveMutex cs_wallets;
|
|
static std::vector<std::shared_ptr<CWallet>> vpwallets GUARDED_BY(cs_wallets);
|
|
static std::list<LoadWalletFn> g_load_wallet_fns GUARDED_BY(cs_wallets);
|
|
|
|
bool AddWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
|
|
{
|
|
util::SettingsValue setting_value = chain.getRwSetting("wallet");
|
|
if (!setting_value.isArray()) setting_value.setArray();
|
|
for (const util::SettingsValue& value : setting_value.getValues()) {
|
|
if (value.isStr() && value.get_str() == wallet_name) return true;
|
|
}
|
|
setting_value.push_back(wallet_name);
|
|
return chain.updateRwSetting("wallet", setting_value);
|
|
}
|
|
|
|
bool RemoveWalletSetting(interfaces::Chain& chain, const std::string& wallet_name)
|
|
{
|
|
util::SettingsValue setting_value = chain.getRwSetting("wallet");
|
|
if (!setting_value.isArray()) return true;
|
|
util::SettingsValue new_value(util::SettingsValue::VARR);
|
|
for (const util::SettingsValue& value : setting_value.getValues()) {
|
|
if (!value.isStr() || value.get_str() != wallet_name) new_value.push_back(value);
|
|
}
|
|
if (new_value.size() == setting_value.size()) return true;
|
|
return chain.updateRwSetting("wallet", new_value);
|
|
}
|
|
|
|
static void UpdateWalletSetting(interfaces::Chain& chain,
|
|
const std::string& wallet_name,
|
|
std::optional<bool> load_on_startup,
|
|
std::vector<bilingual_str>& warnings)
|
|
{
|
|
if (load_on_startup == std::nullopt) return;
|
|
if (load_on_startup.value() && !AddWalletSetting(chain, wallet_name)) {
|
|
warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may not be loaded next node startup."));
|
|
} else if (!load_on_startup.value() && !RemoveWalletSetting(chain, wallet_name)) {
|
|
warnings.emplace_back(Untranslated("Wallet load on startup setting could not be updated, so wallet may still be loaded next node startup."));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Refresh mempool status so the wallet is in an internally consistent state and
|
|
* immediately knows the transaction's status: Whether it can be considered
|
|
* trusted and is eligible to be abandoned ...
|
|
*/
|
|
static void RefreshMempoolStatus(CWalletTx& tx, interfaces::Chain& chain)
|
|
{
|
|
tx.fInMempool = chain.isInMempool(tx.GetHash());
|
|
}
|
|
|
|
bool AddWallet(const std::shared_ptr<CWallet>& wallet)
|
|
{
|
|
{
|
|
LOCK(cs_wallets);
|
|
assert(wallet);
|
|
std::vector<std::shared_ptr<CWallet>>::const_iterator i = std::find(vpwallets.begin(), vpwallets.end(), wallet);
|
|
if (i != vpwallets.end()) return false;
|
|
vpwallets.push_back(wallet);
|
|
}
|
|
wallet->ConnectScriptPubKeyManNotifiers();
|
|
wallet->AutoLockMasternodeCollaterals();
|
|
wallet->coinjoin_loader().AddWallet(*wallet);
|
|
wallet->NotifyCanGetAddressesChanged();
|
|
return true;
|
|
}
|
|
|
|
bool RemoveWallet(const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start, std::vector<bilingual_str>& warnings)
|
|
{
|
|
assert(wallet);
|
|
|
|
interfaces::Chain& chain = wallet->chain();
|
|
std::string name = wallet->GetName();
|
|
|
|
// Unregister with the validation interface which also drops shared pointers.
|
|
wallet->m_chain_notifications_handler.reset();
|
|
{
|
|
LOCK(cs_wallets);
|
|
std::vector<std::shared_ptr<CWallet>>::iterator i = std::find(vpwallets.begin(), vpwallets.end(), wallet);
|
|
if (i == vpwallets.end()) return false;
|
|
vpwallets.erase(i);
|
|
}
|
|
|
|
wallet->coinjoin_loader().RemoveWallet(name);
|
|
|
|
// Write the wallet setting
|
|
UpdateWalletSetting(chain, name, load_on_start, warnings);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool RemoveWallet(const std::shared_ptr<CWallet>& wallet, std::optional<bool> load_on_start)
|
|
{
|
|
std::vector<bilingual_str> warnings;
|
|
return RemoveWallet(wallet, load_on_start, warnings);
|
|
}
|
|
|
|
std::vector<std::shared_ptr<CWallet>> GetWallets()
|
|
{
|
|
LOCK(cs_wallets);
|
|
return vpwallets;
|
|
}
|
|
|
|
std::shared_ptr<CWallet> GetWallet(const std::string& name)
|
|
{
|
|
LOCK(cs_wallets);
|
|
for (const std::shared_ptr<CWallet>& wallet : vpwallets) {
|
|
if (wallet->GetName() == name) return wallet;
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
std::unique_ptr<interfaces::Handler> HandleLoadWallet(LoadWalletFn load_wallet)
|
|
{
|
|
LOCK(cs_wallets);
|
|
auto it = g_load_wallet_fns.emplace(g_load_wallet_fns.end(), std::move(load_wallet));
|
|
return interfaces::MakeHandler([it] { LOCK(cs_wallets); g_load_wallet_fns.erase(it); });
|
|
}
|
|
|
|
static Mutex g_loading_wallet_mutex;
|
|
static Mutex g_wallet_release_mutex;
|
|
static std::condition_variable g_wallet_release_cv;
|
|
static std::set<std::string> g_loading_wallet_set GUARDED_BY(g_loading_wallet_mutex);
|
|
static std::set<std::string> g_unloading_wallet_set GUARDED_BY(g_wallet_release_mutex);
|
|
|
|
// Custom deleter for shared_ptr<CWallet>.
|
|
static void ReleaseWallet(CWallet* wallet)
|
|
{
|
|
const std::string name = wallet->GetName();
|
|
wallet->WalletLogPrintf("Releasing wallet\n");
|
|
wallet->Flush();
|
|
delete wallet;
|
|
// Wallet is now released, notify UnloadWallet, if any.
|
|
{
|
|
LOCK(g_wallet_release_mutex);
|
|
if (g_unloading_wallet_set.erase(name) == 0) {
|
|
// UnloadWallet was not called for this wallet, all done.
|
|
return;
|
|
}
|
|
}
|
|
g_wallet_release_cv.notify_all();
|
|
}
|
|
|
|
void UnloadWallet(std::shared_ptr<CWallet>&& wallet)
|
|
{
|
|
// Mark wallet for unloading.
|
|
const std::string name = wallet->GetName();
|
|
{
|
|
LOCK(g_wallet_release_mutex);
|
|
auto it = g_unloading_wallet_set.insert(name);
|
|
assert(it.second);
|
|
}
|
|
// The wallet can be in use so it's not possible to explicitly unload here.
|
|
// Notify the unload intent so that all remaining shared pointers are
|
|
// released.
|
|
wallet->NotifyUnload();
|
|
|
|
// Time to ditch our shared_ptr and wait for ReleaseWallet call.
|
|
wallet.reset();
|
|
{
|
|
WAIT_LOCK(g_wallet_release_mutex, lock);
|
|
while (g_unloading_wallet_set.count(name) == 1) {
|
|
g_wallet_release_cv.wait(lock);
|
|
}
|
|
}
|
|
}
|
|
|
|
namespace {
|
|
std::shared_ptr<CWallet> LoadWalletInternal(interfaces::Chain& chain, interfaces::CoinJoin::Loader& coinjoin_loader, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
|
|
{
|
|
try {
|
|
std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
|
|
if (!database) {
|
|
error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
|
|
return nullptr;
|
|
}
|
|
|
|
chain.initMessage(_("Loading wallet…").translated);
|
|
std::shared_ptr<CWallet> wallet = CWallet::Create(&chain, &coinjoin_loader, name, std::move(database), options.create_flags, error, warnings);
|
|
if (!wallet) {
|
|
error = Untranslated("Wallet loading failed.") + Untranslated(" ") + error;
|
|
status = DatabaseStatus::FAILED_LOAD;
|
|
return nullptr;
|
|
}
|
|
AddWallet(wallet);
|
|
wallet->postInitProcess();
|
|
|
|
// Write the wallet setting
|
|
UpdateWalletSetting(chain, name, load_on_start, warnings);
|
|
|
|
return wallet;
|
|
} catch (const std::runtime_error& e) {
|
|
error = Untranslated(e.what());
|
|
status = DatabaseStatus::FAILED_LOAD;
|
|
return nullptr;
|
|
}
|
|
}
|
|
} // namespace
|
|
|
|
std::shared_ptr<CWallet> LoadWallet(interfaces::Chain& chain, interfaces::CoinJoin::Loader& coinjoin_loader, const std::string& name, std::optional<bool> load_on_start, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
|
|
{
|
|
auto result = WITH_LOCK(g_loading_wallet_mutex, return g_loading_wallet_set.insert(name));
|
|
if (!result.second) {
|
|
error = Untranslated("Wallet already loading.");
|
|
status = DatabaseStatus::FAILED_LOAD;
|
|
return nullptr;
|
|
}
|
|
auto wallet = LoadWalletInternal(chain, coinjoin_loader, name, load_on_start, options, status, error, warnings);
|
|
WITH_LOCK(g_loading_wallet_mutex, g_loading_wallet_set.erase(result.first));
|
|
return wallet;
|
|
}
|
|
|
|
std::shared_ptr<CWallet> CreateWallet(interfaces::Chain& chain, interfaces::CoinJoin::Loader& coinjoin_loader, const std::string& name, std::optional<bool> load_on_start, DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
|
|
{
|
|
uint64_t wallet_creation_flags = options.create_flags;
|
|
const SecureString& passphrase = options.create_passphrase;
|
|
|
|
if (wallet_creation_flags & WALLET_FLAG_DESCRIPTORS) options.require_format = DatabaseFormat::SQLITE;
|
|
|
|
// Indicate that the wallet is actually supposed to be blank and not just blank to make it encrypted
|
|
bool create_blank = (wallet_creation_flags & WALLET_FLAG_BLANK_WALLET);
|
|
|
|
// Born encrypted wallets need to be created blank first.
|
|
if (!passphrase.empty()) {
|
|
wallet_creation_flags |= WALLET_FLAG_BLANK_WALLET;
|
|
}
|
|
|
|
// Wallet::Verify will check if we're trying to create a wallet with a duplicate name.
|
|
std::unique_ptr<WalletDatabase> database = MakeWalletDatabase(name, options, status, error);
|
|
if (!database) {
|
|
error = Untranslated("Wallet file verification failed.") + Untranslated(" ") + error;
|
|
status = DatabaseStatus::FAILED_VERIFY;
|
|
return nullptr;
|
|
}
|
|
|
|
// Do not allow a passphrase when private keys are disabled
|
|
if (!passphrase.empty() && (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
|
|
error = Untranslated("Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled.");
|
|
status = DatabaseStatus::FAILED_CREATE;
|
|
return nullptr;
|
|
}
|
|
|
|
// Make the wallet
|
|
chain.initMessage(_("Loading wallet…").translated);
|
|
std::shared_ptr<CWallet> wallet = CWallet::Create(&chain, &coinjoin_loader, name, std::move(database), wallet_creation_flags, error, warnings);
|
|
if (!wallet) {
|
|
error = Untranslated("Wallet creation failed.") + Untranslated(" ") + error;
|
|
status = DatabaseStatus::FAILED_CREATE;
|
|
return nullptr;
|
|
}
|
|
if (gArgs.GetBoolArg("-usehd", DEFAULT_USE_HD_WALLET)) {
|
|
wallet->WalletLogPrintf("Set HD by default\n");
|
|
wallet->SetMinVersion(FEATURE_HD);
|
|
}
|
|
|
|
// Encrypt the wallet
|
|
if (!passphrase.empty() && !(wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
|
|
if (!wallet->EncryptWallet(passphrase)) {
|
|
error = Untranslated("Error: Wallet created but failed to encrypt.");
|
|
status = DatabaseStatus::FAILED_ENCRYPT;
|
|
return nullptr;
|
|
}
|
|
if (!create_blank) {
|
|
// Unlock the wallet
|
|
if (!wallet->Unlock(passphrase)) {
|
|
error = Untranslated("Error: Wallet was encrypted but could not be unlocked");
|
|
status = DatabaseStatus::FAILED_ENCRYPT;
|
|
return nullptr;
|
|
}
|
|
|
|
// Set a seed for the wallet
|
|
if (wallet->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
|
|
LOCK(wallet->cs_wallet);
|
|
wallet->SetupDescriptorScriptPubKeyMans();
|
|
} else {
|
|
// TODO: drop this condition after removing option to create non-HD wallets
|
|
// related backport bitcoin#11250
|
|
if (wallet->GetVersion() >= FEATURE_HD) {
|
|
if (!wallet->GenerateNewHDChain(/*secureMnemonic=*/"", /*secureMnemonicPassphrase=*/"", passphrase)) {
|
|
error = Untranslated("Error: Failed to generate encrypted HD wallet");
|
|
status = DatabaseStatus::FAILED_CREATE;
|
|
return nullptr;
|
|
}
|
|
}
|
|
}
|
|
|
|
// backup the wallet we just encrypted
|
|
if (!wallet->AutoBackupWallet("", error, warnings) && !error.original.empty()) {
|
|
status = DatabaseStatus::FAILED_ENCRYPT;
|
|
return nullptr;
|
|
}
|
|
|
|
// Relock the wallet
|
|
wallet->Lock();
|
|
}
|
|
}
|
|
AddWallet(wallet);
|
|
wallet->postInitProcess();
|
|
|
|
// Write the wallet settings
|
|
UpdateWalletSetting(chain, name, load_on_start, warnings);
|
|
|
|
status = DatabaseStatus::SUCCESS;
|
|
return wallet;
|
|
}
|
|
|
|
std::shared_ptr<CWallet> RestoreWallet(interfaces::Chain& chain, interfaces::CoinJoin::Loader& coinjoin_loader, const fs::path& backup_file, const std::string& wallet_name, std::optional<bool> load_on_start, DatabaseStatus& status, bilingual_str& error, std::vector<bilingual_str>& warnings)
|
|
{
|
|
DatabaseOptions options;
|
|
options.require_existing = true;
|
|
|
|
if (!fs::exists(backup_file)) {
|
|
error = Untranslated("Backup file does not exist");
|
|
status = DatabaseStatus::FAILED_INVALID_BACKUP_FILE;
|
|
return nullptr;
|
|
}
|
|
|
|
const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::u8path(wallet_name));
|
|
|
|
if (fs::exists(wallet_path) || !TryCreateDirectories(wallet_path)) {
|
|
error = Untranslated(strprintf("Failed to create database path '%s'. Database already exists.", fs::PathToString(wallet_path)));
|
|
status = DatabaseStatus::FAILED_ALREADY_EXISTS;
|
|
return nullptr;
|
|
}
|
|
|
|
auto wallet_file = wallet_path / "wallet.dat";
|
|
fs::copy_file(backup_file, wallet_file, fs::copy_options::none);
|
|
|
|
auto wallet = LoadWallet(chain, coinjoin_loader, wallet_name, load_on_start, options, status, error, warnings);
|
|
|
|
if (!wallet) {
|
|
fs::remove(wallet_file);
|
|
fs::remove(wallet_path);
|
|
}
|
|
|
|
return wallet;
|
|
}
|
|
|
|
/** @defgroup mapWallet
|
|
*
|
|
* @{
|
|
*/
|
|
|
|
std::string COutput::ToString() const
|
|
{
|
|
return strprintf("COutput(%s, %d, %d) [%s]", tx->GetHash().ToString(), i, nDepth, FormatMoney(tx->tx->vout[i].nValue));
|
|
}
|
|
|
|
const CWalletTx* CWallet::GetWalletTx(const uint256& hash) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
std::map<uint256, CWalletTx>::const_iterator it = mapWallet.find(hash);
|
|
if (it == mapWallet.end())
|
|
return nullptr;
|
|
return &(it->second);
|
|
}
|
|
|
|
void CWallet::UpgradeKeyMetadata()
|
|
{
|
|
if (IsLocked() || IsWalletFlagSet(WALLET_FLAG_KEY_ORIGIN_METADATA)) {
|
|
return;
|
|
}
|
|
|
|
auto spk_man = GetLegacyScriptPubKeyMan();
|
|
if (!spk_man) {
|
|
return;
|
|
}
|
|
|
|
spk_man->UpgradeKeyMetadata();
|
|
SetWalletFlag(WALLET_FLAG_KEY_ORIGIN_METADATA);
|
|
}
|
|
|
|
void CWallet::UpgradeDescriptorCache()
|
|
{
|
|
if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) || IsLocked() || IsWalletFlagSet(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED)) {
|
|
return;
|
|
}
|
|
|
|
for (ScriptPubKeyMan* spkm : GetAllScriptPubKeyMans()) {
|
|
DescriptorScriptPubKeyMan* desc_spkm = dynamic_cast<DescriptorScriptPubKeyMan*>(spkm);
|
|
desc_spkm->UpgradeDescriptorCache();
|
|
}
|
|
SetWalletFlag(WALLET_FLAG_LAST_HARDENED_XPUB_CACHED);
|
|
}
|
|
|
|
bool CWallet::ChangeWalletPassphrase(const SecureString& strOldWalletPassphrase, const SecureString& strNewWalletPassphrase)
|
|
{
|
|
bool fWasLocked = IsLocked(true);
|
|
|
|
{
|
|
LOCK(cs_wallet);
|
|
Lock();
|
|
|
|
CCrypter crypter;
|
|
CKeyingMaterial _vMasterKey;
|
|
for (MasterKeyMap::value_type& pMasterKey : mapMasterKeys)
|
|
{
|
|
if(!crypter.SetKeyFromPassphrase(strOldWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
|
|
return false;
|
|
if (!crypter.Decrypt(pMasterKey.second.vchCryptedKey, _vMasterKey))
|
|
return false;
|
|
if (Unlock(_vMasterKey))
|
|
{
|
|
int64_t nStartTime = GetTimeMillis();
|
|
crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod);
|
|
pMasterKey.second.nDeriveIterations = static_cast<unsigned int>(pMasterKey.second.nDeriveIterations * (100 / ((double)(GetTimeMillis() - nStartTime))));
|
|
|
|
nStartTime = GetTimeMillis();
|
|
crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod);
|
|
pMasterKey.second.nDeriveIterations = (pMasterKey.second.nDeriveIterations + static_cast<unsigned int>(pMasterKey.second.nDeriveIterations * 100 / ((double)(GetTimeMillis() - nStartTime)))) / 2;
|
|
|
|
if (pMasterKey.second.nDeriveIterations < 25000)
|
|
pMasterKey.second.nDeriveIterations = 25000;
|
|
|
|
WalletLogPrintf("Wallet passphrase changed to an nDeriveIterations of %i\n", pMasterKey.second.nDeriveIterations);
|
|
|
|
if (!crypter.SetKeyFromPassphrase(strNewWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
|
|
return false;
|
|
if (!crypter.Encrypt(_vMasterKey, pMasterKey.second.vchCryptedKey))
|
|
return false;
|
|
WalletBatch(GetDatabase()).WriteMasterKey(pMasterKey.first, pMasterKey.second);
|
|
if (fWasLocked)
|
|
Lock();
|
|
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void CWallet::chainStateFlushed(const CBlockLocator& loc)
|
|
{
|
|
// Don't update the best block until the chain is attached so that in case of a shutdown,
|
|
// the rescan will be restarted at next startup.
|
|
if (m_attaching_chain) {
|
|
return;
|
|
}
|
|
WalletBatch batch(GetDatabase());
|
|
batch.WriteBestBlock(loc);
|
|
}
|
|
|
|
void CWallet::SetMinVersion(enum WalletFeature nVersion, WalletBatch* batch_in)
|
|
{
|
|
LOCK(cs_wallet);
|
|
if (nWalletVersion >= nVersion)
|
|
return;
|
|
WalletLogPrintf("Setting minversion to %d\n", nVersion);
|
|
nWalletVersion = nVersion;
|
|
|
|
{
|
|
WalletBatch* batch = batch_in ? batch_in : new WalletBatch(GetDatabase());
|
|
if (nWalletVersion > 40000)
|
|
batch->WriteMinVersion(nWalletVersion);
|
|
if (!batch_in)
|
|
delete batch;
|
|
}
|
|
}
|
|
|
|
std::set<uint256> CWallet::GetConflicts(const uint256& txid) const
|
|
{
|
|
std::set<uint256> result;
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
std::map<uint256, CWalletTx>::const_iterator it = mapWallet.find(txid);
|
|
if (it == mapWallet.end())
|
|
return result;
|
|
const CWalletTx& wtx = it->second;
|
|
|
|
std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
|
|
|
|
for (const CTxIn& txin : wtx.tx->vin)
|
|
{
|
|
if (mapTxSpends.count(txin.prevout) <= 1)
|
|
continue; // No conflict if zero or one spends
|
|
range = mapTxSpends.equal_range(txin.prevout);
|
|
for (TxSpends::const_iterator _it = range.first; _it != range.second; ++_it)
|
|
result.insert(_it->second);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
bool CWallet::HasWalletSpend(const uint256& txid) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
auto iter = mapTxSpends.lower_bound(COutPoint(txid, 0));
|
|
return (iter != mapTxSpends.end() && iter->first.hash == txid);
|
|
}
|
|
|
|
void CWallet::Flush()
|
|
{
|
|
GetDatabase().Flush();
|
|
}
|
|
|
|
void CWallet::Close()
|
|
{
|
|
GetDatabase().Close();
|
|
}
|
|
|
|
void CWallet::SyncMetaData(std::pair<TxSpends::iterator, TxSpends::iterator> range)
|
|
{
|
|
// We want all the wallet transactions in range to have the same metadata as
|
|
// the oldest (smallest nOrderPos).
|
|
// So: find smallest nOrderPos:
|
|
|
|
int nMinOrderPos = std::numeric_limits<int>::max();
|
|
const CWalletTx* copyFrom = nullptr;
|
|
for (TxSpends::iterator it = range.first; it != range.second; ++it) {
|
|
const CWalletTx* wtx = &mapWallet.at(it->second);
|
|
if (wtx->nOrderPos < nMinOrderPos) {
|
|
nMinOrderPos = wtx->nOrderPos;
|
|
copyFrom = wtx;
|
|
}
|
|
}
|
|
|
|
if (!copyFrom) {
|
|
return;
|
|
}
|
|
|
|
// Now copy data from copyFrom to rest:
|
|
for (TxSpends::iterator it = range.first; it != range.second; ++it)
|
|
{
|
|
const uint256& hash = it->second;
|
|
CWalletTx* copyTo = &mapWallet.at(hash);
|
|
if (copyFrom == copyTo) continue;
|
|
assert(copyFrom && "Oldest wallet transaction in range assumed to have been found.");
|
|
if (!copyFrom->IsEquivalentTo(*copyTo)) continue;
|
|
copyTo->mapValue = copyFrom->mapValue;
|
|
copyTo->vOrderForm = copyFrom->vOrderForm;
|
|
// fTimeReceivedIsTxTime not copied on purpose
|
|
// nTimeReceived not copied on purpose
|
|
copyTo->nTimeSmart = copyFrom->nTimeSmart;
|
|
copyTo->fFromMe = copyFrom->fFromMe;
|
|
// nOrderPos not copied on purpose
|
|
// cached members not copied on purpose
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Outpoint is spent if any non-conflicted transaction
|
|
* spends it:
|
|
*/
|
|
bool CWallet::IsSpent(const uint256& hash, unsigned int n) const
|
|
{
|
|
const COutPoint outpoint(hash, n);
|
|
std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range;
|
|
range = mapTxSpends.equal_range(outpoint);
|
|
|
|
for (TxSpends::const_iterator it = range.first; it != range.second; ++it)
|
|
{
|
|
const uint256& wtxid = it->second;
|
|
std::map<uint256, CWalletTx>::const_iterator mit = mapWallet.find(wtxid);
|
|
if (mit != mapWallet.end()) {
|
|
int depth = mit->second.GetDepthInMainChain();
|
|
if (depth > 0 || (depth == 0 && !mit->second.isAbandoned()))
|
|
return true; // Spent
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void CWallet::AddToSpends(const COutPoint& outpoint, const uint256& wtxid)
|
|
{
|
|
mapTxSpends.insert(std::make_pair(outpoint, wtxid));
|
|
setWalletUTXO.erase(outpoint);
|
|
|
|
setLockedCoins.erase(outpoint);
|
|
|
|
std::pair<TxSpends::iterator, TxSpends::iterator> range;
|
|
range = mapTxSpends.equal_range(outpoint);
|
|
SyncMetaData(range);
|
|
}
|
|
|
|
|
|
void CWallet::AddToSpends(const uint256& wtxid)
|
|
{
|
|
auto it = mapWallet.find(wtxid);
|
|
assert(it != mapWallet.end());
|
|
const CWalletTx& thisTx = it->second;
|
|
if (thisTx.IsCoinBase()) // Coinbases don't spend anything!
|
|
return;
|
|
|
|
for (const CTxIn& txin : thisTx.tx->vin)
|
|
AddToSpends(txin.prevout, wtxid);
|
|
}
|
|
|
|
bool CWallet::EncryptWallet(const SecureString& strWalletPassphrase)
|
|
{
|
|
if (IsCrypted())
|
|
return false;
|
|
|
|
CKeyingMaterial _vMasterKey;
|
|
|
|
_vMasterKey.resize(WALLET_CRYPTO_KEY_SIZE);
|
|
GetStrongRandBytes(_vMasterKey);
|
|
|
|
CMasterKey kMasterKey;
|
|
|
|
kMasterKey.vchSalt.resize(WALLET_CRYPTO_SALT_SIZE);
|
|
GetStrongRandBytes(kMasterKey.vchSalt);
|
|
|
|
CCrypter crypter;
|
|
int64_t nStartTime = GetTimeMillis();
|
|
crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, 25000, kMasterKey.nDerivationMethod);
|
|
kMasterKey.nDeriveIterations = static_cast<unsigned int>(2500000 / ((double)(GetTimeMillis() - nStartTime)));
|
|
|
|
nStartTime = GetTimeMillis();
|
|
crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod);
|
|
kMasterKey.nDeriveIterations = (kMasterKey.nDeriveIterations + static_cast<unsigned int>(kMasterKey.nDeriveIterations * 100 / ((double)(GetTimeMillis() - nStartTime)))) / 2;
|
|
|
|
if (kMasterKey.nDeriveIterations < 25000)
|
|
kMasterKey.nDeriveIterations = 25000;
|
|
|
|
WalletLogPrintf("Encrypting Wallet with an nDeriveIterations of %i\n", kMasterKey.nDeriveIterations);
|
|
|
|
if (!crypter.SetKeyFromPassphrase(strWalletPassphrase, kMasterKey.vchSalt, kMasterKey.nDeriveIterations, kMasterKey.nDerivationMethod))
|
|
return false;
|
|
if (!crypter.Encrypt(_vMasterKey, kMasterKey.vchCryptedKey))
|
|
return false;
|
|
|
|
{
|
|
LOCK(cs_wallet);
|
|
mapMasterKeys[++nMasterKeyMaxID] = kMasterKey;
|
|
WalletBatch* encrypted_batch = new WalletBatch(GetDatabase());
|
|
if (!encrypted_batch->TxnBegin()) {
|
|
delete encrypted_batch;
|
|
encrypted_batch = nullptr;
|
|
return false;
|
|
}
|
|
encrypted_batch->WriteMasterKey(nMasterKeyMaxID, kMasterKey);
|
|
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
auto spk_man = spk_man_pair.second.get();
|
|
|
|
if (!spk_man->Encrypt(_vMasterKey, encrypted_batch)) {
|
|
encrypted_batch->TxnAbort();
|
|
delete encrypted_batch;
|
|
encrypted_batch = nullptr;
|
|
// We now probably have half of our keys encrypted in memory, and half not...
|
|
// die and let the user reload the unencrypted wallet.
|
|
assert(false);
|
|
}
|
|
}
|
|
|
|
|
|
// Encryption was introduced in version 0.4.0
|
|
SetMinVersion(FEATURE_WALLETCRYPT, encrypted_batch);
|
|
|
|
if (!encrypted_batch->TxnCommit()) {
|
|
delete encrypted_batch;
|
|
encrypted_batch = nullptr;
|
|
// We now have keys encrypted in memory, but not on disk...
|
|
// die to avoid confusion and let the user reload the unencrypted wallet.
|
|
assert(false);
|
|
}
|
|
|
|
delete encrypted_batch;
|
|
encrypted_batch = nullptr;
|
|
|
|
Lock();
|
|
Unlock(strWalletPassphrase);
|
|
|
|
// If we are using descriptors, make new descriptors with a new seed
|
|
if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS) && !IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
|
|
SetupDescriptorScriptPubKeyMans();
|
|
} else if (auto spk_man = GetLegacyScriptPubKeyMan()) {
|
|
// if we are not using HD, generate new keypool
|
|
if (spk_man->IsHDEnabled()) {
|
|
if (!spk_man->TopUp()) {
|
|
return false;
|
|
}
|
|
}
|
|
else {
|
|
spk_man->NewKeyPool();
|
|
}
|
|
}
|
|
|
|
Lock();
|
|
|
|
// Need to completely rewrite the wallet file; if we don't, bdb might keep
|
|
// bits of the unencrypted private key in slack space in the database file.
|
|
GetDatabase().Rewrite();
|
|
|
|
// BDB seems to have a bad habit of writing old data into
|
|
// slack space in .dat files; that is bad if the old data is
|
|
// unencrypted private keys. So:
|
|
GetDatabase().ReloadDbEnv();
|
|
|
|
}
|
|
NotifyStatusChanged(this);
|
|
|
|
return true;
|
|
}
|
|
|
|
DBErrors CWallet::ReorderTransactions()
|
|
{
|
|
LOCK(cs_wallet);
|
|
WalletBatch batch(GetDatabase());
|
|
|
|
// Old wallets didn't have any defined order for transactions
|
|
// Probably a bad idea to change the output of this
|
|
|
|
// First: get all CWalletTx into a sorted-by-time multimap.
|
|
typedef std::multimap<int64_t, CWalletTx*> TxItems;
|
|
TxItems txByTime;
|
|
|
|
for (auto& entry : mapWallet)
|
|
{
|
|
CWalletTx* wtx = &entry.second;
|
|
txByTime.insert(std::make_pair(wtx->nTimeReceived, wtx));
|
|
}
|
|
|
|
nOrderPosNext = 0;
|
|
std::vector<int64_t> nOrderPosOffsets;
|
|
for (TxItems::iterator it = txByTime.begin(); it != txByTime.end(); ++it)
|
|
{
|
|
CWalletTx *const pwtx = (*it).second;
|
|
int64_t& nOrderPos = pwtx->nOrderPos;
|
|
|
|
if (nOrderPos == -1)
|
|
{
|
|
nOrderPos = nOrderPosNext++;
|
|
nOrderPosOffsets.push_back(nOrderPos);
|
|
|
|
if (!batch.WriteTx(*pwtx))
|
|
return DBErrors::LOAD_FAIL;
|
|
}
|
|
else
|
|
{
|
|
int64_t nOrderPosOff = 0;
|
|
for (const int64_t& nOffsetStart : nOrderPosOffsets)
|
|
{
|
|
if (nOrderPos >= nOffsetStart)
|
|
++nOrderPosOff;
|
|
}
|
|
nOrderPos += nOrderPosOff;
|
|
nOrderPosNext = std::max(nOrderPosNext, nOrderPos + 1);
|
|
|
|
if (!nOrderPosOff)
|
|
continue;
|
|
|
|
// Since we're changing the order, write it back
|
|
if (!batch.WriteTx(*pwtx))
|
|
return DBErrors::LOAD_FAIL;
|
|
}
|
|
}
|
|
batch.WriteOrderPosNext(nOrderPosNext);
|
|
|
|
return DBErrors::LOAD_OK;
|
|
}
|
|
|
|
int64_t CWallet::IncOrderPosNext(WalletBatch* batch)
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
int64_t nRet = nOrderPosNext++;
|
|
if (batch) {
|
|
batch->WriteOrderPosNext(nOrderPosNext);
|
|
} else {
|
|
WalletBatch(GetDatabase()).WriteOrderPosNext(nOrderPosNext);
|
|
}
|
|
return nRet;
|
|
}
|
|
|
|
void CWallet::MarkDirty()
|
|
{
|
|
{
|
|
LOCK(cs_wallet);
|
|
for (std::pair<const uint256, CWalletTx>& item : mapWallet)
|
|
item.second.MarkDirty();
|
|
}
|
|
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
}
|
|
|
|
void CWallet::SetSpentKeyState(WalletBatch& batch, const uint256& hash, unsigned int n, bool used, std::set<CTxDestination>& tx_destinations)
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
const CWalletTx* srctx = GetWalletTx(hash);
|
|
if (!srctx) return;
|
|
|
|
CTxDestination dst;
|
|
if (ExtractDestination(srctx->tx->vout[n].scriptPubKey, dst)) {
|
|
if (IsMine(dst)) {
|
|
if (used != IsAddressUsed(dst)) {
|
|
if (used) {
|
|
tx_destinations.insert(dst);
|
|
}
|
|
SetAddressUsed(batch, dst, used);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
bool CWallet::IsSpentKey(const uint256& hash, unsigned int n) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
const CWalletTx* srctx = GetWalletTx(hash);
|
|
if (srctx) {
|
|
assert(srctx->tx->vout.size() > n);
|
|
CTxDestination dest;
|
|
if (!ExtractDestination(srctx->tx->vout[n].scriptPubKey, dest)) {
|
|
return false;
|
|
}
|
|
if (IsAddressUsed(dest)) {
|
|
return true;
|
|
}
|
|
if (IsLegacy()) {
|
|
LegacyScriptPubKeyMan* spk_man = GetLegacyScriptPubKeyMan();
|
|
assert(spk_man != nullptr);
|
|
for (const auto& keyid : GetAffectedKeys(srctx->tx->vout[n].scriptPubKey, *spk_man)) {
|
|
if (IsAddressUsed(PKHash(keyid))) {
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
CWalletTx* CWallet::AddToWallet(CTransactionRef tx, const CWalletTx::Confirmation& confirm, const UpdateWalletTxFn& update_wtx, bool fFlushOnClose)
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
WalletBatch batch(GetDatabase(), fFlushOnClose);
|
|
|
|
uint256 hash = tx->GetHash();
|
|
|
|
if (IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE)) {
|
|
// Mark used destinations
|
|
std::set<CTxDestination> tx_destinations;
|
|
|
|
for (const CTxIn& txin : tx->vin) {
|
|
const COutPoint& op = txin.prevout;
|
|
SetSpentKeyState(batch, op.hash, op.n, true, tx_destinations);
|
|
}
|
|
|
|
MarkDestinationsDirty(tx_destinations);
|
|
}
|
|
|
|
// Inserts only if not already there, returns tx inserted or tx found
|
|
auto ret = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(this, tx));
|
|
CWalletTx& wtx = (*ret.first).second;
|
|
bool fInsertedNew = ret.second;
|
|
bool fUpdated = update_wtx && update_wtx(wtx, fInsertedNew);
|
|
if (fInsertedNew) {
|
|
wtx.m_confirm = confirm;
|
|
wtx.nTimeReceived = GetTime();
|
|
wtx.nOrderPos = IncOrderPosNext(&batch);
|
|
wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
|
|
wtx.nTimeSmart = ComputeTimeSmart(wtx);
|
|
AddToSpends(hash);
|
|
|
|
std::vector<std::pair<const CTransactionRef&, unsigned int>> outputs;
|
|
for(unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
|
|
if (IsMine(wtx.tx->vout[i]) && !IsSpent(hash, i)) {
|
|
setWalletUTXO.insert(COutPoint(hash, i));
|
|
outputs.emplace_back(wtx.tx, i);
|
|
}
|
|
}
|
|
// TODO: refactor duplicated code between CWallet::AddToWallet and CWallet::AutoLockMasternodeCollaterals
|
|
if (m_chain) {
|
|
for (const auto& outPoint : m_chain->listMNCollaterials(outputs)) {
|
|
LockCoin(outPoint);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!fInsertedNew)
|
|
{
|
|
if (confirm.status != wtx.m_confirm.status) {
|
|
wtx.m_confirm.status = confirm.status;
|
|
wtx.m_confirm.nIndex = confirm.nIndex;
|
|
wtx.m_confirm.hashBlock = confirm.hashBlock;
|
|
wtx.m_confirm.block_height = confirm.block_height;
|
|
fUpdated = true;
|
|
} else {
|
|
assert(wtx.m_confirm.nIndex == confirm.nIndex);
|
|
assert(wtx.m_confirm.hashBlock == confirm.hashBlock);
|
|
assert(wtx.m_confirm.block_height == confirm.block_height);
|
|
}
|
|
|
|
std::vector<std::pair<const CTransactionRef&, unsigned int>> outputs;
|
|
for(unsigned int i = 0; i < wtx.tx->vout.size(); ++i) {
|
|
if (IsMine(wtx.tx->vout[i]) && !IsSpent(hash, i)) {
|
|
bool new_utxo = setWalletUTXO.insert(COutPoint(hash, i)).second;
|
|
if (new_utxo) {
|
|
outputs.emplace_back(wtx.tx, i);
|
|
fUpdated = true;
|
|
}
|
|
}
|
|
}
|
|
// TODO: refactor duplicated code with case fInstertedNew
|
|
if (m_chain) {
|
|
for (const auto& outPoint : m_chain->listMNCollaterials(outputs)) {
|
|
LockCoin(outPoint);
|
|
}
|
|
}
|
|
}
|
|
|
|
//// debug print
|
|
WalletLogPrintf("AddToWallet %s %s%s\n", hash.ToString(), (fInsertedNew ? "new" : ""), (fUpdated ? "update" : ""));
|
|
|
|
// Write to disk
|
|
if (fInsertedNew || fUpdated)
|
|
if (!batch.WriteTx(wtx))
|
|
return nullptr;
|
|
|
|
// Break debit/credit balance caches:
|
|
wtx.MarkDirty();
|
|
|
|
// Notify UI of new or updated transaction
|
|
NotifyTransactionChanged(hash, fInsertedNew ? CT_NEW : CT_UPDATED);
|
|
|
|
#if HAVE_SYSTEM
|
|
// notify an external script when a wallet transaction comes in or is updated
|
|
std::string strCmd = gArgs.GetArg("-walletnotify", "");
|
|
|
|
if (!strCmd.empty())
|
|
{
|
|
ReplaceAll(strCmd, "%s", hash.GetHex());
|
|
if (confirm.status == CWalletTx::Status::CONFIRMED)
|
|
{
|
|
ReplaceAll(strCmd, "%b", confirm.hashBlock.GetHex());
|
|
ReplaceAll(strCmd, "%h", ToString(confirm.block_height));
|
|
} else {
|
|
ReplaceAll(strCmd, "%b", "unconfirmed");
|
|
ReplaceAll(strCmd, "%h", "-1");
|
|
}
|
|
#ifndef WIN32
|
|
// Substituting the wallet name isn't currently supported on windows
|
|
// because windows shell escaping has not been implemented yet:
|
|
// https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
|
|
// A few ways it could be implemented in the future are described in:
|
|
// https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
|
|
ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
|
|
#endif
|
|
std::thread t(runCommand, strCmd);
|
|
t.detach(); // thread runs free
|
|
}
|
|
#endif
|
|
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
|
|
return &wtx;
|
|
}
|
|
|
|
bool CWallet::LoadToWallet(const uint256& hash, const UpdateWalletTxFn& fill_wtx)
|
|
{
|
|
const auto& ins = mapWallet.emplace(std::piecewise_construct, std::forward_as_tuple(hash), std::forward_as_tuple(this, nullptr));
|
|
CWalletTx& wtx = ins.first->second;
|
|
if (!fill_wtx(wtx, ins.second)) {
|
|
return false;
|
|
}
|
|
// If wallet doesn't have a chain (e.g dash-wallet), don't bother to update txn.
|
|
if (HaveChain()) {
|
|
bool active;
|
|
int height;
|
|
if (chain().findBlock(wtx.m_confirm.hashBlock, FoundBlock().inActiveChain(active).height(height)) && active) {
|
|
// Update cached block height variable since it not stored in the
|
|
// serialized transaction.
|
|
wtx.m_confirm.block_height = height;
|
|
} else if (wtx.isConflicted() || wtx.isConfirmed()) {
|
|
// If tx block (or conflicting block) was reorged out of chain
|
|
// while the wallet was shutdown, change tx status to UNCONFIRMED
|
|
// and reset block height, hash, and index. ABANDONED tx don't have
|
|
// associated blocks and don't need to be updated. The case where a
|
|
// transaction was reorged out while online and then reconfirmed
|
|
// while offline is covered by the rescan logic.
|
|
wtx.setUnconfirmed();
|
|
wtx.m_confirm.hashBlock = uint256();
|
|
wtx.m_confirm.block_height = 0;
|
|
wtx.m_confirm.nIndex = 0;
|
|
}
|
|
}
|
|
if (/* insertion took place */ ins.second) {
|
|
wtx.m_it_wtxOrdered = wtxOrdered.insert(std::make_pair(wtx.nOrderPos, &wtx));
|
|
}
|
|
AddToSpends(hash);
|
|
for (const CTxIn& txin : wtx.tx->vin) {
|
|
auto it = mapWallet.find(txin.prevout.hash);
|
|
if (it != mapWallet.end()) {
|
|
CWalletTx& prevtx = it->second;
|
|
if (prevtx.isConflicted()) {
|
|
MarkConflicted(prevtx.m_confirm.hashBlock, prevtx.m_confirm.block_height, wtx.GetHash());
|
|
}
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::AddToWalletIfInvolvingMe(const CTransactionRef& ptx, CWalletTx::Confirmation confirm, WalletBatch& batch, bool fUpdate)
|
|
{
|
|
const CTransaction& tx = *ptx;
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
if (!confirm.hashBlock.IsNull()) {
|
|
for (const CTxIn& txin : tx.vin) {
|
|
std::pair<TxSpends::const_iterator, TxSpends::const_iterator> range = mapTxSpends.equal_range(txin.prevout);
|
|
while (range.first != range.second) {
|
|
if (range.first->second != tx.GetHash()) {
|
|
WalletLogPrintf("Transaction %s (in block %s) conflicts with wallet transaction %s (both spend %s:%i)\n", tx.GetHash().ToString(), confirm.hashBlock.ToString(), range.first->second.ToString(), range.first->first.hash.ToString(), range.first->first.n);
|
|
MarkConflicted(confirm.hashBlock, confirm.block_height, range.first->second);
|
|
}
|
|
range.first++;
|
|
}
|
|
}
|
|
}
|
|
|
|
bool fExisted = mapWallet.count(tx.GetHash()) != 0;
|
|
if (fExisted && !fUpdate) return false;
|
|
if (fExisted || IsMine(tx) || IsFromMe(tx))
|
|
{
|
|
/* Check if any keys in the wallet keypool that were supposed to be unused
|
|
* have appeared in a new transaction. If so, remove those keys from the keypool.
|
|
* This can happen when restoring an old wallet backup that does not contain
|
|
* the mostly recently created transactions from newer versions of the wallet.
|
|
*/
|
|
|
|
std::optional<int64_t> block_time;
|
|
if (!confirm.hashBlock.IsNull()) {
|
|
int64_t block_time_tmp;
|
|
bool found_block = chain().findBlock(confirm.hashBlock, FoundBlock().maxTime(block_time_tmp));
|
|
assert(found_block);
|
|
block_time = block_time_tmp;
|
|
}
|
|
// loop though all outputs
|
|
for (const CTxOut& txout: tx.vout) {
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
spk_man_pair.second->MarkUnusedAddresses(batch, txout.scriptPubKey, block_time);
|
|
}
|
|
}
|
|
|
|
// Block disconnection override an abandoned tx as unconfirmed
|
|
// which means user may have to call abandontransaction again
|
|
return AddToWallet(MakeTransactionRef(tx), confirm, /* update_wtx= */ nullptr, /* fFlushOnClose= */ false);
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool CWallet::TransactionCanBeAbandoned(const uint256& hashTx) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
const CWalletTx* wtx = GetWalletTx(hashTx);
|
|
return wtx && !wtx->isAbandoned() && wtx->GetDepthInMainChain() == 0 && !wtx->InMempool();
|
|
}
|
|
|
|
bool CWallet::TransactionCanBeResent(const uint256& hashTx) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
const CWalletTx* wtx = GetWalletTx(hashTx);
|
|
return wtx && wtx->CanBeResent();
|
|
}
|
|
|
|
void CWallet::MarkInputsDirty(const CTransactionRef& tx)
|
|
{
|
|
for (const CTxIn& txin : tx->vin) {
|
|
auto it = mapWallet.find(txin.prevout.hash);
|
|
if (it != mapWallet.end()) {
|
|
it->second.MarkDirty();
|
|
}
|
|
}
|
|
}
|
|
|
|
bool CWallet::AbandonTransaction(const uint256& hashTx)
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
WalletBatch batch(GetDatabase());
|
|
|
|
std::set<uint256> todo;
|
|
std::set<uint256> done;
|
|
|
|
// Can't mark abandoned if confirmed or in mempool
|
|
auto it = mapWallet.find(hashTx);
|
|
assert(it != mapWallet.end());
|
|
const CWalletTx& origtx = it->second;
|
|
if (origtx.GetDepthInMainChain() != 0 || origtx.InMempool() || origtx.IsLockedByInstantSend()) {
|
|
return false;
|
|
}
|
|
|
|
todo.insert(hashTx);
|
|
|
|
while (!todo.empty()) {
|
|
uint256 now = *todo.begin();
|
|
todo.erase(now);
|
|
done.insert(now);
|
|
auto it = mapWallet.find(now);
|
|
assert(it != mapWallet.end());
|
|
CWalletTx& wtx = it->second;
|
|
int currentconfirm = wtx.GetDepthInMainChain();
|
|
// If the orig tx was not in block, none of its spends can be
|
|
assert(currentconfirm <= 0);
|
|
// if (currentconfirm < 0) {Tx and spends are already conflicted, no need to abandon}
|
|
if (currentconfirm == 0 && !wtx.isAbandoned()) {
|
|
// If the orig tx was not in block/mempool, none of its spends can be in mempool
|
|
assert(!wtx.InMempool());
|
|
wtx.setAbandoned();
|
|
wtx.MarkDirty();
|
|
batch.WriteTx(wtx);
|
|
NotifyTransactionChanged(wtx.GetHash(), CT_UPDATED);
|
|
// Iterate over all its outputs, and mark transactions in the wallet that spend them abandoned too
|
|
TxSpends::const_iterator iter = mapTxSpends.lower_bound(COutPoint(now, 0));
|
|
while (iter != mapTxSpends.end() && iter->first.hash == now) {
|
|
if (!done.count(iter->second)) {
|
|
todo.insert(iter->second);
|
|
}
|
|
iter++;
|
|
}
|
|
// If a transaction changes 'conflicted' state, that changes the balance
|
|
// available of the outputs it spends. So force those to be recomputed
|
|
MarkInputsDirty(wtx.tx);
|
|
}
|
|
}
|
|
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::ResendTransaction(const uint256& hashTx)
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
auto it = mapWallet.find(hashTx);
|
|
assert(it != mapWallet.end());
|
|
CWalletTx& wtx = it->second;
|
|
|
|
bilingual_str unused_err_string;
|
|
return wtx.SubmitMemoryPoolAndRelay(unused_err_string, true);
|
|
}
|
|
|
|
void CWallet::MarkConflicted(const uint256& hashBlock, int conflicting_height, const uint256& hashTx)
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
int conflictconfirms = (m_last_block_processed_height - conflicting_height + 1) * -1;
|
|
// If number of conflict confirms cannot be determined, this means
|
|
// that the block is still unknown or not yet part of the main chain,
|
|
// for example when loading the wallet during a reindex. Do nothing in that
|
|
// case.
|
|
if (conflictconfirms >= 0)
|
|
return;
|
|
|
|
// Do not flush the wallet here for performance reasons
|
|
WalletBatch batch(GetDatabase(), false);
|
|
|
|
std::set<uint256> todo;
|
|
std::set<uint256> done;
|
|
|
|
todo.insert(hashTx);
|
|
|
|
while (!todo.empty()) {
|
|
uint256 now = *todo.begin();
|
|
todo.erase(now);
|
|
done.insert(now);
|
|
auto it = mapWallet.find(now);
|
|
assert(it != mapWallet.end());
|
|
CWalletTx& wtx = it->second;
|
|
int currentconfirm = wtx.GetDepthInMainChain();
|
|
if (conflictconfirms < currentconfirm) {
|
|
// Block is 'more conflicted' than current confirm; update.
|
|
// Mark transaction as conflicted with this block.
|
|
wtx.m_confirm.nIndex = 0;
|
|
wtx.m_confirm.hashBlock = hashBlock;
|
|
wtx.m_confirm.block_height = conflicting_height;
|
|
wtx.setConflicted();
|
|
wtx.MarkDirty();
|
|
batch.WriteTx(wtx);
|
|
// Iterate over all its outputs, and mark transactions in the wallet that spend them conflicted too
|
|
TxSpends::const_iterator iter = mapTxSpends.lower_bound(COutPoint(now, 0));
|
|
while (iter != mapTxSpends.end() && iter->first.hash == now) {
|
|
if (!done.count(iter->second)) {
|
|
todo.insert(iter->second);
|
|
}
|
|
iter++;
|
|
}
|
|
// If a transaction changes 'conflicted' state, that changes the balance
|
|
// available of the outputs it spends. So force those to be recomputed
|
|
MarkInputsDirty(wtx.tx);
|
|
}
|
|
}
|
|
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
}
|
|
|
|
void CWallet::SyncTransaction(const CTransactionRef& ptx, CWalletTx::Confirmation confirm, WalletBatch& batch, bool update_tx)
|
|
{
|
|
if (!AddToWalletIfInvolvingMe(ptx, confirm, batch, update_tx))
|
|
return; // Not one of ours
|
|
|
|
// If a transaction changes 'conflicted' state, that changes the balance
|
|
// available of the outputs it spends. So force those to be
|
|
// recomputed, also:
|
|
MarkInputsDirty(ptx);
|
|
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
}
|
|
|
|
void CWallet::transactionAddedToMempool(const CTransactionRef& tx, int64_t nAcceptTime, uint64_t mempool_sequence) {
|
|
LOCK(cs_wallet);
|
|
CWalletTx::Confirmation confirm(CWalletTx::Status::UNCONFIRMED, /* block_height */ 0, {}, /* nIndex */ 0);
|
|
WalletBatch batch(GetDatabase());
|
|
SyncTransaction(tx, confirm, batch);
|
|
|
|
auto it = mapWallet.find(tx->GetHash());
|
|
if (it != mapWallet.end()) {
|
|
RefreshMempoolStatus(it->second, chain());
|
|
}
|
|
}
|
|
|
|
void CWallet::transactionRemovedFromMempool(const CTransactionRef& tx, MemPoolRemovalReason reason, uint64_t mempool_sequence) {
|
|
if (reason != MemPoolRemovalReason::CONFLICT) {
|
|
LOCK(cs_wallet);
|
|
auto it = mapWallet.find(tx->GetHash());
|
|
if (it != mapWallet.end()) {
|
|
RefreshMempoolStatus(it->second, chain());
|
|
}
|
|
}
|
|
// Handle transactions that were removed from the mempool because they
|
|
// conflict with transactions in a newly connected block.
|
|
if (reason == MemPoolRemovalReason::CONFLICT) {
|
|
// Trigger external -walletnotify notifications for these transactions.
|
|
// Set Status::UNCONFIRMED instead of Status::CONFLICTED for a few reasons:
|
|
//
|
|
// 1. The transactionRemovedFromMempool callback does not currently
|
|
// provide the conflicting block's hash and height, and for backwards
|
|
// compatibility reasons it may not be not safe to store conflicted
|
|
// wallet transactions with a null block hash. See
|
|
// https://github.com/bitcoin/bitcoin/pull/18600#discussion_r420195993.
|
|
// 2. For most of these transactions, the wallet's internal conflict
|
|
// detection in the blockConnected handler will subsequently call
|
|
// MarkConflicted and update them with CONFLICTED status anyway. This
|
|
// applies to any wallet transaction that has inputs spent in the
|
|
// block, or that has ancestors in the wallet with inputs spent by
|
|
// the block.
|
|
// 3. Longstanding behavior since the sync implementation in
|
|
// https://github.com/bitcoin/bitcoin/pull/9371 and the prior sync
|
|
// implementation before that was to mark these transactions
|
|
// unconfirmed rather than conflicted.
|
|
//
|
|
// Nothing described above should be seen as an unchangeable requirement
|
|
// when improving this code in the future. The wallet's heuristics for
|
|
// distinguishing between conflicted and unconfirmed transactions are
|
|
// imperfect, and could be improved in general, see
|
|
// https://github.com/bitcoin-core/bitcoin-devwiki/wiki/Wallet-Transaction-Conflict-Tracking
|
|
LOCK(cs_wallet);
|
|
WalletBatch batch(GetDatabase());
|
|
SyncTransaction(tx, {CWalletTx::Status::UNCONFIRMED, /* block height */ 0, /* block hash */ {}, /* index */ 0}, batch);
|
|
}
|
|
}
|
|
|
|
void CWallet::blockConnected(const CBlock& block, int height)
|
|
{
|
|
const uint256& block_hash = block.GetHash();
|
|
LOCK(cs_wallet);
|
|
|
|
m_last_block_processed_height = height;
|
|
m_last_block_processed = block_hash;
|
|
WalletBatch batch(GetDatabase());
|
|
for (size_t index = 0; index < block.vtx.size(); index++) {
|
|
SyncTransaction(block.vtx[index], {CWalletTx::Status::CONFIRMED, height, block_hash, (int)index}, batch);
|
|
transactionRemovedFromMempool(block.vtx[index], MemPoolRemovalReason::BLOCK, 0 /* mempool_sequence */);
|
|
}
|
|
|
|
// reset cache to make sure no longer immature coins are included
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
}
|
|
|
|
void CWallet::blockDisconnected(const CBlock& block, int height)
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
// At block disconnection, this will change an abandoned transaction to
|
|
// be unconfirmed, whether or not the transaction is added back to the mempool.
|
|
// User may have to call abandontransaction again. It may be addressed in the
|
|
// future with a stickier abandoned state or even removing abandontransaction call.
|
|
m_last_block_processed_height = height - 1;
|
|
m_last_block_processed = block.hashPrevBlock;
|
|
WalletBatch batch(GetDatabase());
|
|
for (const CTransactionRef& ptx : block.vtx) {
|
|
SyncTransaction(ptx, {CWalletTx::Status::UNCONFIRMED, /* block height */ 0, /* block hash */ {}, /* index */ 0}, batch);
|
|
}
|
|
|
|
// reset cache to make sure no longer mature coins are excluded
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
}
|
|
|
|
void CWallet::updatedBlockTip()
|
|
{
|
|
m_best_block_time = GetTime();
|
|
}
|
|
|
|
void CWallet::BlockUntilSyncedToCurrentChain() const {
|
|
AssertLockNotHeld(cs_wallet);
|
|
// Skip the queue-draining stuff if we know we're caught up with
|
|
// chain().Tip(), otherwise put a callback in the validation interface queue and wait
|
|
// for the queue to drain enough to execute it (indicating we are caught up
|
|
// at least with the time we entered this function).
|
|
uint256 last_block_hash = WITH_LOCK(cs_wallet, return m_last_block_processed);
|
|
chain().waitForNotificationsIfTipChanged(last_block_hash);
|
|
}
|
|
|
|
|
|
isminetype CWallet::IsMine(const CTxIn &txin) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
std::map<uint256, CWalletTx>::const_iterator mi = mapWallet.find(txin.prevout.hash);
|
|
if (mi != mapWallet.end())
|
|
{
|
|
const CWalletTx& prev = (*mi).second;
|
|
if (txin.prevout.n < prev.tx->vout.size())
|
|
return IsMine(prev.tx->vout[txin.prevout.n]);
|
|
}
|
|
return ISMINE_NO;
|
|
}
|
|
|
|
// Note that this function doesn't distinguish between a 0-valued input,
|
|
// and a not-"is mine" (according to the filter) input.
|
|
CAmount CWallet::GetDebit(const CTxIn &txin, const isminefilter& filter) const
|
|
{
|
|
{
|
|
LOCK(cs_wallet);
|
|
std::map<uint256, CWalletTx>::const_iterator mi = mapWallet.find(txin.prevout.hash);
|
|
if (mi != mapWallet.end())
|
|
{
|
|
const CWalletTx& prev = (*mi).second;
|
|
if (txin.prevout.n < prev.tx->vout.size())
|
|
if (IsMine(prev.tx->vout[txin.prevout.n]) & filter)
|
|
return prev.tx->vout[txin.prevout.n].nValue;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
// Recursively determine the rounds of a given input (How deep is the CoinJoin chain for a given input)
|
|
int CWallet::GetRealOutpointCoinJoinRounds(const COutPoint& outpoint, int nRounds) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
const int nRoundsMax = MAX_COINJOIN_ROUNDS + CCoinJoinClientOptions::GetRandomRounds();
|
|
|
|
if (nRounds >= nRoundsMax) {
|
|
// there can only be nRoundsMax rounds max
|
|
return nRoundsMax - 1;
|
|
}
|
|
|
|
auto pair = mapOutpointRoundsCache.emplace(outpoint, -10);
|
|
auto nRoundsRef = &pair.first->second;
|
|
if (!pair.second) {
|
|
// we already processed it, just return what we have
|
|
return *nRoundsRef;
|
|
}
|
|
|
|
// TODO wtx should refer to a CWalletTx object, not a pointer, based on surrounding code
|
|
const CWalletTx* wtx = GetWalletTx(outpoint.hash);
|
|
|
|
if (wtx == nullptr || wtx->tx == nullptr) {
|
|
// no such tx in this wallet
|
|
*nRoundsRef = -1;
|
|
WalletCJLogPrint((*this), "%s FAILED %-70s %3d\n", __func__, outpoint.ToStringShort(), -1);
|
|
return *nRoundsRef;
|
|
}
|
|
|
|
// bounds check
|
|
if (outpoint.n >= wtx->tx->vout.size()) {
|
|
// should never actually hit this
|
|
*nRoundsRef = -4;
|
|
WalletCJLogPrint((*this), "%s FAILED %-70s %3d\n", __func__, outpoint.ToStringShort(), -4);
|
|
return *nRoundsRef;
|
|
}
|
|
|
|
auto txOutRef = &wtx->tx->vout[outpoint.n];
|
|
|
|
if (CoinJoin::IsCollateralAmount(txOutRef->nValue)) {
|
|
*nRoundsRef = -3;
|
|
WalletCJLogPrint((*this), "%s UPDATED %-70s %3d\n", __func__, outpoint.ToStringShort(), *nRoundsRef);
|
|
return *nRoundsRef;
|
|
}
|
|
|
|
// make sure the final output is non-denominate
|
|
if (!CoinJoin::IsDenominatedAmount(txOutRef->nValue)) { //NOT DENOM
|
|
*nRoundsRef = -2;
|
|
WalletCJLogPrint((*this), "%s UPDATED %-70s %3d\n", __func__, outpoint.ToStringShort(), *nRoundsRef);
|
|
return *nRoundsRef;
|
|
}
|
|
|
|
for (const auto& out : wtx->tx->vout) {
|
|
if (!CoinJoin::IsDenominatedAmount(out.nValue)) {
|
|
// this one is denominated but there is another non-denominated output found in the same tx
|
|
*nRoundsRef = 0;
|
|
WalletCJLogPrint((*this), "%s UPDATED %-70s %3d\n", __func__, outpoint.ToStringShort(), *nRoundsRef);
|
|
return *nRoundsRef;
|
|
}
|
|
}
|
|
|
|
// make sure we spent all of it with 0 fee, reset to 0 rounds otherwise
|
|
if (wtx->GetDebit(ISMINE_SPENDABLE) != wtx->GetCredit(ISMINE_SPENDABLE)) {
|
|
*nRoundsRef = 0;
|
|
WalletCJLogPrint((*this), "%s UPDATED %-70s %3d\n", __func__, outpoint.ToStringShort(), *nRoundsRef);
|
|
return *nRoundsRef;
|
|
}
|
|
|
|
int nShortest = -10; // an initial value, should be no way to get this by calculations
|
|
bool fDenomFound = false;
|
|
// only denoms here so let's look up
|
|
for (const auto& txinNext : wtx->tx->vin) {
|
|
if (IsMine(txinNext)) {
|
|
int n = GetRealOutpointCoinJoinRounds(txinNext.prevout, nRounds + 1);
|
|
// denom found, find the shortest chain or initially assign nShortest with the first found value
|
|
if(n >= 0 && (n < nShortest || nShortest == -10)) {
|
|
nShortest = n;
|
|
fDenomFound = true;
|
|
}
|
|
}
|
|
}
|
|
*nRoundsRef = fDenomFound
|
|
? (nShortest >= nRoundsMax - 1 ? nRoundsMax : nShortest + 1) // good, we a +1 to the shortest one but only nRoundsMax rounds max allowed
|
|
: 0; // too bad, we are the fist one in that chain
|
|
WalletCJLogPrint((*this), "%s UPDATED %-70s %3d\n", __func__, outpoint.ToStringShort(), *nRoundsRef);
|
|
return *nRoundsRef;
|
|
}
|
|
|
|
// respect current settings
|
|
int CWallet::GetCappedOutpointCoinJoinRounds(const COutPoint& outpoint) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
int realCoinJoinRounds = GetRealOutpointCoinJoinRounds(outpoint);
|
|
return realCoinJoinRounds > CCoinJoinClientOptions::GetRounds() ? CCoinJoinClientOptions::GetRounds() : realCoinJoinRounds;
|
|
}
|
|
|
|
void CWallet::ClearCoinJoinRoundsCache()
|
|
{
|
|
LOCK(cs_wallet);
|
|
mapOutpointRoundsCache.clear();
|
|
MarkDirty();
|
|
// Notify UI
|
|
NotifyTransactionChanged(uint256::ONE, CT_UPDATED);
|
|
}
|
|
|
|
bool CWallet::IsDenominated(const COutPoint& outpoint) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
const auto it = mapWallet.find(outpoint.hash);
|
|
if (it == mapWallet.end()) {
|
|
return false;
|
|
}
|
|
|
|
if (outpoint.n >= it->second.tx->vout.size()) {
|
|
return false;
|
|
}
|
|
|
|
return CoinJoin::IsDenominatedAmount(it->second.tx->vout[outpoint.n].nValue);
|
|
}
|
|
|
|
bool CWallet::IsFullyMixed(const COutPoint& outpoint) const
|
|
{
|
|
int nRounds = GetRealOutpointCoinJoinRounds(outpoint);
|
|
// Mix again if we don't have N rounds yet
|
|
if (nRounds < CCoinJoinClientOptions::GetRounds()) return false;
|
|
|
|
// Try to mix a "random" number of rounds more than minimum.
|
|
// If we have already mixed N + MaxOffset rounds, don't mix again.
|
|
// Otherwise, we should mix again 50% of the time, this results in an exponential decay
|
|
// N rounds 50% N+1 25% N+2 12.5%... until we reach N + GetRandomRounds() rounds where we stop.
|
|
if (nRounds < CCoinJoinClientOptions::GetRounds() + CCoinJoinClientOptions::GetRandomRounds()) {
|
|
CDataStream ss(SER_GETHASH, PROTOCOL_VERSION);
|
|
ss << outpoint << nCoinJoinSalt;
|
|
uint256 nHash;
|
|
CSHA256().Write((const unsigned char*)ss.data(), ss.size()).Finalize(nHash.begin());
|
|
if (ReadLE64(nHash.begin()) % 2 == 0) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
isminetype CWallet::IsMine(const CTxOut& txout) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
return IsMine(txout.scriptPubKey);
|
|
}
|
|
|
|
isminetype CWallet::IsMine(const CTxDestination& dest) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
return IsMine(GetScriptForDestination(dest));
|
|
}
|
|
|
|
isminetype CWallet::IsMine(const CScript& script) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
isminetype result = ISMINE_NO;
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
result = std::max(result, spk_man_pair.second->IsMine(script));
|
|
}
|
|
return result;
|
|
}
|
|
|
|
CAmount CWallet::GetCredit(const CTxOut& txout, const isminefilter& filter) const
|
|
{
|
|
if (!MoneyRange(txout.nValue))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
LOCK(cs_wallet);
|
|
return ((IsMine(txout) & filter) ? txout.nValue : 0);
|
|
}
|
|
|
|
bool CWallet::IsChange(const CTxOut& txout) const
|
|
{
|
|
return IsChange(txout.scriptPubKey);
|
|
}
|
|
|
|
bool CWallet::IsChange(const CScript& script) const
|
|
{
|
|
// TODO: fix handling of 'change' outputs. The assumption is that any
|
|
// payment to a script that is ours, but is not in the address book
|
|
// is change. That assumption is likely to break when we implement multisignature
|
|
// wallets that return change back into a multi-signature-protected address;
|
|
// a better way of identifying which outputs are 'the send' and which are
|
|
// 'the change' will need to be implemented (maybe extend CWalletTx to remember
|
|
// which output, if any, was change).
|
|
AssertLockHeld(cs_wallet);
|
|
if (IsMine(script))
|
|
{
|
|
CTxDestination address;
|
|
if (!ExtractDestination(script, address))
|
|
return true;
|
|
if (!FindAddressBookEntry(address)) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
CAmount CWallet::GetChange(const CTxOut& txout) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
if (!MoneyRange(txout.nValue))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
return (IsChange(txout) ? txout.nValue : 0);
|
|
}
|
|
|
|
bool CWallet::IsMine(const CTransaction& tx) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
for (const CTxOut& txout : tx.vout)
|
|
if (IsMine(txout))
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
bool CWallet::IsFromMe(const CTransaction& tx) const
|
|
{
|
|
return (GetDebit(tx, ISMINE_ALL) > 0);
|
|
}
|
|
|
|
CAmount CWallet::GetDebit(const CTransaction& tx, const isminefilter& filter) const
|
|
{
|
|
CAmount nDebit = 0;
|
|
for (const CTxIn& txin : tx.vin)
|
|
{
|
|
nDebit += GetDebit(txin, filter);
|
|
if (!MoneyRange(nDebit))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
}
|
|
return nDebit;
|
|
}
|
|
|
|
bool CWallet::IsAllFromMe(const CTransaction& tx, const isminefilter& filter) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
for (const CTxIn& txin : tx.vin)
|
|
{
|
|
auto mi = mapWallet.find(txin.prevout.hash);
|
|
if (mi == mapWallet.end())
|
|
return false; // any unknown inputs can't be from us
|
|
|
|
const CWalletTx& prev = (*mi).second;
|
|
|
|
if (txin.prevout.n >= prev.tx->vout.size())
|
|
return false; // invalid input!
|
|
|
|
if (!(IsMine(prev.tx->vout[txin.prevout.n]) & filter))
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
CAmount CWallet::GetCredit(const CTransaction& tx, const isminefilter& filter) const
|
|
{
|
|
CAmount nCredit = 0;
|
|
for (const CTxOut& txout : tx.vout)
|
|
{
|
|
nCredit += GetCredit(txout, filter);
|
|
if (!MoneyRange(nCredit))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
}
|
|
return nCredit;
|
|
}
|
|
|
|
CAmount CWallet::GetChange(const CTransaction& tx) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
CAmount nChange = 0;
|
|
for (const CTxOut& txout : tx.vout)
|
|
{
|
|
nChange += GetChange(txout);
|
|
if (!MoneyRange(nChange))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
}
|
|
return nChange;
|
|
}
|
|
|
|
bool CWallet::IsHDEnabled() const
|
|
{
|
|
// All Active ScriptPubKeyMans must be HD for this to be true
|
|
bool result = false;
|
|
for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
|
|
if (!spk_man->IsHDEnabled()) return false;
|
|
result = true;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
bool CWallet::CanGetAddresses(bool internal) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
if (m_spk_managers.empty()) return false;
|
|
auto spk_man = GetScriptPubKeyMan(internal);
|
|
if (spk_man && spk_man->CanGetAddresses(internal)) {
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void CWallet::SetWalletFlag(uint64_t flags)
|
|
{
|
|
LOCK(cs_wallet);
|
|
m_wallet_flags |= flags;
|
|
if (!WalletBatch(GetDatabase()).WriteWalletFlags(m_wallet_flags))
|
|
throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
|
|
}
|
|
|
|
void CWallet::UnsetWalletFlag(uint64_t flag)
|
|
{
|
|
LOCK(cs_wallet);
|
|
WalletBatch batch(GetDatabase());
|
|
UnsetWalletFlagWithDB(batch, flag);
|
|
}
|
|
|
|
void CWallet::UnsetWalletFlagWithDB(WalletBatch& batch, uint64_t flag)
|
|
{
|
|
LOCK(cs_wallet);
|
|
m_wallet_flags &= ~flag;
|
|
if (!batch.WriteWalletFlags(m_wallet_flags))
|
|
throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
|
|
}
|
|
|
|
void CWallet::UnsetBlankWalletFlag(WalletBatch& batch)
|
|
{
|
|
UnsetWalletFlagWithDB(batch, WALLET_FLAG_BLANK_WALLET);
|
|
}
|
|
|
|
void CWallet::NewKeyPoolCallback()
|
|
{
|
|
// Note: GetClient(*this) can return nullptr when this wallet is in the middle of its creation.
|
|
// Skipping stopMixing() is fine in this case.
|
|
if (std::unique_ptr<interfaces::CoinJoin::Client> coinjoin_client = coinjoin_available() ? coinjoin_loader().GetClient(GetName()) : nullptr) {
|
|
coinjoin_client->stopMixing();
|
|
}
|
|
nKeysLeftSinceAutoBackup = 0;
|
|
}
|
|
|
|
void CWallet::KeepDestinationCallback(bool erased)
|
|
{
|
|
if (erased) --nKeysLeftSinceAutoBackup;
|
|
if (!nWalletBackups) nKeysLeftSinceAutoBackup = 0;
|
|
}
|
|
|
|
bool CWallet::IsWalletFlagSet(uint64_t flag) const
|
|
{
|
|
return (m_wallet_flags & flag);
|
|
}
|
|
|
|
bool CWallet::LoadWalletFlags(uint64_t flags)
|
|
{
|
|
LOCK(cs_wallet);
|
|
if (((flags & KNOWN_WALLET_FLAGS) >> 32) ^ (flags >> 32)) {
|
|
// contains unknown non-tolerable wallet flags
|
|
return false;
|
|
}
|
|
m_wallet_flags = flags;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::AddWalletFlags(uint64_t flags)
|
|
{
|
|
LOCK(cs_wallet);
|
|
// We should never be writing unknown non-tolerable wallet flags
|
|
assert(((flags & KNOWN_WALLET_FLAGS) >> 32) == (flags >> 32));
|
|
if (!WalletBatch(GetDatabase()).WriteWalletFlags(flags)) {
|
|
throw std::runtime_error(std::string(__func__) + ": writing wallet flags failed");
|
|
}
|
|
|
|
return LoadWalletFlags(flags);
|
|
}
|
|
|
|
int64_t CWalletTx::GetTxTime() const
|
|
{
|
|
int64_t n = nTimeSmart;
|
|
return n ? n : nTimeReceived;
|
|
}
|
|
|
|
// Helper for producing a max-sized low-S low-R signature (eg 71 bytes)
|
|
// or a max-sized low-S signature (e.g. 72 bytes) if use_max_sig is true
|
|
bool CWallet::DummySignInput(CTxIn &tx_in, const CTxOut &txout, bool use_max_sig) const
|
|
{
|
|
// Fill in dummy signatures for fee calculation.
|
|
const CScript& scriptPubKey = txout.scriptPubKey;
|
|
SignatureData sigdata;
|
|
|
|
std::unique_ptr<SigningProvider> provider = GetSolvingProvider(scriptPubKey);
|
|
if (!provider) {
|
|
// We don't know about this scriptpbuKey;
|
|
return false;
|
|
}
|
|
|
|
if (!ProduceSignature(*provider, use_max_sig ? DUMMY_MAXIMUM_SIGNATURE_CREATOR : DUMMY_SIGNATURE_CREATOR, scriptPubKey, sigdata)) {
|
|
return false;
|
|
}
|
|
UpdateInput(tx_in, sigdata);
|
|
return true;
|
|
}
|
|
|
|
// Helper for producing a bunch of max-sized low-S low-R signatures (eg 71 bytes)
|
|
bool CWallet::DummySignTx(CMutableTransaction &txNew, const std::vector<CTxOut> &txouts, bool use_max_sig) const
|
|
{
|
|
// Fill in dummy signatures for fee calculation.
|
|
int nIn = 0;
|
|
for (const auto& txout : txouts)
|
|
{
|
|
if (!DummySignInput(txNew.vin[nIn], txout, use_max_sig)) {
|
|
return false;
|
|
}
|
|
|
|
nIn++;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::ImportScripts(const std::set<CScript> scripts, int64_t timestamp)
|
|
{
|
|
auto spk_man = GetLegacyScriptPubKeyMan();
|
|
if (!spk_man) {
|
|
return false;
|
|
}
|
|
LOCK(spk_man->cs_KeyStore);
|
|
return spk_man->ImportScripts(scripts, timestamp);
|
|
}
|
|
|
|
bool CWallet::ImportPrivKeys(const std::map<CKeyID, CKey>& privkey_map, const int64_t timestamp)
|
|
{
|
|
auto spk_man = GetLegacyScriptPubKeyMan();
|
|
if (!spk_man) {
|
|
return false;
|
|
}
|
|
LOCK(spk_man->cs_KeyStore);
|
|
return spk_man->ImportPrivKeys(privkey_map, timestamp);
|
|
}
|
|
|
|
bool CWallet::ImportPubKeys(const std::vector<CKeyID>& ordered_pubkeys, const std::map<CKeyID, CPubKey>& pubkey_map, const std::map<CKeyID, std::pair<CPubKey, KeyOriginInfo>>& key_origins, const bool add_keypool, const bool internal, const int64_t timestamp)
|
|
{
|
|
auto spk_man = GetLegacyScriptPubKeyMan();
|
|
if (!spk_man) {
|
|
return false;
|
|
}
|
|
LOCK(spk_man->cs_KeyStore);
|
|
return spk_man->ImportPubKeys(ordered_pubkeys, pubkey_map, key_origins, add_keypool, internal, timestamp);
|
|
}
|
|
|
|
bool CWallet::ImportScriptPubKeys(const std::string& label, const std::set<CScript>& script_pub_keys, const bool have_solving_data, const bool apply_label, const int64_t timestamp)
|
|
{
|
|
auto spk_man = GetLegacyScriptPubKeyMan();
|
|
if (!spk_man) {
|
|
return false;
|
|
}
|
|
LOCK(spk_man->cs_KeyStore);
|
|
if (!spk_man->ImportScriptPubKeys(script_pub_keys, have_solving_data, timestamp)) {
|
|
return false;
|
|
}
|
|
if (apply_label) {
|
|
WalletBatch batch(GetDatabase());
|
|
for (const CScript& script : script_pub_keys) {
|
|
CTxDestination dest;
|
|
ExtractDestination(script, dest);
|
|
if (IsValidDestination(dest)) {
|
|
SetAddressBookWithDB(batch, dest, label, "receive");
|
|
}
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
int64_t CalculateMaximumSignedTxSize(const CTransaction &tx, const CWallet *wallet, bool use_max_sig)
|
|
{
|
|
std::vector<CTxOut> txouts;
|
|
for (const CTxIn& input : tx.vin) {
|
|
const auto mi = wallet->mapWallet.find(input.prevout.hash);
|
|
// Can not estimate size without knowing the input details
|
|
if (mi == wallet->mapWallet.end()) {
|
|
return -1;
|
|
}
|
|
assert(input.prevout.n < mi->second.tx->vout.size());
|
|
txouts.emplace_back(mi->second.tx->vout[input.prevout.n]);
|
|
}
|
|
return CalculateMaximumSignedTxSize(tx, wallet, txouts, use_max_sig);
|
|
}
|
|
|
|
// txouts needs to be in the order of tx.vin
|
|
int64_t CalculateMaximumSignedTxSize(const CTransaction &tx, const CWallet *wallet, const std::vector<CTxOut>& txouts, bool use_max_sig)
|
|
{
|
|
CMutableTransaction txNew(tx);
|
|
if (!wallet->DummySignTx(txNew, txouts, use_max_sig)) {
|
|
return -1;
|
|
}
|
|
return ::GetSerializeSize(txNew, PROTOCOL_VERSION);
|
|
}
|
|
|
|
int CalculateMaximumSignedInputSize(const CTxOut& txout, const CWallet* wallet, bool use_max_sig)
|
|
{
|
|
CMutableTransaction txn;
|
|
txn.vin.push_back(CTxIn(COutPoint()));
|
|
if (!wallet->DummySignInput(txn.vin[0], txout, use_max_sig)) {
|
|
return -1;
|
|
}
|
|
return ::GetSerializeSize(txn.vin[0], PROTOCOL_VERSION);
|
|
}
|
|
|
|
void CWalletTx::GetAmounts(std::list<COutputEntry>& listReceived,
|
|
std::list<COutputEntry>& listSent, CAmount& nFee, const isminefilter& filter) const
|
|
{
|
|
nFee = 0;
|
|
listReceived.clear();
|
|
listSent.clear();
|
|
|
|
// Compute fee:
|
|
CAmount nDebit = GetDebit(filter);
|
|
if (nDebit > 0) // debit>0 means we signed/sent this transaction
|
|
{
|
|
CAmount nValueOut = tx->GetValueOut();
|
|
nFee = nDebit - nValueOut;
|
|
}
|
|
|
|
LOCK(pwallet->cs_wallet);
|
|
// Sent/received.
|
|
for (unsigned int i = 0; i < tx->vout.size(); ++i)
|
|
{
|
|
const CTxOut& txout = tx->vout[i];
|
|
isminetype fIsMine = pwallet->IsMine(txout);
|
|
// Only need to handle txouts if AT LEAST one of these is true:
|
|
// 1) they debit from us (sent)
|
|
// 2) the output is to us (received)
|
|
if (nDebit > 0)
|
|
{
|
|
// Don't report 'change' txouts
|
|
if (pwallet->IsChange(txout))
|
|
continue;
|
|
}
|
|
else if (!(fIsMine & filter))
|
|
continue;
|
|
|
|
// In either case, we need to get the destination address
|
|
CTxDestination address;
|
|
|
|
if (!ExtractDestination(txout.scriptPubKey, address) && !txout.scriptPubKey.IsUnspendable())
|
|
{
|
|
pwallet->WalletLogPrintf("CWalletTx::GetAmounts: Unknown transaction type found, txid %s\n",
|
|
this->GetHash().ToString());
|
|
address = CNoDestination();
|
|
}
|
|
|
|
COutputEntry output = {address, txout.nValue, (int)i};
|
|
|
|
// If we are debited by the transaction, add the output as a "sent" entry
|
|
if (nDebit > 0)
|
|
listSent.push_back(output);
|
|
|
|
// If we are receiving the output, add it as a "received" entry
|
|
if (fIsMine & filter)
|
|
listReceived.push_back(output);
|
|
}
|
|
|
|
}
|
|
|
|
/**
|
|
* Scan active chain for relevant transactions after importing keys. This should
|
|
* be called whenever new keys are added to the wallet, with the oldest key
|
|
* creation time.
|
|
*
|
|
* @return Earliest timestamp that could be successfully scanned from. Timestamp
|
|
* returned will be higher than startTime if relevant blocks could not be read.
|
|
*/
|
|
int64_t CWallet::RescanFromTime(int64_t startTime, const WalletRescanReserver& reserver, bool update)
|
|
{
|
|
// Find starting block. May be null if nCreateTime is greater than the
|
|
// highest blockchain timestamp, in which case there is nothing that needs
|
|
// to be scanned.
|
|
int start_height = 0;
|
|
uint256 start_block;
|
|
bool start = chain().findFirstBlockWithTimeAndHeight(startTime - TIMESTAMP_WINDOW, 0, FoundBlock().hash(start_block).height(start_height));
|
|
WalletLogPrintf("%s: Rescanning last %i blocks\n", __func__, start ? WITH_LOCK(cs_wallet, return GetLastBlockHeight()) - start_height + 1 : 0);
|
|
|
|
if (start) {
|
|
// TODO: this should take into account failure by ScanResult::USER_ABORT
|
|
ScanResult result = ScanForWalletTransactions(start_block, start_height, {} /* max_height */, reserver, update);
|
|
if (result.status == ScanResult::FAILURE) {
|
|
int64_t time_max;
|
|
CHECK_NONFATAL(chain().findBlock(result.last_failed_block, FoundBlock().maxTime(time_max)));
|
|
return time_max + TIMESTAMP_WINDOW + 1;
|
|
}
|
|
}
|
|
return startTime;
|
|
}
|
|
|
|
/**
|
|
* Scan the block chain (starting in start_block) for transactions
|
|
* from or to us. If fUpdate is true, found transactions that already
|
|
* exist in the wallet will be updated.
|
|
*
|
|
* @param[in] start_block Scan starting block. If block is not on the active
|
|
* chain, the scan will return SUCCESS immediately.
|
|
* @param[in] start_height Height of start_block
|
|
* @param[in] max_height Optional max scanning height. If unset there is
|
|
* no maximum and scanning can continue to the tip
|
|
*
|
|
* @return ScanResult returning scan information and indicating success or
|
|
* failure. Return status will be set to SUCCESS if scan was
|
|
* successful. FAILURE if a complete rescan was not possible (due to
|
|
* pruning or corruption). USER_ABORT if the rescan was aborted before
|
|
* it could complete.
|
|
*
|
|
* @pre Caller needs to make sure start_block (and the optional stop_block) are on
|
|
* the main chain after to the addition of any new keys you want to detect
|
|
* transactions for.
|
|
*/
|
|
CWallet::ScanResult CWallet::ScanForWalletTransactions(const uint256& start_block, int start_height, std::optional<int> max_height, const WalletRescanReserver& reserver, bool fUpdate)
|
|
{
|
|
using Clock = std::chrono::steady_clock;
|
|
constexpr auto LOG_INTERVAL{60s};
|
|
auto current_time{Clock::now()};
|
|
auto start_time{Clock::now()};
|
|
|
|
assert(reserver.isReserved());
|
|
|
|
uint256 block_hash = start_block;
|
|
ScanResult result;
|
|
|
|
WalletLogPrintf("Rescan started from block %s...\n", start_block.ToString());
|
|
|
|
ShowProgress(strprintf("%s " + _("Rescanning…").translated, GetDisplayName()), 0); // show rescan progress in GUI as dialog or on splashscreen, if -rescan on startup
|
|
uint256 tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
|
|
uint256 end_hash = tip_hash;
|
|
if (max_height) chain().findAncestorByHeight(tip_hash, *max_height, FoundBlock().hash(end_hash));
|
|
double progress_begin = chain().guessVerificationProgress(block_hash);
|
|
double progress_end = chain().guessVerificationProgress(end_hash);
|
|
double progress_current = progress_begin;
|
|
int block_height = start_height;
|
|
WalletBatch batch(GetDatabase());
|
|
while (!fAbortRescan && !chain().shutdownRequested()) {
|
|
if (progress_end - progress_begin > 0.0) {
|
|
m_scanning_progress = (progress_current - progress_begin) / (progress_end - progress_begin);
|
|
} else { // avoid divide-by-zero for single block scan range (i.e. start and stop hashes are equal)
|
|
m_scanning_progress = 0;
|
|
}
|
|
if (block_height % 100 == 0 && progress_end - progress_begin > 0.0) {
|
|
ShowProgress(strprintf("%s " + _("Rescanning…").translated, GetDisplayName()), std::max(1, std::min(99, (int)(m_scanning_progress * 100))));
|
|
}
|
|
if (Clock::now() >= current_time + LOG_INTERVAL) {
|
|
current_time = Clock::now();
|
|
WalletLogPrintf("Still rescanning. At block %d. Progress=%f\n", block_height, progress_current);
|
|
}
|
|
|
|
// Read block data
|
|
CBlock block;
|
|
chain().findBlock(block_hash, FoundBlock().data(block));
|
|
|
|
// Find next block separately from reading data above, because reading
|
|
// is slow and there might be a reorg while it is read.
|
|
bool block_still_active = false;
|
|
bool next_block = false;
|
|
uint256 next_block_hash;
|
|
chain().findBlock(block_hash, FoundBlock().inActiveChain(block_still_active).nextBlock(FoundBlock().inActiveChain(next_block).hash(next_block_hash)));
|
|
|
|
if (!block.IsNull()) {
|
|
LOCK(cs_wallet);
|
|
if (!block_still_active) {
|
|
// Abort scan if current block is no longer active, to prevent
|
|
// marking transactions as coming from the wrong block.
|
|
result.last_failed_block = block_hash;
|
|
result.status = ScanResult::FAILURE;
|
|
break;
|
|
}
|
|
for (size_t posInBlock = 0; posInBlock < block.vtx.size(); ++posInBlock) {
|
|
SyncTransaction(block.vtx[posInBlock], {CWalletTx::Status::CONFIRMED, block_height, block_hash, (int)posInBlock}, batch, fUpdate);
|
|
}
|
|
// scan succeeded, record block as most recent successfully scanned
|
|
result.last_scanned_block = block_hash;
|
|
result.last_scanned_height = block_height;
|
|
} else {
|
|
// could not scan block, keep scanning but record this block as the most recent failure
|
|
result.last_failed_block = block_hash;
|
|
result.status = ScanResult::FAILURE;
|
|
}
|
|
if (max_height && block_height >= *max_height) {
|
|
break;
|
|
}
|
|
{
|
|
if (!next_block) {
|
|
// break successfully when rescan has reached the tip, or
|
|
// previous block is no longer on the chain due to a reorg
|
|
break;
|
|
}
|
|
|
|
// increment block and verification progress
|
|
block_hash = next_block_hash;
|
|
++block_height;
|
|
progress_current = chain().guessVerificationProgress(block_hash);
|
|
|
|
// handle updated tip hash
|
|
const uint256 prev_tip_hash = tip_hash;
|
|
tip_hash = WITH_LOCK(cs_wallet, return GetLastBlockHash());
|
|
if (!max_height && prev_tip_hash != tip_hash) {
|
|
// in case the tip has changed, update progress max
|
|
progress_end = chain().guessVerificationProgress(tip_hash);
|
|
}
|
|
}
|
|
}
|
|
ShowProgress(strprintf("%s " + _("Rescanning…").translated, GetDisplayName()), 100); // hide progress dialog in GUI
|
|
if (block_height && fAbortRescan) {
|
|
WalletLogPrintf("Rescan aborted at block %d. Progress=%f\n", block_height, progress_current);
|
|
result.status = ScanResult::USER_ABORT;
|
|
} else if (block_height && chain().shutdownRequested()) {
|
|
WalletLogPrintf("Rescan interrupted by shutdown request at block %d. Progress=%f\n", block_height, progress_current);
|
|
result.status = ScanResult::USER_ABORT;
|
|
} else {
|
|
auto duration_milliseconds = std::chrono::duration_cast<std::chrono::milliseconds>(Clock::now() - start_time);
|
|
WalletLogPrintf("Rescan completed in %15dms\n", duration_milliseconds.count());
|
|
}
|
|
return result;
|
|
}
|
|
|
|
void CWallet::ReacceptWalletTransactions()
|
|
{
|
|
// If transactions aren't being broadcasted, don't let them into local mempool either
|
|
if (!fBroadcastTransactions)
|
|
return;
|
|
std::map<int64_t, CWalletTx*> mapSorted;
|
|
|
|
// Sort pending wallet transactions based on their initial wallet insertion order
|
|
for (std::pair<const uint256, CWalletTx>& item : mapWallet) {
|
|
const uint256& wtxid = item.first;
|
|
CWalletTx& wtx = item.second;
|
|
assert(wtx.GetHash() == wtxid);
|
|
|
|
int nDepth = wtx.GetDepthInMainChain();
|
|
|
|
if (!wtx.IsCoinBase() && (nDepth == 0 && !wtx.IsLockedByInstantSend() && !wtx.isAbandoned())) {
|
|
mapSorted.insert(std::make_pair(wtx.nOrderPos, &wtx));
|
|
}
|
|
}
|
|
|
|
// Try to add wallet transactions to memory pool
|
|
for (const std::pair<const int64_t, CWalletTx*>& item : mapSorted) {
|
|
CWalletTx& wtx = *(item.second);
|
|
bilingual_str unused_err_string;
|
|
wtx.SubmitMemoryPoolAndRelay(unused_err_string, false);
|
|
}
|
|
}
|
|
|
|
bool CWalletTx::CanBeResent() const
|
|
{
|
|
return
|
|
// Can't relay if wallet is not broadcasting
|
|
pwallet->GetBroadcastTransactions() &&
|
|
// Don't relay abandoned transactions
|
|
!isAbandoned() &&
|
|
// Don't try to submit coinbase transactions. These would fail anyway but would
|
|
// cause log spam.
|
|
!IsCoinBase() &&
|
|
// Don't try to submit conflicted or confirmed transactions.
|
|
GetDepthInMainChain() == 0 &&
|
|
// Don't try to submit transactions locked via InstantSend.
|
|
!IsLockedByInstantSend();
|
|
}
|
|
|
|
bool CWalletTx::SubmitMemoryPoolAndRelay(bilingual_str& err_string, bool relay)
|
|
{
|
|
if (!CanBeResent()) return false;
|
|
|
|
// Submit transaction to mempool for relay
|
|
pwallet->WalletLogPrintf("Submitting wtx %s to mempool for relay\n", GetHash().ToString());
|
|
// We must set fInMempool here - while it will be re-set to true by the
|
|
// entered-mempool callback, if we did not there would be a race where a
|
|
// user could call sendmoney in a loop and hit spurious out of funds errors
|
|
// because we think that this newly generated transaction's change is
|
|
// unavailable as we're not yet aware that it is in the mempool.
|
|
//
|
|
// Irrespective of the failure reason, un-marking fInMempool
|
|
// out-of-order is incorrect - it should be unmarked when
|
|
// TransactionRemovedFromMempool fires.
|
|
bool ret = pwallet->chain().broadcastTransaction(tx, pwallet->m_default_max_tx_fee, relay, err_string);
|
|
fInMempool |= ret;
|
|
return ret;
|
|
}
|
|
|
|
std::set<uint256> CWalletTx::GetConflicts() const
|
|
{
|
|
std::set<uint256> result;
|
|
if (pwallet != nullptr)
|
|
{
|
|
AssertLockHeld(pwallet->cs_wallet);
|
|
uint256 myHash = GetHash();
|
|
result = pwallet->GetConflicts(myHash);
|
|
result.erase(myHash);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
CAmount CWalletTx::GetCachableAmount(AmountType type, const isminefilter& filter, bool recalculate) const
|
|
{
|
|
auto& amount = m_amounts[type];
|
|
if (recalculate || !amount.m_cached[filter]) {
|
|
amount.Set(filter, type == DEBIT ? pwallet->GetDebit(*tx, filter) : pwallet->GetCredit(*tx, filter));
|
|
m_is_cache_empty = false;
|
|
}
|
|
return amount.m_value[filter];
|
|
}
|
|
|
|
CAmount CWalletTx::GetDebit(const isminefilter& filter) const
|
|
{
|
|
if (tx->vin.empty())
|
|
return 0;
|
|
|
|
CAmount debit = 0;
|
|
if (filter & ISMINE_SPENDABLE) {
|
|
debit += GetCachableAmount(DEBIT, ISMINE_SPENDABLE);
|
|
}
|
|
if (filter & ISMINE_WATCH_ONLY) {
|
|
debit += GetCachableAmount(DEBIT, ISMINE_WATCH_ONLY);
|
|
}
|
|
return debit;
|
|
}
|
|
|
|
CAmount CWalletTx::GetCredit(const isminefilter& filter) const
|
|
{
|
|
// Must wait until coinbase is safely deep enough in the chain before valuing it
|
|
if (IsImmatureCoinBase())
|
|
return 0;
|
|
|
|
CAmount credit = 0;
|
|
if (filter & ISMINE_SPENDABLE) {
|
|
// GetBalance can assume transactions in mapWallet won't change
|
|
credit += GetCachableAmount(CREDIT, ISMINE_SPENDABLE);
|
|
}
|
|
if (filter & ISMINE_WATCH_ONLY) {
|
|
credit += GetCachableAmount(CREDIT, ISMINE_WATCH_ONLY);
|
|
}
|
|
return credit;
|
|
}
|
|
|
|
CAmount CWalletTx::GetImmatureCredit(bool fUseCache) const
|
|
{
|
|
if (IsImmatureCoinBase() && IsInMainChain()) {
|
|
return GetCachableAmount(IMMATURE_CREDIT, ISMINE_SPENDABLE, !fUseCache);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
CAmount CWalletTx::GetAvailableCredit(bool fUseCache, const isminefilter& filter) const
|
|
{
|
|
if (pwallet == nullptr)
|
|
return 0;
|
|
|
|
// Avoid caching ismine for NO or ALL cases (could remove this check and simplify in the future).
|
|
bool allow_cache = (filter & ISMINE_ALL) && (filter & ISMINE_ALL) != ISMINE_ALL;
|
|
|
|
// Must wait until coinbase is safely deep enough in the chain before valuing it
|
|
if (IsImmatureCoinBase())
|
|
return 0;
|
|
|
|
if (fUseCache && allow_cache && m_amounts[AVAILABLE_CREDIT].m_cached[filter]) {
|
|
return m_amounts[AVAILABLE_CREDIT].m_value[filter];
|
|
}
|
|
|
|
bool allow_used_addresses = (filter & ISMINE_USED) || !pwallet->IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE);
|
|
CAmount nCredit = 0;
|
|
uint256 hashTx = GetHash();
|
|
for (unsigned int i = 0; i < tx->vout.size(); i++)
|
|
{
|
|
if (!pwallet->IsSpent(hashTx, i) && (allow_used_addresses || !pwallet->IsSpentKey(hashTx, i)))
|
|
{
|
|
const CTxOut &txout = tx->vout[i];
|
|
nCredit += pwallet->GetCredit(txout, filter);
|
|
if (!MoneyRange(nCredit))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
}
|
|
}
|
|
|
|
if (allow_cache) {
|
|
m_amounts[AVAILABLE_CREDIT].Set(filter, nCredit);
|
|
m_is_cache_empty = false;
|
|
}
|
|
|
|
return nCredit;
|
|
}
|
|
|
|
CAmount CWalletTx::GetImmatureWatchOnlyCredit(const bool fUseCache) const
|
|
{
|
|
if (IsImmatureCoinBase() && IsInMainChain()) {
|
|
return GetCachableAmount(IMMATURE_CREDIT, ISMINE_WATCH_ONLY, !fUseCache);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
CAmount CWalletTx::GetAnonymizedCredit(const CCoinControl* coinControl) const
|
|
{
|
|
if (!pwallet)
|
|
return 0;
|
|
|
|
AssertLockHeld(pwallet->cs_wallet);
|
|
|
|
// Exclude coinbase and conflicted txes
|
|
if (IsCoinBase() || GetDepthInMainChain() < 0)
|
|
return 0;
|
|
|
|
if (coinControl == nullptr && m_amounts[ANON_CREDIT].m_cached[ISMINE_SPENDABLE])
|
|
return m_amounts[ANON_CREDIT].m_value[ISMINE_SPENDABLE];
|
|
|
|
CAmount nCredit = 0;
|
|
uint256 hashTx = GetHash();
|
|
for (unsigned int i = 0; i < tx->vout.size(); i++)
|
|
{
|
|
const CTxOut &txout = tx->vout[i];
|
|
const COutPoint outpoint = COutPoint(hashTx, i);
|
|
|
|
if (coinControl != nullptr && coinControl->HasSelected() && !coinControl->IsSelected(outpoint)) {
|
|
continue;
|
|
}
|
|
|
|
if (pwallet->IsSpent(hashTx, i) || !CoinJoin::IsDenominatedAmount(txout.nValue)) continue;
|
|
|
|
if (pwallet->IsFullyMixed(outpoint)) {
|
|
nCredit += pwallet->GetCredit(txout, ISMINE_SPENDABLE);
|
|
if (!MoneyRange(nCredit))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
}
|
|
}
|
|
|
|
if (coinControl == nullptr) {
|
|
m_amounts[ANON_CREDIT].Set(ISMINE_SPENDABLE, nCredit);
|
|
}
|
|
|
|
return nCredit;
|
|
}
|
|
|
|
CAmount CWalletTx::GetDenominatedCredit(bool unconfirmed, bool fUseCache) const
|
|
{
|
|
if (pwallet == nullptr)
|
|
return 0;
|
|
|
|
AssertLockHeld(pwallet->cs_wallet);
|
|
|
|
// Must wait until coinbase is safely deep enough in the chain before valuing it
|
|
if (IsCoinBase() && GetBlocksToMaturity() > 0)
|
|
return 0;
|
|
|
|
int nDepth = GetDepthInMainChain();
|
|
if (nDepth < 0) return 0;
|
|
|
|
bool isUnconfirmed = IsTrusted() && nDepth == 0;
|
|
if (unconfirmed != isUnconfirmed) return 0;
|
|
|
|
if (fUseCache) {
|
|
if(unconfirmed && m_amounts[DENOM_UCREDIT].m_cached[ISMINE_SPENDABLE]) {
|
|
return m_amounts[DENOM_UCREDIT].m_value[ISMINE_SPENDABLE];
|
|
} else if (!unconfirmed && m_amounts[DENOM_CREDIT].m_cached[ISMINE_SPENDABLE]) {
|
|
return m_amounts[DENOM_CREDIT].m_value[ISMINE_SPENDABLE];
|
|
}
|
|
}
|
|
|
|
CAmount nCredit = 0;
|
|
uint256 hashTx = GetHash();
|
|
for (unsigned int i = 0; i < tx->vout.size(); i++)
|
|
{
|
|
const CTxOut &txout = tx->vout[i];
|
|
|
|
if (pwallet->IsSpent(hashTx, i) || !CoinJoin::IsDenominatedAmount(txout.nValue)) continue;
|
|
|
|
nCredit += pwallet->GetCredit(txout, ISMINE_SPENDABLE);
|
|
if (!MoneyRange(nCredit))
|
|
throw std::runtime_error(std::string(__func__) + ": value out of range");
|
|
}
|
|
|
|
if (unconfirmed) {
|
|
m_amounts[DENOM_UCREDIT].Set(ISMINE_SPENDABLE, nCredit);
|
|
} else {
|
|
m_amounts[DENOM_CREDIT].Set(ISMINE_SPENDABLE, nCredit);
|
|
}
|
|
return nCredit;
|
|
}
|
|
|
|
CAmount CWalletTx::GetChange() const
|
|
{
|
|
if (fChangeCached)
|
|
return nChangeCached;
|
|
nChangeCached = pwallet->GetChange(*tx);
|
|
fChangeCached = true;
|
|
return nChangeCached;
|
|
}
|
|
|
|
bool CWalletTx::InMempool() const
|
|
{
|
|
return fInMempool;
|
|
}
|
|
|
|
bool CWalletTx::IsTrusted() const
|
|
{
|
|
std::set<uint256> trusted_parents;
|
|
LOCK(pwallet->cs_wallet);
|
|
return pwallet->IsTrusted(*this, trusted_parents);
|
|
}
|
|
|
|
bool CWallet::IsTrusted(const CWalletTx& wtx, std::set<uint256>& trusted_parents) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
// Quick answer in most cases
|
|
if (!chain().checkFinalTx(*wtx.tx)) return false;
|
|
int nDepth = wtx.GetDepthInMainChain();
|
|
if (nDepth >= 1) return true;
|
|
if (nDepth < 0) return false;
|
|
if (wtx.IsLockedByInstantSend()) return true;
|
|
// using wtx's cached debit
|
|
if (!m_spend_zero_conf_change || !wtx.IsFromMe(ISMINE_ALL)) return false;
|
|
|
|
// Don't trust unconfirmed transactions from us unless they are in the mempool.
|
|
if (!wtx.InMempool()) return false;
|
|
|
|
// Trusted if all inputs are from us and are in the mempool:
|
|
for (const CTxIn& txin : wtx.tx->vin)
|
|
{
|
|
// Transactions not sent by us: not trusted
|
|
const CWalletTx* parent = GetWalletTx(txin.prevout.hash);
|
|
if (parent == nullptr) return false;
|
|
const CTxOut& parentOut = parent->tx->vout[txin.prevout.n];
|
|
// Check that this specific input being spent is trusted
|
|
if (IsMine(parentOut) != ISMINE_SPENDABLE) return false;
|
|
// If we've already trusted this parent, continue
|
|
if (trusted_parents.count(parent->GetHash())) continue;
|
|
// Recurse to check that the parent is also trusted
|
|
if (!IsTrusted(*parent, trusted_parents)) return false;
|
|
trusted_parents.insert(parent->GetHash());
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool CWalletTx::IsEquivalentTo(const CWalletTx& _tx) const
|
|
{
|
|
CMutableTransaction tx1 {*this->tx};
|
|
CMutableTransaction tx2 {*_tx.tx};
|
|
for (auto& txin : tx1.vin) txin.scriptSig = CScript();
|
|
for (auto& txin : tx2.vin) txin.scriptSig = CScript();
|
|
return CTransaction(tx1) == CTransaction(tx2);
|
|
}
|
|
|
|
// Rebroadcast transactions from the wallet. We do this on a random timer
|
|
// to slightly obfuscate which transactions come from our wallet.
|
|
//
|
|
// Ideally, we'd only resend transactions that we think should have been
|
|
// mined in the most recent block. Any transaction that wasn't in the top
|
|
// blockweight of transactions in the mempool shouldn't have been mined,
|
|
// and so is probably just sitting in the mempool waiting to be confirmed.
|
|
// Rebroadcasting does nothing to speed up confirmation and only damages
|
|
// privacy.
|
|
void CWallet::ResendWalletTransactions()
|
|
{
|
|
// During reindex, importing and IBD, old wallet transactions become
|
|
// unconfirmed. Don't resend them as that would spam other nodes.
|
|
if (!chain().isReadyToBroadcast()) return;
|
|
|
|
// Do this infrequently and randomly to avoid giving away
|
|
// that these are our transactions.
|
|
if (GetTime() < nNextResend || !fBroadcastTransactions) return;
|
|
bool fFirst = (nNextResend == 0);
|
|
// resend 1-3 hours from now, ~2 hours on average.
|
|
nNextResend = GetTime() + (1 * 60 * 60) + GetRand(2 * 60 * 60);
|
|
if (fFirst) return;
|
|
|
|
int submitted_tx_count = 0;
|
|
|
|
{ // cs_wallet scope
|
|
LOCK(cs_wallet);
|
|
|
|
// Relay transactions
|
|
for (std::pair<const uint256, CWalletTx>& item : mapWallet) {
|
|
CWalletTx& wtx = item.second;
|
|
// Attempt to rebroadcast all txes more than 5 minutes older than
|
|
// the last block. SubmitMemoryPoolAndRelay() will not rebroadcast
|
|
// any confirmed or conflicting txs.
|
|
if (wtx.nTimeReceived > m_best_block_time - 5 * 60) continue;
|
|
bilingual_str unused_err_string;
|
|
if (wtx.SubmitMemoryPoolAndRelay(unused_err_string, true)) ++submitted_tx_count;
|
|
}
|
|
} // cs_wallet
|
|
|
|
if (submitted_tx_count > 0) {
|
|
WalletLogPrintf("%s: resubmit %u unconfirmed transactions\n", __func__, submitted_tx_count);
|
|
}
|
|
}
|
|
|
|
/** @} */ // end of mapWallet
|
|
|
|
void MaybeResendWalletTxs()
|
|
{
|
|
for (const std::shared_ptr<CWallet>& pwallet : GetWallets()) {
|
|
pwallet->ResendWalletTransactions();
|
|
}
|
|
}
|
|
|
|
|
|
/** @defgroup Actions
|
|
*
|
|
* @{
|
|
*/
|
|
|
|
|
|
std::unordered_set<const CWalletTx*, WalletTxHasher> CWallet::GetSpendableTXs() const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
std::unordered_set<const CWalletTx*, WalletTxHasher> ret;
|
|
for (auto it = setWalletUTXO.begin(); it != setWalletUTXO.end(); ) {
|
|
const auto& outpoint = *it;
|
|
const auto jt = mapWallet.find(outpoint.hash);
|
|
if (jt != mapWallet.end()) {
|
|
ret.emplace(&jt->second);
|
|
}
|
|
|
|
// setWalletUTXO is sorted by COutPoint, which means that all UTXOs for the same TX are neighbors
|
|
// skip entries until we encounter a new TX
|
|
while (it != setWalletUTXO.end() && it->hash == outpoint.hash) {
|
|
++it;
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
CWallet::Balance CWallet::GetBalance(const int min_depth, const bool avoid_reuse, const bool fAddLocked, const CCoinControl* coinControl) const
|
|
{
|
|
Balance ret;
|
|
isminefilter reuse_filter = avoid_reuse ? ISMINE_NO : ISMINE_USED;
|
|
{
|
|
LOCK(cs_wallet);
|
|
std::set<uint256> trusted_parents;
|
|
for (auto pcoin : GetSpendableTXs()) {
|
|
const bool is_trusted{IsTrusted(*pcoin, trusted_parents)};
|
|
const int tx_depth{pcoin->GetDepthInMainChain()};
|
|
const CAmount tx_credit_mine{pcoin->GetAvailableCredit(/* fUseCache */ true, ISMINE_SPENDABLE | reuse_filter)};
|
|
const CAmount tx_credit_watchonly{pcoin->GetAvailableCredit(/* fUseCache */ true, ISMINE_WATCH_ONLY | reuse_filter)};
|
|
if (is_trusted && ((tx_depth >= min_depth) || (fAddLocked && pcoin->IsLockedByInstantSend()))) {
|
|
ret.m_mine_trusted += tx_credit_mine;
|
|
ret.m_watchonly_trusted += tx_credit_watchonly;
|
|
}
|
|
if (!is_trusted && tx_depth == 0 && pcoin->InMempool()) {
|
|
ret.m_mine_untrusted_pending += tx_credit_mine;
|
|
ret.m_watchonly_untrusted_pending += tx_credit_watchonly;
|
|
}
|
|
ret.m_mine_immature += pcoin->GetImmatureCredit();
|
|
ret.m_watchonly_immature += pcoin->GetImmatureWatchOnlyCredit();
|
|
if (CCoinJoinClientOptions::IsEnabled()) {
|
|
ret.m_anonymized += pcoin->GetAnonymizedCredit(coinControl);
|
|
ret.m_denominated_trusted += pcoin->GetDenominatedCredit(false);
|
|
ret.m_denominated_untrusted_pending += pcoin->GetDenominatedCredit(true);
|
|
}
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
CAmount CWallet::GetAnonymizableBalance(bool fSkipDenominated, bool fSkipUnconfirmed) const
|
|
{
|
|
if (!CCoinJoinClientOptions::IsEnabled()) return 0;
|
|
|
|
std::vector<CompactTallyItem> vecTally = SelectCoinsGroupedByAddresses(fSkipDenominated, true, fSkipUnconfirmed);
|
|
if (vecTally.empty()) return 0;
|
|
|
|
CAmount nTotal = 0;
|
|
|
|
const CAmount nSmallestDenom = CoinJoin::GetSmallestDenomination();
|
|
const CAmount nMixingCollateral = CoinJoin::GetCollateralAmount();
|
|
for (const auto& item : vecTally) {
|
|
bool fIsDenominated = CoinJoin::IsDenominatedAmount(item.nAmount);
|
|
if(fSkipDenominated && fIsDenominated) continue;
|
|
// assume that the fee to create denoms should be mixing collateral at max
|
|
if(item.nAmount >= nSmallestDenom + (fIsDenominated ? 0 : nMixingCollateral))
|
|
nTotal += item.nAmount;
|
|
}
|
|
|
|
return nTotal;
|
|
}
|
|
|
|
// Note: calculated including unconfirmed,
|
|
// that's ok as long as we use it for informational purposes only
|
|
float CWallet::GetAverageAnonymizedRounds() const
|
|
{
|
|
if (!CCoinJoinClientOptions::IsEnabled()) return 0;
|
|
|
|
int nTotal = 0;
|
|
int nCount = 0;
|
|
|
|
LOCK(cs_wallet);
|
|
for (const auto& outpoint : setWalletUTXO) {
|
|
if(!IsDenominated(outpoint)) continue;
|
|
|
|
nTotal += GetCappedOutpointCoinJoinRounds(outpoint);
|
|
nCount++;
|
|
}
|
|
|
|
if(nCount == 0) return 0;
|
|
|
|
return (float)nTotal/nCount;
|
|
}
|
|
|
|
// Note: calculated including unconfirmed,
|
|
// that's ok as long as we use it for informational purposes only
|
|
CAmount CWallet::GetNormalizedAnonymizedBalance() const
|
|
{
|
|
if (!CCoinJoinClientOptions::IsEnabled()) return 0;
|
|
|
|
CAmount nTotal = 0;
|
|
|
|
LOCK(cs_wallet);
|
|
for (const auto& outpoint : setWalletUTXO) {
|
|
const auto it = mapWallet.find(outpoint.hash);
|
|
if (it == mapWallet.end()) continue;
|
|
|
|
CAmount nValue = it->second.tx->vout[outpoint.n].nValue;
|
|
if (!CoinJoin::IsDenominatedAmount(nValue)) continue;
|
|
if (it->second.GetDepthInMainChain() < 0) continue;
|
|
|
|
int nRounds = GetCappedOutpointCoinJoinRounds(outpoint);
|
|
nTotal += nValue * nRounds / CCoinJoinClientOptions::GetRounds();
|
|
}
|
|
|
|
return nTotal;
|
|
}
|
|
|
|
CAmount CWallet::GetAvailableBalance(const CCoinControl* coinControl) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
CAmount balance = 0;
|
|
std::vector<COutput> vCoins;
|
|
AvailableCoins(vCoins, coinControl);
|
|
for (const COutput& out : vCoins) {
|
|
if (out.fSpendable) {
|
|
balance += out.tx->tx->vout[out.i].nValue;
|
|
}
|
|
}
|
|
return balance;
|
|
}
|
|
|
|
void CWallet::AvailableCoins(std::vector<COutput> &vCoins, const CCoinControl* coinControl, const CAmount& nMinimumAmount, const CAmount& nMaximumAmount, const CAmount &nMinimumSumAmount, const uint64_t nMaximumCount) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
vCoins.clear();
|
|
CoinType nCoinType = coinControl ? coinControl->nCoinType : CoinType::ALL_COINS;
|
|
|
|
CAmount nTotal = 0;
|
|
// Either the WALLET_FLAG_AVOID_REUSE flag is not set (in which case we always allow), or we default to avoiding, and only in the case where
|
|
// a coin control object is provided, and has the avoid address reuse flag set to false, do we allow already used addresses
|
|
bool allow_used_addresses = !IsWalletFlagSet(WALLET_FLAG_AVOID_REUSE) || (coinControl && !coinControl->m_avoid_address_reuse);
|
|
const int min_depth = {coinControl ? coinControl->m_min_depth : DEFAULT_MIN_DEPTH};
|
|
const int max_depth = {coinControl ? coinControl->m_max_depth : DEFAULT_MAX_DEPTH};
|
|
const bool only_safe = {coinControl ? !coinControl->m_include_unsafe_inputs : true};
|
|
|
|
std::set<uint256> trusted_parents;
|
|
for (auto pcoin : GetSpendableTXs()) {
|
|
const uint256& wtxid = pcoin->GetHash();
|
|
|
|
if (!chain().checkFinalTx(*pcoin->tx))
|
|
continue;
|
|
|
|
if (pcoin->IsImmatureCoinBase())
|
|
continue;
|
|
|
|
int nDepth = pcoin->GetDepthInMainChain();
|
|
|
|
// We should not consider coins which aren't at least in our mempool
|
|
// It's possible for these to be conflicted via ancestors which we may never be able to detect
|
|
if (nDepth == 0 && !pcoin->InMempool())
|
|
continue;
|
|
|
|
bool safeTx = IsTrusted(*pcoin, trusted_parents);
|
|
|
|
if (only_safe && !safeTx) {
|
|
continue;
|
|
}
|
|
|
|
if (nDepth < min_depth || nDepth > max_depth) {
|
|
continue;
|
|
}
|
|
|
|
for (unsigned int i = 0; i < pcoin->tx->vout.size(); i++) {
|
|
bool found = false;
|
|
switch (nCoinType) {
|
|
case CoinType::ONLY_FULLY_MIXED: {
|
|
found = CoinJoin::IsDenominatedAmount(pcoin->tx->vout[i].nValue) &&
|
|
IsFullyMixed(COutPoint(wtxid, i));
|
|
break;
|
|
}
|
|
case CoinType::ONLY_READY_TO_MIX: {
|
|
found = CoinJoin::IsDenominatedAmount(pcoin->tx->vout[i].nValue) &&
|
|
!IsFullyMixed(COutPoint(wtxid, i));
|
|
break;
|
|
}
|
|
case CoinType::ONLY_NONDENOMINATED: {
|
|
// NOTE: do not use collateral amounts
|
|
found = !CoinJoin::IsCollateralAmount(pcoin->tx->vout[i].nValue) &&
|
|
!CoinJoin::IsDenominatedAmount(pcoin->tx->vout[i].nValue);
|
|
break;
|
|
}
|
|
case CoinType::ONLY_MASTERNODE_COLLATERAL: {
|
|
found = dmn_types::IsCollateralAmount(pcoin->tx->vout[i].nValue);
|
|
break;
|
|
}
|
|
case CoinType::ONLY_COINJOIN_COLLATERAL: {
|
|
found = CoinJoin::IsCollateralAmount(pcoin->tx->vout[i].nValue);
|
|
break;
|
|
}
|
|
case CoinType::ALL_COINS: {
|
|
found = true;
|
|
break;
|
|
}
|
|
} // no default case, so the compiler can warn about missing cases
|
|
if(!found) continue;
|
|
|
|
// Only consider selected coins if add_inputs is false
|
|
if (coinControl && !coinControl->m_add_inputs && !coinControl->IsSelected(COutPoint(wtxid, i))) {
|
|
continue;
|
|
}
|
|
|
|
if (pcoin->tx->vout[i].nValue < nMinimumAmount || pcoin->tx->vout[i].nValue > nMaximumAmount)
|
|
continue;
|
|
|
|
if (coinControl && coinControl->HasSelected() && !coinControl->fAllowOtherInputs && !coinControl->IsSelected(COutPoint(wtxid, i)))
|
|
continue;
|
|
|
|
if (IsLockedCoin(wtxid, i) && nCoinType != CoinType::ONLY_MASTERNODE_COLLATERAL)
|
|
continue;
|
|
|
|
if (IsSpent(wtxid, i))
|
|
continue;
|
|
|
|
isminetype mine = IsMine(pcoin->tx->vout[i]);
|
|
|
|
if (mine == ISMINE_NO) {
|
|
continue;
|
|
}
|
|
|
|
if (!allow_used_addresses && IsSpentKey(wtxid, i)) {
|
|
continue;
|
|
}
|
|
|
|
std::unique_ptr<SigningProvider> provider = GetSolvingProvider(pcoin->tx->vout[i].scriptPubKey);
|
|
|
|
bool solvable = provider ? IsSolvable(*provider, pcoin->tx->vout[i].scriptPubKey) : false;
|
|
bool spendable = ((mine & ISMINE_SPENDABLE) != ISMINE_NO) || (((mine & ISMINE_WATCH_ONLY) != ISMINE_NO) && (coinControl && coinControl->fAllowWatchOnly && solvable));
|
|
|
|
vCoins.push_back(COutput(pcoin, i, nDepth, spendable, solvable, safeTx, (coinControl && coinControl->fAllowWatchOnly)));
|
|
|
|
// Checks the sum amount of all UTXO's.
|
|
if (nMinimumSumAmount != MAX_MONEY) {
|
|
nTotal += pcoin->tx->vout[i].nValue;
|
|
|
|
if (nTotal >= nMinimumSumAmount) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
// Checks the maximum number of UTXO's.
|
|
if (nMaximumCount > 0 && vCoins.size() >= nMaximumCount) {
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
std::map<CTxDestination, std::vector<COutput>> CWallet::ListCoins() const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
std::map<CTxDestination, std::vector<COutput>> result;
|
|
std::vector<COutput> availableCoins;
|
|
|
|
AvailableCoins(availableCoins);
|
|
|
|
for (const COutput& coin : availableCoins) {
|
|
CTxDestination address;
|
|
if ((coin.fSpendable || (IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) && coin.fSolvable)) &&
|
|
ExtractDestination(FindNonChangeParentOutput(*coin.tx->tx, coin.i).scriptPubKey, address)) {
|
|
result[address].emplace_back(std::move(coin));
|
|
}
|
|
}
|
|
|
|
std::vector<COutPoint> lockedCoins;
|
|
ListLockedCoins(lockedCoins);
|
|
// Include watch-only for LegacyScriptPubKeyMan wallets without private keys
|
|
const bool include_watch_only = GetLegacyScriptPubKeyMan() && IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS);
|
|
const isminetype is_mine_filter = include_watch_only ? ISMINE_WATCH_ONLY : ISMINE_SPENDABLE;
|
|
for (const COutPoint& output : lockedCoins) {
|
|
auto it = mapWallet.find(output.hash);
|
|
if (it != mapWallet.end()) {
|
|
int depth = it->second.GetDepthInMainChain();
|
|
if (depth >= 0 && output.n < it->second.tx->vout.size() &&
|
|
IsMine(it->second.tx->vout[output.n]) == is_mine_filter
|
|
) {
|
|
CTxDestination address;
|
|
if (ExtractDestination(FindNonChangeParentOutput(*it->second.tx, output.n).scriptPubKey, address)) {
|
|
result[address].emplace_back(
|
|
&it->second, output.n, depth, true /* spendable */, true /* solvable */, false /* safe */);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
const CTxOut& CWallet::FindNonChangeParentOutput(const CTransaction& tx, int output) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
const CTransaction* ptx = &tx;
|
|
int n = output;
|
|
while (IsChange(ptx->vout[n]) && ptx->vin.size() > 0) {
|
|
const COutPoint& prevout = ptx->vin[0].prevout;
|
|
auto it = mapWallet.find(prevout.hash);
|
|
if (it == mapWallet.end() || it->second.tx->vout.size() <= prevout.n ||
|
|
!IsMine(it->second.tx->vout[prevout.n])) {
|
|
break;
|
|
}
|
|
ptx = it->second.tx.get();
|
|
n = prevout.n;
|
|
}
|
|
return ptx->vout[n];
|
|
}
|
|
|
|
const uint256& CWallet::GetCoinJoinSalt()
|
|
{
|
|
if (nCoinJoinSalt.IsNull()) {
|
|
InitCJSaltFromDb();
|
|
}
|
|
return nCoinJoinSalt;
|
|
}
|
|
|
|
void CWallet::InitCJSaltFromDb()
|
|
{
|
|
assert(nCoinJoinSalt.IsNull());
|
|
|
|
WalletBatch batch(GetDatabase());
|
|
if (!batch.ReadCoinJoinSalt(nCoinJoinSalt) && batch.ReadCoinJoinSalt(nCoinJoinSalt, true)) {
|
|
// Migrate salt stored with legacy key
|
|
batch.WriteCoinJoinSalt(nCoinJoinSalt);
|
|
}
|
|
}
|
|
|
|
bool CWallet::SetCoinJoinSalt(const uint256& cj_salt)
|
|
{
|
|
WalletBatch batch(GetDatabase());
|
|
// Only store new salt in CWallet if database write is successful
|
|
if (batch.WriteCoinJoinSalt(cj_salt)) {
|
|
nCoinJoinSalt = cj_salt;
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
struct CompareByPriority
|
|
{
|
|
bool operator()(const COutput& t1,
|
|
const COutput& t2) const
|
|
{
|
|
return CoinJoin::CalculateAmountPriority(t1.GetInputCoin().effective_value) > CoinJoin::CalculateAmountPriority(t2.GetInputCoin().effective_value);
|
|
}
|
|
};
|
|
|
|
static bool isGroupISLocked(const OutputGroup& group, interfaces::Chain& chain)
|
|
{
|
|
return std::all_of(group.m_outputs.begin(), group.m_outputs.end(), [&chain](const auto& output) {
|
|
return chain.isInstantSendLockedTx(output.outpoint.hash);
|
|
});
|
|
}
|
|
|
|
bool CWallet::SelectCoinsMinConf(const CAmount& nTargetValue, const CoinEligibilityFilter& eligibility_filter, std::vector<COutput> coins,
|
|
std::set<CInputCoin>& setCoinsRet, CAmount& nValueRet, const CoinSelectionParams& coin_selection_params, bool& bnb_used, CoinType nCoinType) const
|
|
{
|
|
setCoinsRet.clear();
|
|
nValueRet = 0;
|
|
|
|
if (coin_selection_params.use_bnb) {
|
|
// Get the feerate for effective value.
|
|
// When subtracting the fee from the outputs, we want the effective feerate to be 0
|
|
CFeeRate effective_feerate{0};
|
|
if (!coin_selection_params.m_subtract_fee_outputs) {
|
|
effective_feerate = coin_selection_params.m_effective_feerate;
|
|
}
|
|
|
|
std::vector<OutputGroup> groups = GroupOutputs(coins, !coin_selection_params.m_avoid_partial_spends, effective_feerate, coin_selection_params.m_long_term_feerate, eligibility_filter, true /* positive_only */);
|
|
|
|
// Calculate cost of change
|
|
CAmount cost_of_change = coin_selection_params.m_discard_feerate.GetFee(coin_selection_params.change_spend_size) + coin_selection_params.m_effective_feerate.GetFee(coin_selection_params.change_output_size);
|
|
|
|
// Calculate the fees for things that aren't inputs
|
|
CAmount not_input_fees = coin_selection_params.m_effective_feerate.GetFee(coin_selection_params.tx_noinputs_size);
|
|
bnb_used = true;
|
|
return SelectCoinsBnB(groups, nTargetValue, cost_of_change, setCoinsRet, nValueRet, not_input_fees);
|
|
} else {
|
|
std::vector<OutputGroup> groups = GroupOutputs(coins, !coin_selection_params.m_avoid_partial_spends, CFeeRate(0), CFeeRate(0), eligibility_filter, false /* positive_only */);
|
|
bnb_used = false;
|
|
return KnapsackSolver(nTargetValue, groups, setCoinsRet, nValueRet, nCoinType == CoinType::ONLY_FULLY_MIXED, m_default_max_tx_fee);
|
|
}
|
|
}
|
|
|
|
bool CWallet::SelectCoins(const std::vector<COutput>& vAvailableCoins, const CAmount& nTargetValue, std::set<CInputCoin>& setCoinsRet, CAmount& nValueRet, const CCoinControl& coin_control, CoinSelectionParams& coin_selection_params, bool& bnb_used) const
|
|
{
|
|
// Note: this function should never be used for "always free" tx types like dstx
|
|
|
|
std::vector<COutput> vCoins(vAvailableCoins);
|
|
CoinType nCoinType = coin_control.nCoinType;
|
|
CAmount value_to_select = nTargetValue;
|
|
|
|
// Default to bnb was not used. If we use it, we set it later
|
|
bnb_used = false;
|
|
|
|
// coin control -> return all selected outputs (we want all selected to go into the transaction for sure)
|
|
if (coin_control.HasSelected() && !coin_control.fAllowOtherInputs)
|
|
{
|
|
for (const COutput& out : vCoins)
|
|
{
|
|
if(!out.fSpendable)
|
|
continue;
|
|
|
|
nValueRet += out.tx->tx->vout[out.i].nValue;
|
|
setCoinsRet.insert(out.GetInputCoin());
|
|
|
|
if (!coin_control.fRequireAllInputs && nValueRet >= nTargetValue) {
|
|
// stop when we added at least one input and enough inputs to have at least nTargetValue funds
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return (nValueRet >= nTargetValue);
|
|
}
|
|
|
|
// calculate value from preset inputs and store them
|
|
std::set<CInputCoin> setPresetCoins;
|
|
CAmount nValueFromPresetInputs = 0;
|
|
|
|
std::vector<COutPoint> vPresetInputs;
|
|
coin_control.ListSelected(vPresetInputs);
|
|
for (const COutPoint& outpoint : vPresetInputs)
|
|
{
|
|
std::map<uint256, CWalletTx>::const_iterator it = mapWallet.find(outpoint.hash);
|
|
if (it != mapWallet.end())
|
|
{
|
|
const CWalletTx* pcoin = &it->second;
|
|
// Clearly invalid input, fail
|
|
if (pcoin->tx->vout.size() <= outpoint.n) {
|
|
return false;
|
|
}
|
|
if (nCoinType == CoinType::ONLY_FULLY_MIXED) {
|
|
// Make sure to include mixed preset inputs only,
|
|
// even if some non-mixed inputs were manually selected via CoinControl
|
|
if (!IsFullyMixed(outpoint)) continue;
|
|
}
|
|
// Just to calculate the marginal byte size
|
|
CInputCoin coin(pcoin->tx, outpoint.n, pcoin->GetSpendSize(outpoint.n, false));
|
|
nValueFromPresetInputs += coin.txout.nValue;
|
|
if (coin.m_input_bytes <= 0) {
|
|
return false; // Not solvable, can't estimate size for fee
|
|
}
|
|
coin.effective_value = coin.txout.nValue - coin_selection_params.m_effective_feerate.GetFee(coin.m_input_bytes);
|
|
if (coin_selection_params.use_bnb) {
|
|
value_to_select -= coin.effective_value;
|
|
} else {
|
|
value_to_select -= coin.txout.nValue;
|
|
}
|
|
setPresetCoins.insert(coin);
|
|
} else {
|
|
return false; // TODO: Allow non-wallet inputs
|
|
}
|
|
}
|
|
|
|
// remove preset inputs from vCoins so that Coin Selection doesn't pick them.
|
|
for (std::vector<COutput>::iterator it = vCoins.begin(); it != vCoins.end() && coin_control.HasSelected();)
|
|
{
|
|
if (setPresetCoins.count(it->GetInputCoin()))
|
|
it = vCoins.erase(it);
|
|
else
|
|
++it;
|
|
}
|
|
|
|
unsigned int limit_ancestor_count = 0;
|
|
unsigned int limit_descendant_count = 0;
|
|
chain().getPackageLimits(limit_ancestor_count, limit_descendant_count);
|
|
const size_t max_ancestors = (size_t)std::max<int64_t>(1, limit_ancestor_count);
|
|
const size_t max_descendants = (size_t)std::max<int64_t>(1, limit_descendant_count);
|
|
const bool fRejectLongChains = gArgs.GetBoolArg("-walletrejectlongchains", DEFAULT_WALLET_REJECT_LONG_CHAINS);
|
|
|
|
// form groups from remaining coins; note that preset coins will not
|
|
// automatically have their associated (same address) coins included
|
|
if (coin_control.m_avoid_partial_spends && vCoins.size() > OUTPUT_GROUP_MAX_ENTRIES) {
|
|
// Cases where we have 101+ outputs all pointing to the same destination may result in
|
|
// privacy leaks as they will potentially be deterministically sorted. We solve that by
|
|
// explicitly shuffling the outputs before processing
|
|
Shuffle(vCoins.begin(), vCoins.end(), FastRandomContext());
|
|
}
|
|
// Coin Selection attempts to select inputs from a pool of eligible UTXOs to fund the
|
|
// transaction at a target feerate. If an attempt fails, more attempts may be made using a more
|
|
// permissive CoinEligibilityFilter.
|
|
const bool res = [&] {
|
|
// Pre-selected inputs already cover the target amount.
|
|
if (value_to_select <= 0) return true;
|
|
|
|
// If possible, fund the transaction with confirmed UTXOs only. Prefer at least six
|
|
// confirmations on outputs received from other wallets and only spend confirmed change.
|
|
if (SelectCoinsMinConf(value_to_select, CoinEligibilityFilter(1, 6, 0), vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used, nCoinType)) return true;
|
|
if (SelectCoinsMinConf(value_to_select, CoinEligibilityFilter(1, 1, 0), vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used, nCoinType)) return true;
|
|
|
|
// Fall back to using zero confirmation change (but with as few ancestors in the mempool as
|
|
// possible) if we cannot fund the transaction otherwise.
|
|
if (m_spend_zero_conf_change) {
|
|
if (SelectCoinsMinConf(value_to_select, CoinEligibilityFilter(0, 1, 2), vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used, nCoinType)) return true;
|
|
if (SelectCoinsMinConf(value_to_select, CoinEligibilityFilter(0, 1, std::min((size_t)4, max_ancestors/3), std::min((size_t)4, max_descendants/3)),
|
|
vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used, nCoinType)) {
|
|
return true;
|
|
}
|
|
if (SelectCoinsMinConf(value_to_select, CoinEligibilityFilter(0, 1, max_ancestors/2, max_descendants/2),
|
|
vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used, nCoinType)) {
|
|
return true;
|
|
}
|
|
// If partial groups are allowed, relax the requirement of spending OutputGroups (groups
|
|
// of UTXOs sent to the same address, which are obviously controlled by a single wallet)
|
|
// in their entirety.
|
|
if (SelectCoinsMinConf(value_to_select, CoinEligibilityFilter(0, 1, max_ancestors-1, max_descendants-1, true /* include_partial_groups */),
|
|
vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used, nCoinType)) {
|
|
return true;
|
|
}
|
|
// Try with unsafe inputs if they are allowed. This may spend unconfirmed outputs
|
|
// received from other wallets.
|
|
if (coin_control.m_include_unsafe_inputs
|
|
&& SelectCoinsMinConf(value_to_select,
|
|
CoinEligibilityFilter(0 /* conf_mine */, 0 /* conf_theirs */, max_ancestors-1, max_descendants-1, true /* include_partial_groups */),
|
|
vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used)) {
|
|
return true;
|
|
}
|
|
// Try with unlimited ancestors/descendants. The transaction will still need to meet
|
|
// mempool ancestor/descendant policy to be accepted to mempool and broadcasted, but
|
|
// OutputGroups use heuristics that may overestimate ancestor/descendant counts.
|
|
if (!fRejectLongChains && SelectCoinsMinConf(value_to_select,
|
|
CoinEligibilityFilter(0, 1, std::numeric_limits<uint64_t>::max(), std::numeric_limits<uint64_t>::max(), true /* include_partial_groups */),
|
|
vCoins, setCoinsRet, nValueRet, coin_selection_params, bnb_used, nCoinType)) {
|
|
return true;
|
|
}
|
|
}
|
|
// Coin Selection failed.
|
|
return false;
|
|
}();
|
|
|
|
// SelectCoinsMinConf clears setCoinsRet, so add the preset inputs from coin_control to the coinset
|
|
util::insert(setCoinsRet, setPresetCoins);
|
|
|
|
// add preset inputs to the total value selected
|
|
nValueRet += nValueFromPresetInputs;
|
|
|
|
return res;
|
|
}
|
|
|
|
bool CWallet::SignTransaction(CMutableTransaction& tx) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
// Build coins map
|
|
std::map<COutPoint, Coin> coins;
|
|
for (auto& input : tx.vin) {
|
|
std::map<uint256, CWalletTx>::const_iterator mi = mapWallet.find(input.prevout.hash);
|
|
if(mi == mapWallet.end() || input.prevout.n >= mi->second.tx->vout.size()) {
|
|
return false;
|
|
}
|
|
const CWalletTx& wtx = mi->second;
|
|
coins[input.prevout] = Coin(wtx.tx->vout[input.prevout.n], wtx.m_confirm.block_height, wtx.IsCoinBase());
|
|
}
|
|
std::map<int, bilingual_str> input_errors;
|
|
return SignTransaction(tx, coins, SIGHASH_ALL, input_errors);
|
|
}
|
|
|
|
bool CWallet::SignTransaction(CMutableTransaction& tx, const std::map<COutPoint, Coin>& coins, int sighash, std::map<int, bilingual_str>& input_errors) const
|
|
{
|
|
// Try to sign with all ScriptPubKeyMans
|
|
for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
|
|
// spk_man->SignTransaction will return true if the transaction is complete,
|
|
// so we can exit early and return true if that happens
|
|
if (spk_man->SignTransaction(tx, coins, sighash, input_errors)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
// At this point, one input was not fully signed otherwise we would have exited already
|
|
return false;
|
|
}
|
|
|
|
TransactionError CWallet::FillPSBT(PartiallySignedTransaction& psbtx, bool& complete, int sighash_type, bool sign, bool bip32derivs, size_t * n_signed) const
|
|
{
|
|
if (n_signed) {
|
|
*n_signed = 0;
|
|
}
|
|
LOCK(cs_wallet);
|
|
// Get all of the previous transactions
|
|
for (unsigned int i = 0; i < psbtx.tx->vin.size(); ++i) {
|
|
const CTxIn& txin = psbtx.tx->vin[i];
|
|
PSBTInput& input = psbtx.inputs.at(i);
|
|
|
|
if (PSBTInputSigned(input)) {
|
|
continue;
|
|
}
|
|
|
|
// If we have no utxo, grab it from the wallet.
|
|
if (!input.non_witness_utxo) {
|
|
const uint256& txhash = txin.prevout.hash;
|
|
const auto it = mapWallet.find(txhash);
|
|
if (it != mapWallet.end()) {
|
|
const CWalletTx& wtx = it->second;
|
|
// We only need the non_witness_utxo, which is a superset of the witness_utxo.
|
|
// The signing code will switch to the smaller witness_utxo if this is ok.
|
|
input.non_witness_utxo = wtx.tx;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Fill in information from ScriptPubKeyMans
|
|
for (ScriptPubKeyMan* spk_man : GetAllScriptPubKeyMans()) {
|
|
int n_signed_this_spkm = 0;
|
|
|
|
TransactionError res = spk_man->FillPSBT(psbtx, sighash_type, sign, bip32derivs, &n_signed_this_spkm);
|
|
if (res != TransactionError::OK) {
|
|
return res;
|
|
}
|
|
|
|
if (n_signed) {
|
|
(*n_signed) += n_signed_this_spkm;
|
|
}
|
|
}
|
|
|
|
// Complete if every input is now signed
|
|
complete = true;
|
|
for (const auto& input : psbtx.inputs) {
|
|
complete &= PSBTInputSigned(input);
|
|
}
|
|
|
|
return TransactionError::OK;
|
|
}
|
|
|
|
SigningResult CWallet::SignMessage(const std::string& message, const PKHash& pkhash, std::string& str_sig) const
|
|
{
|
|
SignatureData sigdata;
|
|
CScript script_pub_key = GetScriptForDestination(pkhash);
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
|
|
LOCK(cs_wallet); // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
|
|
return spk_man_pair.second->SignMessage(message, pkhash, str_sig);
|
|
}
|
|
}
|
|
return SigningResult::PRIVATE_KEY_NOT_AVAILABLE;
|
|
}
|
|
|
|
bool CWallet::SignSpecialTxPayload(const uint256& hash, const CKeyID& keyid, std::vector<unsigned char>& vchSig) const
|
|
{
|
|
SignatureData sigdata;
|
|
CScript script_pub_key = GetScriptForDestination(PKHash(keyid));
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
if (spk_man_pair.second->CanProvide(script_pub_key, sigdata)) {
|
|
LOCK(cs_wallet); // DescriptorScriptPubKeyMan calls IsLocked which can lock cs_wallet in a deadlocking order
|
|
return spk_man_pair.second->SignSpecialTxPayload(hash, keyid, vchSig);
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool CWallet::FundTransaction(CMutableTransaction& tx, CAmount& nFeeRet, int& nChangePosInOut, bilingual_str& error, bool lockUnspents, const std::set<int>& setSubtractFeeFromOutputs, CCoinControl coinControl)
|
|
{
|
|
std::vector<CRecipient> vecSend;
|
|
|
|
// If no specific change position was requested, apply BIP69
|
|
if (nChangePosInOut == -1) {
|
|
std::sort(tx.vin.begin(), tx.vin.end(), CompareInputBIP69());
|
|
std::sort(tx.vout.begin(), tx.vout.end(), CompareOutputBIP69());
|
|
}
|
|
|
|
// Turn the txout set into a CRecipient vector.
|
|
for (size_t idx = 0; idx < tx.vout.size(); idx++) {
|
|
const CTxOut& txOut = tx.vout[idx];
|
|
CRecipient recipient = {txOut.scriptPubKey, txOut.nValue, setSubtractFeeFromOutputs.count(idx) == 1};
|
|
vecSend.push_back(recipient);
|
|
}
|
|
|
|
coinControl.fAllowOtherInputs = true;
|
|
|
|
for (const CTxIn& txin : tx.vin) {
|
|
coinControl.Select(txin.prevout);
|
|
}
|
|
|
|
// Acquire the locks to prevent races to the new locked unspents between the
|
|
// CreateTransaction call and LockCoin calls (when lockUnspents is true).
|
|
LOCK(cs_wallet);
|
|
|
|
CTransactionRef tx_new;
|
|
FeeCalculation fee_calc_out;
|
|
if (!CreateTransaction(vecSend, tx_new, nFeeRet, nChangePosInOut, error, coinControl, fee_calc_out, false, tx.vExtraPayload.size())) {
|
|
return false;
|
|
}
|
|
|
|
if (nChangePosInOut != -1) {
|
|
tx.vout.insert(tx.vout.begin() + nChangePosInOut, tx_new->vout[nChangePosInOut]);
|
|
}
|
|
|
|
// Copy output sizes from new transaction; they may have had the fee
|
|
// subtracted from them.
|
|
for (unsigned int idx = 0; idx < tx.vout.size(); idx++) {
|
|
tx.vout[idx].nValue = tx_new->vout[idx].nValue;
|
|
}
|
|
|
|
// Add new txins while keeping original txin scriptSig/order.
|
|
for (const CTxIn& txin : tx_new->vin) {
|
|
if (!coinControl.IsSelected(txin.prevout)) {
|
|
tx.vin.push_back(txin);
|
|
|
|
}
|
|
if (lockUnspents) {
|
|
LockCoin(txin.prevout);
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::SelectTxDSInsByDenomination(int nDenom, CAmount nValueMax, std::vector<CTxDSIn>& vecTxDSInRet)
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
CAmount nValueTotal{0};
|
|
|
|
std::set<uint256> setRecentTxIds;
|
|
std::vector<COutput> vCoins;
|
|
|
|
vecTxDSInRet.clear();
|
|
|
|
if (!CoinJoin::IsValidDenomination(nDenom)) {
|
|
return false;
|
|
}
|
|
CAmount nDenomAmount = CoinJoin::DenominationToAmount(nDenom);
|
|
|
|
CCoinControl coin_control;
|
|
coin_control.nCoinType = CoinType::ONLY_READY_TO_MIX;
|
|
AvailableCoins(vCoins, &coin_control);
|
|
WalletCJLogPrint((*this), "CWallet::%s -- vCoins.size(): %d\n", __func__, vCoins.size());
|
|
|
|
Shuffle(vCoins.rbegin(), vCoins.rend(), FastRandomContext());
|
|
|
|
for (const auto& out : vCoins) {
|
|
uint256 txHash = out.tx->GetHash();
|
|
CAmount nValue = out.tx->tx->vout[out.i].nValue;
|
|
if (setRecentTxIds.find(txHash) != setRecentTxIds.end()) continue; // no duplicate txids
|
|
if (nValueTotal + nValue > nValueMax) continue;
|
|
if (nValue != nDenomAmount) continue;
|
|
|
|
CTxIn txin = CTxIn(txHash, out.i);
|
|
CScript scriptPubKey = out.tx->tx->vout[out.i].scriptPubKey;
|
|
int nRounds = GetRealOutpointCoinJoinRounds(txin.prevout);
|
|
|
|
nValueTotal += nValue;
|
|
vecTxDSInRet.emplace_back(CTxDSIn(txin, scriptPubKey, nRounds));
|
|
setRecentTxIds.emplace(txHash);
|
|
WalletCJLogPrint((*this), "CWallet::%s -- hash: %s, nValue: %d.%08d\n",
|
|
__func__, txHash.ToString(), nValue / COIN, nValue % COIN);
|
|
}
|
|
|
|
WalletCJLogPrint((*this), "CWallet::%s -- setRecentTxIds.size(): %d\n", __func__, setRecentTxIds.size());
|
|
|
|
return nValueTotal > 0;
|
|
}
|
|
|
|
static bool IsCurrentForAntiFeeSniping(interfaces::Chain& chain, const uint256& block_hash)
|
|
{
|
|
if (chain.isInitialBlockDownload()) {
|
|
return false;
|
|
}
|
|
constexpr int64_t MAX_ANTI_FEE_SNIPING_TIP_AGE = 8 * 60 * 60; // in seconds
|
|
int64_t block_time;
|
|
CHECK_NONFATAL(chain.findBlock(block_hash, FoundBlock().time(block_time)));
|
|
if (block_time < (GetTime() - MAX_ANTI_FEE_SNIPING_TIP_AGE)) {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Return a height-based locktime for new transactions (uses the height of the
|
|
* current chain tip unless we are not synced with the current chain
|
|
*/
|
|
static uint32_t GetLocktimeForNewTransaction(interfaces::Chain& chain, const uint256& block_hash, int block_height)
|
|
{
|
|
uint32_t locktime;
|
|
// Discourage fee sniping.
|
|
//
|
|
// For a large miner the value of the transactions in the best block and
|
|
// the mempool can exceed the cost of deliberately attempting to mine two
|
|
// blocks to orphan the current best block. By setting nLockTime such that
|
|
// only the next block can include the transaction, we discourage this
|
|
// practice as the height restricted and limited blocksize gives miners
|
|
// considering fee sniping fewer options for pulling off this attack.
|
|
//
|
|
// A simple way to think about this is from the wallet's point of view we
|
|
// always want the blockchain to move forward. By setting nLockTime this
|
|
// way we're basically making the statement that we only want this
|
|
// transaction to appear in the next block; we don't want to potentially
|
|
// encourage reorgs by allowing transactions to appear at lower heights
|
|
// than the next block in forks of the best chain.
|
|
//
|
|
// Of course, the subsidy is high enough, and transaction volume low
|
|
// enough, that fee sniping isn't a problem yet, but by implementing a fix
|
|
// now we ensure code won't be written that makes assumptions about
|
|
// nLockTime that preclude a fix later.
|
|
if (IsCurrentForAntiFeeSniping(chain, block_hash)) {
|
|
locktime = block_height;
|
|
|
|
// Secondly occasionally randomly pick a nLockTime even further back, so
|
|
// that transactions that are delayed after signing for whatever reason,
|
|
// e.g. high-latency mix networks and some CoinJoin implementations, have
|
|
// better privacy.
|
|
if (GetRandInt(10) == 0)
|
|
locktime = std::max(0, (int)locktime - GetRandInt(100));
|
|
} else {
|
|
// If our chain is lagging behind, we can't discourage fee sniping nor help
|
|
// the privacy of high-latency transactions. To avoid leaking a potentially
|
|
// unique "nLockTime fingerprint", set nLockTime to a constant.
|
|
locktime = 0;
|
|
}
|
|
assert(locktime < LOCKTIME_THRESHOLD);
|
|
return locktime;
|
|
}
|
|
|
|
std::vector<CompactTallyItem> CWallet::SelectCoinsGroupedByAddresses(bool fSkipDenominated, bool fAnonymizable, bool fSkipUnconfirmed, int nMaxOupointsPerAddress) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
isminefilter filter = ISMINE_SPENDABLE;
|
|
|
|
// Try using the cache for already confirmed mixable inputs.
|
|
// This should only be used if nMaxOupointsPerAddress was NOT specified.
|
|
if(nMaxOupointsPerAddress == -1 && fAnonymizable && fSkipUnconfirmed) {
|
|
if(fSkipDenominated && fAnonymizableTallyCachedNonDenom) {
|
|
LogPrint(BCLog::SELECTCOINS, "SelectCoinsGroupedByAddresses - using cache for non-denom inputs %d\n", vecAnonymizableTallyCachedNonDenom.size());
|
|
return vecAnonymizableTallyCachedNonDenom;
|
|
}
|
|
if(!fSkipDenominated && fAnonymizableTallyCached) {
|
|
LogPrint(BCLog::SELECTCOINS, "SelectCoinsGroupedByAddresses - using cache for all inputs %d\n", vecAnonymizableTallyCached.size());
|
|
return vecAnonymizableTallyCached;
|
|
}
|
|
}
|
|
|
|
CAmount nSmallestDenom = CoinJoin::GetSmallestDenomination();
|
|
|
|
// Tally
|
|
std::map<CTxDestination, CompactTallyItem> mapTally;
|
|
std::set<uint256> setWalletTxesCounted;
|
|
for (const auto& outpoint : setWalletUTXO) {
|
|
|
|
if (!setWalletTxesCounted.emplace(outpoint.hash).second) continue;
|
|
|
|
std::map<uint256, CWalletTx>::const_iterator it = mapWallet.find(outpoint.hash);
|
|
if (it == mapWallet.end()) continue;
|
|
|
|
const CWalletTx& wtx = (*it).second;
|
|
|
|
if(wtx.IsCoinBase() && wtx.GetBlocksToMaturity() > 0) continue;
|
|
if(fSkipUnconfirmed && !wtx.IsTrusted()) continue;
|
|
if (wtx.GetDepthInMainChain() < 0) continue;
|
|
|
|
for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
|
|
CTxDestination txdest;
|
|
if (!ExtractDestination(wtx.tx->vout[i].scriptPubKey, txdest)) continue;
|
|
|
|
isminefilter mine = IsMine(txdest);
|
|
if(!(mine & filter)) continue;
|
|
|
|
auto itTallyItem = mapTally.find(txdest);
|
|
if (nMaxOupointsPerAddress != -1 && itTallyItem != mapTally.end() && int64_t(itTallyItem->second.vecInputCoins.size()) >= nMaxOupointsPerAddress) continue;
|
|
|
|
if(IsSpent(outpoint.hash, i) || IsLockedCoin(outpoint.hash, i)) continue;
|
|
|
|
if(fSkipDenominated && CoinJoin::IsDenominatedAmount(wtx.tx->vout[i].nValue)) continue;
|
|
|
|
if(fAnonymizable) {
|
|
// ignore collaterals
|
|
if(CoinJoin::IsCollateralAmount(wtx.tx->vout[i].nValue)) continue;
|
|
if (fMasternodeMode && dmn_types::IsCollateralAmount(wtx.tx->vout[i].nValue)) continue;
|
|
// ignore outputs that are 10 times smaller then the smallest denomination
|
|
// otherwise they will just lead to higher fee / lower priority
|
|
if(wtx.tx->vout[i].nValue <= nSmallestDenom/10) continue;
|
|
// ignore mixed
|
|
if (IsFullyMixed(COutPoint(outpoint.hash, i))) continue;
|
|
}
|
|
|
|
if (itTallyItem == mapTally.end()) {
|
|
itTallyItem = mapTally.emplace(txdest, CompactTallyItem()).first;
|
|
itTallyItem->second.txdest = txdest;
|
|
}
|
|
itTallyItem->second.nAmount += wtx.tx->vout[i].nValue;
|
|
itTallyItem->second.vecInputCoins.emplace_back(wtx.tx, i);
|
|
}
|
|
}
|
|
|
|
// construct resulting vector
|
|
// NOTE: vecTallyRet is "sorted" by txdest (i.e. address), just like mapTally
|
|
std::vector<CompactTallyItem> vecTallyRet;
|
|
for (const auto& item : mapTally) {
|
|
if(fAnonymizable && item.second.nAmount < nSmallestDenom) continue;
|
|
vecTallyRet.push_back(item.second);
|
|
}
|
|
|
|
// Cache already confirmed mixable entries for later use.
|
|
// This should only be used if nMaxOupointsPerAddress was NOT specified.
|
|
if(nMaxOupointsPerAddress == -1 && fAnonymizable && fSkipUnconfirmed) {
|
|
if(fSkipDenominated) {
|
|
vecAnonymizableTallyCachedNonDenom = vecTallyRet;
|
|
fAnonymizableTallyCachedNonDenom = true;
|
|
} else {
|
|
vecAnonymizableTallyCached = vecTallyRet;
|
|
fAnonymizableTallyCached = true;
|
|
}
|
|
}
|
|
|
|
// debug
|
|
if (LogAcceptCategory(BCLog::SELECTCOINS, BCLog::Level::Debug)) {
|
|
std::string strMessage = "SelectCoinsGroupedByAddresses - vecTallyRet:\n";
|
|
for (const auto& item : vecTallyRet)
|
|
strMessage += strprintf(" %s %f\n", EncodeDestination(item.txdest), float(item.nAmount)/COIN);
|
|
LogPrint(BCLog::SELECTCOINS, "%s", strMessage); /* Continued */
|
|
}
|
|
|
|
return vecTallyRet;
|
|
}
|
|
|
|
bool CWallet::SelectDenominatedAmounts(CAmount nValueMax, std::set<CAmount>& setAmountsRet) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
CAmount nValueTotal{0};
|
|
setAmountsRet.clear();
|
|
|
|
std::vector<COutput> vCoins;
|
|
CCoinControl coin_control;
|
|
coin_control.nCoinType = CoinType::ONLY_READY_TO_MIX;
|
|
AvailableCoins(vCoins, &coin_control);
|
|
// larger denoms first
|
|
std::sort(vCoins.rbegin(), vCoins.rend(), CompareByPriority());
|
|
|
|
for (const auto& out : vCoins) {
|
|
CAmount nValue = out.tx->tx->vout[out.i].nValue;
|
|
if (nValueTotal + nValue <= nValueMax) {
|
|
nValueTotal += nValue;
|
|
setAmountsRet.emplace(nValue);
|
|
}
|
|
}
|
|
|
|
return nValueTotal >= CoinJoin::GetSmallestDenomination();
|
|
}
|
|
|
|
int CWallet::CountInputsWithAmount(CAmount nInputAmount) const
|
|
{
|
|
CAmount nTotal = 0;
|
|
|
|
LOCK(cs_wallet);
|
|
|
|
for (const auto& outpoint : setWalletUTXO) {
|
|
const auto it = mapWallet.find(outpoint.hash);
|
|
if (it == mapWallet.end()) continue;
|
|
if (it->second.tx->vout[outpoint.n].nValue != nInputAmount) continue;
|
|
if (it->second.GetDepthInMainChain() < 0) continue;
|
|
|
|
nTotal++;
|
|
}
|
|
|
|
return nTotal;
|
|
}
|
|
|
|
bool CWallet::HasCollateralInputs(bool fOnlyConfirmed) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
std::vector<COutput> vCoins;
|
|
CCoinControl coin_control;
|
|
coin_control.m_include_unsafe_inputs = !fOnlyConfirmed;
|
|
coin_control.nCoinType = CoinType::ONLY_COINJOIN_COLLATERAL;
|
|
AvailableCoins(vCoins, &coin_control);
|
|
|
|
return !vCoins.empty();
|
|
}
|
|
|
|
bool CWallet::GetBudgetSystemCollateralTX(CTransactionRef& tx, uint256 hash, CAmount amount, const COutPoint& outpoint)
|
|
{
|
|
CScript scriptChange;
|
|
scriptChange << OP_RETURN << ToByteVector(hash);
|
|
|
|
CAmount nFeeRet = 0;
|
|
int nChangePosRet = -1;
|
|
bilingual_str error;
|
|
std::vector< CRecipient > vecSend;
|
|
vecSend.push_back((CRecipient){scriptChange, amount, false});
|
|
|
|
CCoinControl coinControl;
|
|
if (!outpoint.IsNull()) {
|
|
coinControl.Select(outpoint);
|
|
}
|
|
FeeCalculation fee_calc_out;
|
|
bool success = CreateTransaction(vecSend, tx, nFeeRet, nChangePosRet, error, coinControl, fee_calc_out);
|
|
if(!success){
|
|
WalletLogPrintf("CWallet::GetBudgetSystemCollateralTX -- Error: %s\n", error.original);
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::CreateTransactionInternal(
|
|
const std::vector<CRecipient>& vecSend,
|
|
CTransactionRef& tx,
|
|
CAmount& nFeeRet,
|
|
int& nChangePosInOut,
|
|
bilingual_str& error,
|
|
const CCoinControl& coin_control,
|
|
FeeCalculation& fee_calc_out,
|
|
bool sign,
|
|
int nExtraPayloadSize)
|
|
{
|
|
CAmount nValue = 0;
|
|
ReserveDestination reservedest(this);
|
|
int nChangePosRequest = nChangePosInOut;
|
|
unsigned int nSubtractFeeFromAmount = 0;
|
|
for (const auto& recipient : vecSend)
|
|
{
|
|
if (nValue < 0 || recipient.nAmount < 0)
|
|
{
|
|
error = _("Transaction amounts must not be negative");
|
|
return false;
|
|
}
|
|
nValue += recipient.nAmount;
|
|
|
|
if (recipient.fSubtractFeeFromAmount)
|
|
nSubtractFeeFromAmount++;
|
|
}
|
|
if (vecSend.empty())
|
|
{
|
|
error = _("Transaction must have at least one recipient");
|
|
return false;
|
|
}
|
|
|
|
CMutableTransaction txNew;
|
|
FeeCalculation feeCalc;
|
|
|
|
CoinSelectionParams coin_selection_params; // Parameters for coin selection, init with dummy
|
|
coin_selection_params.m_discard_feerate = coin_control.m_discard_feerate ? *coin_control.m_discard_feerate : GetDiscardRate(*this);
|
|
|
|
// Get the fee rate to use effective values in coin selection
|
|
coin_selection_params.m_effective_feerate = GetMinimumFeeRate(*this, coin_control, &feeCalc);
|
|
// Do not, ever, assume that it's fine to change the fee rate if the user has explicitly
|
|
// provided one
|
|
if (coin_control.m_feerate && coin_selection_params.m_effective_feerate > *coin_control.m_feerate) {
|
|
error = strprintf(_("Fee rate (%s) is lower than the minimum fee rate setting (%s)"), coin_control.m_feerate->ToString(FeeEstimateMode::DUFF_B), coin_selection_params.m_effective_feerate.ToString(FeeEstimateMode::DUFF_B));
|
|
return false;
|
|
}
|
|
|
|
int nBytes{0};
|
|
{
|
|
std::vector<CInputCoin> vecCoins;
|
|
LOCK(cs_wallet);
|
|
txNew.nLockTime = GetLocktimeForNewTransaction(chain(), GetLastBlockHash(), GetLastBlockHeight());
|
|
{
|
|
CAmount nAmountAvailable{0};
|
|
std::vector<COutput> vAvailableCoins;
|
|
AvailableCoins(vAvailableCoins, &coin_control, 1, MAX_MONEY, MAX_MONEY, 0);
|
|
coin_selection_params.use_bnb = false; // never use BnB
|
|
|
|
for (auto out : vAvailableCoins) {
|
|
if (out.fSpendable) {
|
|
nAmountAvailable += out.tx->tx->vout[out.i].nValue;
|
|
}
|
|
}
|
|
coin_selection_params.m_avoid_partial_spends = coin_control.m_avoid_partial_spends;
|
|
|
|
// Create change script that will be used if we need change
|
|
// TODO: pass in scriptChange instead of reservedest so
|
|
// change transaction isn't always pay-to-bitcoin-address
|
|
CScript scriptChange;
|
|
|
|
// coin control: send change to custom address
|
|
if (!std::get_if<CNoDestination>(&coin_control.destChange)) {
|
|
scriptChange = GetScriptForDestination(coin_control.destChange);
|
|
} else { // no coin control: send change to newly generated address
|
|
// Note: We use a new key here to keep it from being obvious which side is the change.
|
|
// The drawback is that by not reusing a previous key, the change may be lost if a
|
|
// backup is restored, if the backup doesn't have the new private key for the change.
|
|
// If we reused the old key, it would be possible to add code to look for and
|
|
// rediscover unknown transactions that were written with keys of ours to recover
|
|
// post-backup change.
|
|
|
|
// Reserve a new key pair from key pool. If it fails, provide a dummy
|
|
// destination in case we don't need change.
|
|
CTxDestination dest;
|
|
if (!reservedest.GetReservedDestination(dest, true)) {
|
|
error = _("Transaction needs a change address, but we can't generate it. Please call keypoolrefill first.");
|
|
}
|
|
scriptChange = GetScriptForDestination(dest);
|
|
// A valid destination implies a change script (and
|
|
// vice-versa). An empty change script will abort later, if the
|
|
// change keypool ran out, but change is required.
|
|
CHECK_NONFATAL(IsValidDestination(dest) != scriptChange.empty());
|
|
}
|
|
|
|
nFeeRet = 0;
|
|
bool pick_new_inputs = true;
|
|
CAmount nValueIn = 0;
|
|
CAmount nAmountToSelectAdditional{0};
|
|
// Start with nAmountToSelectAdditional=0 and loop until there is enough to cover the request + fees, try it 500 times.
|
|
int nMaxTries = 500;
|
|
while (--nMaxTries > 0)
|
|
{
|
|
nChangePosInOut = std::numeric_limits<int>::max();
|
|
txNew.vin.clear();
|
|
txNew.vout.clear();
|
|
bool fFirst = true;
|
|
|
|
CAmount nValueToSelect = nValue;
|
|
if (nSubtractFeeFromAmount == 0) {
|
|
assert(nAmountToSelectAdditional >= 0);
|
|
nValueToSelect += nAmountToSelectAdditional;
|
|
}
|
|
// vouts to the payees
|
|
for (const auto& recipient : vecSend)
|
|
{
|
|
CTxOut txout(recipient.nAmount, recipient.scriptPubKey);
|
|
|
|
if (recipient.fSubtractFeeFromAmount)
|
|
{
|
|
assert(nSubtractFeeFromAmount != 0);
|
|
txout.nValue -= nFeeRet / nSubtractFeeFromAmount; // Subtract fee equally from each selected recipient
|
|
|
|
if (fFirst) // first receiver pays the remainder not divisible by output count
|
|
{
|
|
fFirst = false;
|
|
txout.nValue -= nFeeRet % nSubtractFeeFromAmount;
|
|
}
|
|
}
|
|
|
|
if (IsDust(txout, chain().relayDustFee()))
|
|
{
|
|
if (recipient.fSubtractFeeFromAmount && nFeeRet > 0)
|
|
{
|
|
if (txout.nValue < 0)
|
|
error = _("The transaction amount is too small to pay the fee");
|
|
else
|
|
error = _("The transaction amount is too small to send after the fee has been deducted");
|
|
}
|
|
else
|
|
error = _("Transaction amount too small");
|
|
return false;
|
|
}
|
|
txNew.vout.push_back(txout);
|
|
}
|
|
|
|
// Choose coins to use
|
|
bool bnb_used = false;
|
|
if (pick_new_inputs) {
|
|
nValueIn = 0;
|
|
std::set<CInputCoin> setCoinsTmp;
|
|
if (!SelectCoins(vAvailableCoins, nValueToSelect, setCoinsTmp, nValueIn, coin_control, coin_selection_params, bnb_used)) {
|
|
if (coin_control.nCoinType == CoinType::ONLY_NONDENOMINATED) {
|
|
error = _("Unable to locate enough non-denominated funds for this transaction.");
|
|
} else if (coin_control.nCoinType == CoinType::ONLY_FULLY_MIXED) {
|
|
error = _("Unable to locate enough mixed funds for this transaction.");
|
|
error = error + Untranslated(" ") + strprintf(_("%s uses exact denominated amounts to send funds, you might simply need to mix some more coins."), gCoinJoinName);
|
|
} else if (nValueIn < nValueToSelect) {
|
|
error = _("Insufficient funds.");
|
|
}
|
|
return false;
|
|
}
|
|
vecCoins.assign(setCoinsTmp.begin(), setCoinsTmp.end());
|
|
}
|
|
|
|
// Fill vin
|
|
//
|
|
// Note how the sequence number is set to max()-1 so that the
|
|
// nLockTime set above actually works.
|
|
txNew.vin.clear();
|
|
for (const auto& coin : vecCoins) {
|
|
txNew.vin.emplace_back(coin.outpoint, CScript(), CTxIn::SEQUENCE_FINAL - 1);
|
|
}
|
|
|
|
auto calculateFee = [&](CAmount& nFee) EXCLUSIVE_LOCKS_REQUIRED(cs_wallet) -> bool {
|
|
AssertLockHeld(cs_wallet);
|
|
nBytes = CalculateMaximumSignedTxSize(CTransaction(txNew), this, coin_control.fAllowWatchOnly);
|
|
if (nBytes < 0) {
|
|
error = _("Signing transaction failed");
|
|
return false;
|
|
}
|
|
|
|
if (nExtraPayloadSize != 0) {
|
|
// account for extra payload in fee calculation
|
|
nBytes += GetSizeOfCompactSize(nExtraPayloadSize) + nExtraPayloadSize;
|
|
}
|
|
|
|
if (static_cast<size_t>(nBytes) > MAX_STANDARD_TX_SIZE) {
|
|
// Do not create oversized transactions (bad-txns-oversize).
|
|
error = _("Transaction too large");
|
|
return false;
|
|
}
|
|
|
|
// Remove scriptSigs to eliminate the fee calculation dummy signatures
|
|
for (auto& txin : txNew.vin) {
|
|
txin.scriptSig = CScript();
|
|
}
|
|
|
|
nFee = GetMinimumFee(*this, nBytes, coin_control, &feeCalc);
|
|
|
|
return true;
|
|
};
|
|
|
|
if (!calculateFee(nFeeRet)) {
|
|
return false;
|
|
}
|
|
|
|
CTxOut newTxOut;
|
|
const CAmount nAmountLeft = nValueIn - nValue;
|
|
auto getChange = [&]() {
|
|
if (nSubtractFeeFromAmount > 0) {
|
|
return nAmountLeft;
|
|
} else {
|
|
return nAmountLeft - nFeeRet;
|
|
}
|
|
};
|
|
|
|
if (getChange() > 0)
|
|
{
|
|
//over pay for denominated transactions
|
|
if (coin_control.nCoinType == CoinType::ONLY_FULLY_MIXED) {
|
|
nChangePosInOut = -1;
|
|
nFeeRet += getChange();
|
|
} else {
|
|
// Fill a vout to ourself with zero amount until we know the correct change
|
|
newTxOut = CTxOut(0, scriptChange);
|
|
txNew.vout.push_back(newTxOut);
|
|
|
|
// Calculate the fee with the change output added, store the
|
|
// current fee to reset it in case the remainder is dust and we
|
|
// don't need to fee with change output added.
|
|
CAmount nFeePrev = nFeeRet;
|
|
if (!calculateFee(nFeeRet)) {
|
|
return false;
|
|
}
|
|
|
|
// Remove the change output again, it will be added later again if required
|
|
txNew.vout.pop_back();
|
|
|
|
// Set the change amount properly
|
|
newTxOut.nValue = getChange();
|
|
|
|
// Never create dust outputs; if we would, just
|
|
// add the dust to the fee.
|
|
if (IsDust(newTxOut, coin_selection_params.m_discard_feerate))
|
|
{
|
|
nFeeRet = nFeePrev;
|
|
nChangePosInOut = -1;
|
|
nFeeRet += getChange();
|
|
}
|
|
else
|
|
{
|
|
if (nChangePosRequest == -1)
|
|
{
|
|
// Insert change txn at random position:
|
|
nChangePosInOut = GetRandInt(txNew.vout.size()+1);
|
|
}
|
|
else if ((unsigned int)nChangePosRequest > txNew.vout.size())
|
|
{
|
|
error = _("Change index out of range");
|
|
return false;
|
|
} else {
|
|
nChangePosInOut = nChangePosRequest;
|
|
}
|
|
|
|
std::vector<CTxOut>::iterator position = txNew.vout.begin()+nChangePosInOut;
|
|
txNew.vout.insert(position, newTxOut);
|
|
}
|
|
}
|
|
} else {
|
|
nChangePosInOut = -1;
|
|
}
|
|
|
|
if (getChange() < 0) {
|
|
if (nSubtractFeeFromAmount == 0) {
|
|
// nValueIn is not enough to cover nValue + nFeeRet. Add the missing amount abs(nChange) to the fee
|
|
// and try to select other inputs in the next loop step to cover the full required amount.
|
|
nAmountToSelectAdditional += abs(getChange());
|
|
} else if (nAmountToSelectAdditional > 0 && nValueToSelect == nAmountAvailable) {
|
|
// We tried selecting more and failed. We have no extra funds left,
|
|
// so just add 1 duff to fail in the next loop step with a correct reason
|
|
nAmountToSelectAdditional += 1;
|
|
}
|
|
continue;
|
|
}
|
|
|
|
// If no specific change position was requested, apply BIP69
|
|
if (nChangePosRequest == -1) {
|
|
std::sort(vecCoins.begin(), vecCoins.end(), CompareInputCoinBIP69());
|
|
std::sort(txNew.vin.begin(), txNew.vin.end(), CompareInputBIP69());
|
|
std::sort(txNew.vout.begin(), txNew.vout.end(), CompareOutputBIP69());
|
|
|
|
// If there was a change output added before, we must update its position now
|
|
if (nChangePosInOut != -1) {
|
|
int i = 0;
|
|
for (const CTxOut& txOut : txNew.vout)
|
|
{
|
|
if (txOut == newTxOut)
|
|
{
|
|
nChangePosInOut = i;
|
|
break;
|
|
}
|
|
i++;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (feeCalc.reason == FeeReason::FALLBACK && !m_allow_fallback_fee) {
|
|
// eventually allow a fallback fee
|
|
error = _("Fee estimation failed. Fallbackfee is disabled. Wait a few blocks or enable -fallbackfee.");
|
|
return false;
|
|
}
|
|
|
|
if (nAmountLeft == nFeeRet) {
|
|
// We either added the change amount to nFeeRet because the change amount was considered
|
|
// to be dust or the input exactly matches output + fee.
|
|
// Either way, we used the total amount of the inputs we picked and the transaction is ready.
|
|
break;
|
|
}
|
|
|
|
// We have a change output and we don't need to subtruct fees, which means the transaction is ready.
|
|
if (nChangePosInOut != -1 && nSubtractFeeFromAmount == 0) {
|
|
break;
|
|
}
|
|
|
|
// If subtracting fee from recipients, we now know what fee we
|
|
// need to subtract, we have no reason to reselect inputs
|
|
if (nSubtractFeeFromAmount > 0) {
|
|
// If we are in here the second time it means we already subtracted the fee from the
|
|
// output(s) and there weren't any issues while doing that. So the transaction is ready now
|
|
// and we can break.
|
|
if (!pick_new_inputs) {
|
|
break;
|
|
}
|
|
pick_new_inputs = false;
|
|
}
|
|
}
|
|
|
|
if (nMaxTries == 0) {
|
|
error = _("Exceeded max tries.");
|
|
return false;
|
|
}
|
|
|
|
// Give up if change keypool ran out and change is required
|
|
if (scriptChange.empty() && nChangePosInOut != -1) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// Make sure change position was updated one way or another
|
|
assert(nChangePosInOut != std::numeric_limits<int>::max());
|
|
|
|
if (sign && !SignTransaction(txNew)) {
|
|
error = _("Signing transaction failed");
|
|
return false;
|
|
}
|
|
|
|
// Return the constructed transaction data.
|
|
tx = MakeTransactionRef(std::move(txNew));
|
|
}
|
|
|
|
if (nFeeRet > m_default_max_tx_fee) {
|
|
error = TransactionErrorString(TransactionError::MAX_FEE_EXCEEDED);
|
|
return false;
|
|
}
|
|
|
|
if (gArgs.GetBoolArg("-walletrejectlongchains", DEFAULT_WALLET_REJECT_LONG_CHAINS)) {
|
|
// Lastly, ensure this tx will pass the mempool's chain limits
|
|
if (!chain().checkChainLimits(tx)) {
|
|
error = _("Transaction has too long of a mempool chain");
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// Before we return success, we assume any change key will be used to prevent
|
|
// accidental re-use.
|
|
reservedest.KeepDestination();
|
|
fee_calc_out = feeCalc;
|
|
|
|
WalletLogPrintf("Fee Calculation: Fee:%d Bytes:%u Tgt:%d (requested %d) Reason:\"%s\" Decay %.5f: Estimation: (%g - %g) %.2f%% %.1f/(%.1f %d mem %.1f out) Fail: (%g - %g) %.2f%% %.1f/(%.1f %d mem %.1f out)\n",
|
|
nFeeRet, nBytes, feeCalc.returnedTarget, feeCalc.desiredTarget, StringForFeeReason(feeCalc.reason), feeCalc.est.decay,
|
|
feeCalc.est.pass.start, feeCalc.est.pass.end,
|
|
(feeCalc.est.pass.totalConfirmed + feeCalc.est.pass.inMempool + feeCalc.est.pass.leftMempool) > 0.0 ? 100 * feeCalc.est.pass.withinTarget / (feeCalc.est.pass.totalConfirmed + feeCalc.est.pass.inMempool + feeCalc.est.pass.leftMempool) : 0.0,
|
|
feeCalc.est.pass.withinTarget, feeCalc.est.pass.totalConfirmed, feeCalc.est.pass.inMempool, feeCalc.est.pass.leftMempool,
|
|
feeCalc.est.fail.start, feeCalc.est.fail.end,
|
|
(feeCalc.est.fail.totalConfirmed + feeCalc.est.fail.inMempool + feeCalc.est.fail.leftMempool) > 0.0 ? 100 * feeCalc.est.fail.withinTarget / (feeCalc.est.fail.totalConfirmed + feeCalc.est.fail.inMempool + feeCalc.est.fail.leftMempool) : 0.0,
|
|
feeCalc.est.fail.withinTarget, feeCalc.est.fail.totalConfirmed, feeCalc.est.fail.inMempool, feeCalc.est.fail.leftMempool);
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::CreateTransaction(
|
|
const std::vector<CRecipient>& vecSend,
|
|
CTransactionRef& tx,
|
|
CAmount& nFeeRet,
|
|
int& nChangePosInOut,
|
|
bilingual_str& error,
|
|
const CCoinControl& coin_control,
|
|
FeeCalculation& fee_calc_out,
|
|
bool sign,
|
|
int nExtraPayloadSize)
|
|
{
|
|
int nChangePosIn = nChangePosInOut;
|
|
Assert(!tx); // tx is an out-param. TODO change the return type from bool to tx (or nullptr)
|
|
bool res = CreateTransactionInternal(vecSend, tx, nFeeRet, nChangePosInOut, error, coin_control, fee_calc_out, sign, nExtraPayloadSize);
|
|
// try with avoidpartialspends unless it's enabled already
|
|
if (res && nFeeRet > 0 /* 0 means non-functional fee rate estimation */ && m_max_aps_fee > -1 && !coin_control.m_avoid_partial_spends) {
|
|
CCoinControl tmp_cc = coin_control;
|
|
tmp_cc.m_avoid_partial_spends = true;
|
|
|
|
// Re-use the change destination from the first creation attempt to avoid skipping BIP44 indexes
|
|
const int ungrouped_change_pos = nChangePosInOut;
|
|
if (ungrouped_change_pos != -1) {
|
|
ExtractDestination(tx->vout[ungrouped_change_pos].scriptPubKey, tmp_cc.destChange);
|
|
}
|
|
|
|
CAmount nFeeRet2;
|
|
CTransactionRef tx2;
|
|
int nChangePosInOut2 = nChangePosIn;
|
|
bilingual_str error2; // fired and forgotten; if an error occurs, we discard the results
|
|
if (CreateTransactionInternal(vecSend, tx2, nFeeRet2, nChangePosInOut2, error2, tmp_cc, fee_calc_out, sign, nExtraPayloadSize)) {
|
|
// if fee of this alternative one is within the range of the max fee, we use this one
|
|
const bool use_aps = nFeeRet2 <= nFeeRet + m_max_aps_fee;
|
|
WalletLogPrintf("Fee non-grouped = %lld, grouped = %lld, using %s\n", nFeeRet, nFeeRet2, use_aps ? "grouped" : "non-grouped");
|
|
if (use_aps) {
|
|
tx = tx2;
|
|
nFeeRet = nFeeRet2;
|
|
nChangePosInOut = nChangePosInOut2;
|
|
}
|
|
}
|
|
}
|
|
return res;
|
|
}
|
|
|
|
void CWallet::CommitTransaction(CTransactionRef tx, mapValue_t mapValue, std::vector<std::pair<std::string, std::string>> orderForm)
|
|
{
|
|
LOCK(cs_wallet);
|
|
WalletLogPrintf("CommitTransaction:\n%s", tx->ToString()); /* Continued */
|
|
|
|
// Add tx to wallet, because if it has change it's also ours,
|
|
// otherwise just for transaction history.
|
|
AddToWallet(tx, {}, [&](CWalletTx& wtx, bool new_tx) {
|
|
CHECK_NONFATAL(wtx.mapValue.empty());
|
|
CHECK_NONFATAL(wtx.vOrderForm.empty());
|
|
wtx.mapValue = std::move(mapValue);
|
|
wtx.vOrderForm = std::move(orderForm);
|
|
wtx.fTimeReceivedIsTxTime = true;
|
|
wtx.fFromMe = true;
|
|
return true;
|
|
});
|
|
|
|
// Notify that old coins are spent
|
|
std::set<uint256> updated_hahes;
|
|
for (const CTxIn& txin : tx->vin){
|
|
// notify only once
|
|
if(updated_hahes.find(txin.prevout.hash) != updated_hahes.end()) continue;
|
|
|
|
CWalletTx &coin = mapWallet.at(txin.prevout.hash);
|
|
coin.MarkDirty();
|
|
NotifyTransactionChanged(txin.prevout.hash, CT_UPDATED);
|
|
updated_hahes.insert(txin.prevout.hash);
|
|
}
|
|
// Get the inserted-CWalletTx from mapWallet so that the
|
|
// fInMempool flag is cached properly
|
|
CWalletTx& wtx = mapWallet.at(tx->GetHash());
|
|
|
|
if (!fBroadcastTransactions) {
|
|
// Don't submit tx to the mempool
|
|
return;
|
|
}
|
|
|
|
bilingual_str err_string;
|
|
if (!wtx.SubmitMemoryPoolAndRelay(err_string, true)) {
|
|
WalletLogPrintf("CommitTransaction(): Transaction cannot be broadcast immediately, %s\n", err_string.original);
|
|
// TODO: if we expect the failure to be long term or permanent, instead delete wtx from the wallet and return failure.
|
|
}
|
|
}
|
|
|
|
DBErrors CWallet::LoadWallet()
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
DBErrors nLoadWalletRet = WalletBatch(GetDatabase()).LoadWallet(this);
|
|
if (nLoadWalletRet == DBErrors::NEED_REWRITE)
|
|
{
|
|
if (GetDatabase().Rewrite("\x04pool"))
|
|
{
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
spk_man_pair.second->RewriteDB();
|
|
}
|
|
nKeysLeftSinceAutoBackup = 0;
|
|
}
|
|
}
|
|
|
|
if (m_spk_managers.empty()) {
|
|
assert(m_external_spk_managers == nullptr);
|
|
assert(m_internal_spk_managers == nullptr);
|
|
}
|
|
|
|
if (HaveChain()) {
|
|
const std::optional<int> tip_height = chain().getHeight();
|
|
if (tip_height) {
|
|
SetLastBlockProcessed(*tip_height, chain().getBlockHash(*tip_height));
|
|
for (auto& pair : mapWallet) {
|
|
for(unsigned int i = 0; i < pair.second.tx->vout.size(); ++i) {
|
|
if (IsMine(pair.second.tx->vout[i]) && !IsSpent(pair.first, i)) {
|
|
setWalletUTXO.insert(COutPoint(pair.first, i));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (nLoadWalletRet != DBErrors::LOAD_OK)
|
|
return nLoadWalletRet;
|
|
|
|
/* If the CoinJoin salt is not set, try to set a new random hash as the salt */
|
|
if (GetCoinJoinSalt().IsNull() && !SetCoinJoinSalt(GetRandHash())) {
|
|
return DBErrors::LOAD_FAIL;
|
|
}
|
|
|
|
return DBErrors::LOAD_OK;
|
|
}
|
|
|
|
// Goes through all wallet transactions and checks if they are masternode collaterals, in which case these are locked
|
|
// This avoids accidental spending of collaterals. They can still be unlocked manually if a spend is really intended.
|
|
void CWallet::AutoLockMasternodeCollaterals()
|
|
{
|
|
if (!m_chain) return;
|
|
|
|
std::vector<std::pair<const CTransactionRef&, unsigned int>> outputs;
|
|
|
|
LOCK(cs_wallet);
|
|
for (const auto& pair : mapWallet) {
|
|
for (unsigned int i = 0; i < pair.second.tx->vout.size(); ++i) {
|
|
if (IsMine(pair.second.tx->vout[i]) && !IsSpent(pair.first, i)) {
|
|
outputs.emplace_back(pair.second.tx, i);
|
|
}
|
|
}
|
|
}
|
|
for (const auto& outPoint : m_chain->listMNCollaterials(outputs)) {
|
|
LockCoin(outPoint);
|
|
}
|
|
}
|
|
|
|
DBErrors CWallet::ZapSelectTx(std::vector<uint256>& vHashIn, std::vector<uint256>& vHashOut)
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
WalletLogPrintf("ZapSelectTx started for %d transactions...\n", vHashIn.size());
|
|
|
|
DBErrors nZapSelectTxRet = WalletBatch(GetDatabase()).ZapSelectTx(vHashIn, vHashOut);
|
|
for (const uint256& hash : vHashOut) {
|
|
const auto& it = mapWallet.find(hash);
|
|
wtxOrdered.erase(it->second.m_it_wtxOrdered);
|
|
for (const auto& txin : it->second.tx->vin)
|
|
mapTxSpends.erase(txin.prevout);
|
|
mapWallet.erase(it);
|
|
NotifyTransactionChanged(hash, CT_DELETED);
|
|
}
|
|
|
|
if (nZapSelectTxRet == DBErrors::NEED_REWRITE)
|
|
{
|
|
if (GetDatabase().Rewrite("\x04pool"))
|
|
{
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
spk_man_pair.second->RewriteDB();
|
|
}
|
|
}
|
|
}
|
|
|
|
if (nZapSelectTxRet != DBErrors::LOAD_OK)
|
|
return nZapSelectTxRet;
|
|
|
|
MarkDirty();
|
|
|
|
WalletLogPrintf("ZapSelectTx completed for %d transactions.\n", vHashOut.size());
|
|
return DBErrors::LOAD_OK;
|
|
}
|
|
|
|
bool CWallet::SetAddressBookWithDB(WalletBatch& batch, const CTxDestination& address, const std::string& strName, const std::string& strPurpose)
|
|
{
|
|
bool fUpdated = false;
|
|
bool is_mine;
|
|
{
|
|
LOCK(cs_wallet);
|
|
std::map<CTxDestination, CAddressBookData>::iterator mi = m_address_book.find(address);
|
|
fUpdated = (mi != m_address_book.end() && !mi->second.IsChange());
|
|
m_address_book[address].SetLabel(strName);
|
|
if (!strPurpose.empty()) /* update purpose only if requested */
|
|
m_address_book[address].purpose = strPurpose;
|
|
is_mine = IsMine(address) != ISMINE_NO;
|
|
}
|
|
NotifyAddressBookChanged(address, strName, is_mine,
|
|
strPurpose, (fUpdated ? CT_UPDATED : CT_NEW));
|
|
if (!strPurpose.empty() && !batch.WritePurpose(EncodeDestination(address), strPurpose))
|
|
return false;
|
|
return batch.WriteName(EncodeDestination(address), strName);
|
|
}
|
|
|
|
bool CWallet::SetAddressBook(const CTxDestination& address, const std::string& strName, const std::string& strPurpose)
|
|
{
|
|
WalletBatch batch(GetDatabase());
|
|
return SetAddressBookWithDB(batch, address, strName, strPurpose);
|
|
}
|
|
|
|
bool CWallet::DelAddressBook(const CTxDestination& address)
|
|
{
|
|
bool is_mine;
|
|
WalletBatch batch(GetDatabase());
|
|
{
|
|
LOCK(cs_wallet);
|
|
// If we want to delete receiving addresses, we need to take care that DestData "used" (and possibly newer DestData) gets preserved (and the "deleted" address transformed into a change entry instead of actually being deleted)
|
|
// NOTE: This isn't a problem for sending addresses because they never have any DestData yet!
|
|
// When adding new DestData, it should be considered here whether to retain or delete it (or move it?).
|
|
if (IsMine(address)) {
|
|
WalletLogPrintf("%s called with IsMine address, NOT SUPPORTED. Please report this bug! %s\n", __func__, PACKAGE_BUGREPORT);
|
|
return false;
|
|
}
|
|
// Delete destdata tuples associated with address
|
|
std::string strAddress = EncodeDestination(address);
|
|
for (const std::pair<const std::string, std::string> &item : m_address_book[address].destdata)
|
|
{
|
|
batch.EraseDestData(strAddress, item.first);
|
|
}
|
|
m_address_book.erase(address);
|
|
is_mine = IsMine(address) != ISMINE_NO;
|
|
}
|
|
|
|
NotifyAddressBookChanged(address, "", is_mine, "", CT_DELETED);
|
|
|
|
batch.ErasePurpose(EncodeDestination(address));
|
|
return batch.EraseName(EncodeDestination(address));
|
|
}
|
|
|
|
size_t CWallet::KeypoolCountExternalKeys() const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
auto legacy_spk_man = GetLegacyScriptPubKeyMan();
|
|
if (legacy_spk_man) {
|
|
return legacy_spk_man->KeypoolCountExternalKeys();
|
|
}
|
|
|
|
unsigned int count = 0;
|
|
if (m_external_spk_managers) {
|
|
count += m_external_spk_managers->GetKeyPoolSize();
|
|
}
|
|
|
|
return count;
|
|
}
|
|
|
|
unsigned int CWallet::GetKeyPoolSize() const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
unsigned int count = 0;
|
|
for (auto spk_man : GetActiveScriptPubKeyMans()) {
|
|
count += spk_man->GetKeyPoolSize();
|
|
}
|
|
return count;
|
|
}
|
|
|
|
bool CWallet::TopUpKeyPool(unsigned int kpSize)
|
|
{
|
|
LOCK(cs_wallet);
|
|
bool res = true;
|
|
for (auto spk_man : GetActiveScriptPubKeyMans()) {
|
|
res &= spk_man->TopUp(kpSize);
|
|
}
|
|
return res;
|
|
}
|
|
|
|
bool CWallet::GetNewDestination(const std::string label, CTxDestination& dest, bilingual_str& error)
|
|
{
|
|
error.clear();
|
|
bool result = false;
|
|
|
|
LOCK(cs_wallet);
|
|
auto spk_man = GetScriptPubKeyMan(false /* internal */);
|
|
if (spk_man) {
|
|
spk_man->TopUp();
|
|
result = spk_man->GetNewDestination(dest, error);
|
|
} else {
|
|
error = strprintf(_("Error: No addresses available."));
|
|
}
|
|
if (result) {
|
|
SetAddressBook(dest, label, "receive");
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
bool CWallet::GetNewChangeDestination(CTxDestination& dest, bilingual_str& error)
|
|
{
|
|
LOCK(cs_wallet);
|
|
error.clear();
|
|
|
|
ReserveDestination reservedest(this);
|
|
if (!reservedest.GetReservedDestination(dest, true)) {
|
|
error = _("Error: Keypool ran out, please call keypoolrefill first");
|
|
return false;
|
|
}
|
|
|
|
reservedest.KeepDestination();
|
|
return true;
|
|
}
|
|
|
|
int64_t CWallet::GetOldestKeyPoolTime() const
|
|
{
|
|
LOCK(cs_wallet);
|
|
int64_t oldestKey = std::numeric_limits<int64_t>::max();
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
oldestKey = std::min(oldestKey, spk_man_pair.second->GetOldestKeyPoolTime());
|
|
}
|
|
|
|
return oldestKey;
|
|
}
|
|
|
|
void CWallet::MarkDestinationsDirty(const std::set<CTxDestination>& destinations) {
|
|
for (auto& entry : mapWallet) {
|
|
CWalletTx& wtx = entry.second;
|
|
if (wtx.m_is_cache_empty) continue;
|
|
for (unsigned int i = 0; i < wtx.tx->vout.size(); i++) {
|
|
CTxDestination dst;
|
|
if (ExtractDestination(wtx.tx->vout[i].scriptPubKey, dst) && destinations.count(dst)) {
|
|
wtx.MarkDirty();
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
std::map<CTxDestination, CAmount> CWallet::GetAddressBalances() const
|
|
{
|
|
std::map<CTxDestination, CAmount> balances;
|
|
|
|
{
|
|
LOCK(cs_wallet);
|
|
std::set<uint256> trusted_parents;
|
|
for (const auto& walletEntry : mapWallet)
|
|
{
|
|
const CWalletTx *pcoin = &walletEntry.second;
|
|
|
|
if (!IsTrusted(*pcoin, trusted_parents))
|
|
continue;
|
|
|
|
if (pcoin->IsImmatureCoinBase())
|
|
continue;
|
|
|
|
int nDepth = pcoin->GetDepthInMainChain();
|
|
if ((nDepth < (pcoin->IsFromMe(ISMINE_ALL) ? 0 : 1)) && !pcoin->IsLockedByInstantSend())
|
|
continue;
|
|
|
|
for (unsigned int i = 0; i < pcoin->tx->vout.size(); i++)
|
|
{
|
|
CTxDestination addr;
|
|
if (!IsMine(pcoin->tx->vout[i]))
|
|
continue;
|
|
if(!ExtractDestination(pcoin->tx->vout[i].scriptPubKey, addr))
|
|
continue;
|
|
|
|
CAmount n = IsSpent(walletEntry.first, i) ? 0 : pcoin->tx->vout[i].nValue;
|
|
|
|
balances[addr] += n;
|
|
}
|
|
}
|
|
}
|
|
|
|
return balances;
|
|
}
|
|
|
|
std::set< std::set<CTxDestination> > CWallet::GetAddressGroupings() const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
std::set< std::set<CTxDestination> > groupings;
|
|
std::set<CTxDestination> grouping;
|
|
|
|
for (const auto& walletEntry : mapWallet)
|
|
{
|
|
const CWalletTx *pcoin = &walletEntry.second;
|
|
|
|
if (pcoin->tx->vin.size() > 0)
|
|
{
|
|
bool any_mine = false;
|
|
// group all input addresses with each other
|
|
for (const CTxIn& txin : pcoin->tx->vin)
|
|
{
|
|
CTxDestination address;
|
|
if(!IsMine(txin)) /* If this input isn't mine, ignore it */
|
|
continue;
|
|
if(!ExtractDestination(mapWallet.at(txin.prevout.hash).tx->vout[txin.prevout.n].scriptPubKey, address))
|
|
continue;
|
|
grouping.insert(address);
|
|
any_mine = true;
|
|
}
|
|
|
|
// group change with input addresses
|
|
if (any_mine)
|
|
{
|
|
for (const CTxOut& txout : pcoin->tx->vout)
|
|
if (IsChange(txout))
|
|
{
|
|
CTxDestination txoutAddr;
|
|
if(!ExtractDestination(txout.scriptPubKey, txoutAddr))
|
|
continue;
|
|
grouping.insert(txoutAddr);
|
|
}
|
|
}
|
|
if (grouping.size() > 0)
|
|
{
|
|
groupings.insert(grouping);
|
|
grouping.clear();
|
|
}
|
|
}
|
|
|
|
// group lone addrs by themselves
|
|
for (const auto& txout : pcoin->tx->vout)
|
|
if (IsMine(txout))
|
|
{
|
|
CTxDestination address;
|
|
if(!ExtractDestination(txout.scriptPubKey, address))
|
|
continue;
|
|
grouping.insert(address);
|
|
groupings.insert(grouping);
|
|
grouping.clear();
|
|
}
|
|
}
|
|
|
|
std::set< std::set<CTxDestination>* > uniqueGroupings; // a set of pointers to groups of addresses
|
|
std::map< CTxDestination, std::set<CTxDestination>* > setmap; // map addresses to the unique group containing it
|
|
for (std::set<CTxDestination> _grouping : groupings)
|
|
{
|
|
// make a set of all the groups hit by this new group
|
|
std::set< std::set<CTxDestination>* > hits;
|
|
std::map< CTxDestination, std::set<CTxDestination>* >::iterator it;
|
|
for (const CTxDestination& address : _grouping)
|
|
if ((it = setmap.find(address)) != setmap.end())
|
|
hits.insert((*it).second);
|
|
|
|
// merge all hit groups into a new single group and delete old groups
|
|
std::set<CTxDestination>* merged = new std::set<CTxDestination>(_grouping);
|
|
for (std::set<CTxDestination>* hit : hits)
|
|
{
|
|
merged->insert(hit->begin(), hit->end());
|
|
uniqueGroupings.erase(hit);
|
|
delete hit;
|
|
}
|
|
uniqueGroupings.insert(merged);
|
|
|
|
// update setmap
|
|
for (const CTxDestination& element : *merged)
|
|
setmap[element] = merged;
|
|
}
|
|
|
|
std::set< std::set<CTxDestination> > ret;
|
|
for (const std::set<CTxDestination>* uniqueGrouping : uniqueGroupings)
|
|
{
|
|
ret.insert(*uniqueGrouping);
|
|
delete uniqueGrouping;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
std::set<CTxDestination> CWallet::GetLabelAddresses(const std::string& label) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
std::set<CTxDestination> result;
|
|
for (const std::pair<const CTxDestination, CAddressBookData>& item : m_address_book)
|
|
{
|
|
if (item.second.IsChange()) continue;
|
|
const CTxDestination& address = item.first;
|
|
const std::string& strName = item.second.GetLabel();
|
|
if (strName == label)
|
|
result.insert(address);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
bool ReserveDestination::GetReservedDestination(CTxDestination& dest, bool fInternalIn)
|
|
{
|
|
m_spk_man = pwallet->GetScriptPubKeyMan(fInternalIn);
|
|
if (!m_spk_man) {
|
|
return false;
|
|
}
|
|
|
|
if (nIndex == -1)
|
|
{
|
|
m_spk_man->TopUp();
|
|
|
|
CKeyPool keypool;
|
|
int64_t index;
|
|
if (!m_spk_man->GetReservedDestination(fInternalIn, address, index, keypool)) {
|
|
return false;
|
|
}
|
|
nIndex = index;
|
|
fInternal = keypool.fInternal;
|
|
}
|
|
dest = address;
|
|
return true;
|
|
}
|
|
|
|
void ReserveDestination::KeepDestination()
|
|
{
|
|
if (nIndex != -1) {
|
|
m_spk_man->KeepDestination(nIndex);
|
|
}
|
|
nIndex = -1;
|
|
address = CNoDestination();
|
|
}
|
|
|
|
void ReserveDestination::ReturnDestination()
|
|
{
|
|
if (nIndex != -1) {
|
|
m_spk_man->ReturnDestination(nIndex, fInternal, address);
|
|
}
|
|
nIndex = -1;
|
|
address = CNoDestination();
|
|
}
|
|
|
|
void CWallet::LockCoin(const COutPoint& output)
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
setLockedCoins.insert(output);
|
|
std::map<uint256, CWalletTx>::iterator it = mapWallet.find(output.hash);
|
|
if (it != mapWallet.end()) it->second.MarkDirty(); // recalculate all credits for this tx
|
|
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
}
|
|
|
|
void CWallet::UnlockCoin(const COutPoint& output)
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
setLockedCoins.erase(output);
|
|
std::map<uint256, CWalletTx>::iterator it = mapWallet.find(output.hash);
|
|
if (it != mapWallet.end()) it->second.MarkDirty(); // recalculate all credits for this tx
|
|
|
|
fAnonymizableTallyCached = false;
|
|
fAnonymizableTallyCachedNonDenom = false;
|
|
}
|
|
|
|
void CWallet::UnlockAllCoins()
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
setLockedCoins.clear();
|
|
}
|
|
|
|
bool CWallet::IsLockedCoin(uint256 hash, unsigned int n) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
COutPoint outpt(hash, n);
|
|
|
|
return (setLockedCoins.count(outpt) > 0);
|
|
}
|
|
|
|
void CWallet::ListLockedCoins(std::vector<COutPoint>& vOutpts) const
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
for (std::set<COutPoint>::iterator it = setLockedCoins.begin();
|
|
it != setLockedCoins.end(); it++) {
|
|
COutPoint outpt = (*it);
|
|
vOutpts.push_back(outpt);
|
|
}
|
|
}
|
|
|
|
void CWallet::ListProTxCoins(std::vector<COutPoint>& vOutpts) const
|
|
{
|
|
// TODO: refactor duplicated code between CWallet::AutoLockMasternodeCollaterals and CWallet::ListProTxCoins
|
|
if (!m_chain) {
|
|
vOutpts.clear();
|
|
return;
|
|
}
|
|
std::vector<std::pair<const CTransactionRef&, unsigned int>> outputs;
|
|
|
|
AssertLockHeld(cs_wallet);
|
|
for (const auto &o : setWalletUTXO) {
|
|
auto it = mapWallet.find(o.hash);
|
|
if (it != mapWallet.end()) {
|
|
const auto &ptx = it->second;
|
|
outputs.emplace_back(ptx.tx, o.n);
|
|
}
|
|
}
|
|
vOutpts = m_chain->listMNCollaterials(outputs);
|
|
}
|
|
|
|
/** @} */ // end of Actions
|
|
|
|
void CWallet::GetKeyBirthTimes(std::map<CKeyID, int64_t>& mapKeyBirth) const {
|
|
AssertLockHeld(cs_wallet);
|
|
mapKeyBirth.clear();
|
|
|
|
// map in which we'll infer heights of other keys
|
|
std::map<CKeyID, const CWalletTx::Confirmation*> mapKeyFirstBlock;
|
|
CWalletTx::Confirmation max_confirm;
|
|
max_confirm.block_height = GetLastBlockHeight() > 144 ? GetLastBlockHeight() - 144 : 0; // the tip can be reorganized; use a 144-block safety margin
|
|
CHECK_NONFATAL(chain().findAncestorByHeight(GetLastBlockHash(), max_confirm.block_height, FoundBlock().hash(max_confirm.hashBlock)));
|
|
|
|
{
|
|
LegacyScriptPubKeyMan* spk_man = GetLegacyScriptPubKeyMan();
|
|
assert(spk_man != nullptr);
|
|
LOCK(spk_man->cs_KeyStore);
|
|
|
|
// get birth times for keys with metadata
|
|
for (const auto& entry : spk_man->mapKeyMetadata) {
|
|
if (entry.second.nCreateTime) {
|
|
mapKeyBirth[entry.first] = entry.second.nCreateTime;
|
|
}
|
|
}
|
|
|
|
// Prepare to infer birth heights for keys without metadata
|
|
for (const CKeyID &keyid : spk_man->GetKeys()) {
|
|
if (mapKeyBirth.count(keyid) == 0)
|
|
mapKeyFirstBlock[keyid] = &max_confirm;
|
|
}
|
|
|
|
// if there are no such keys, we're done
|
|
if (mapKeyFirstBlock.empty())
|
|
return;
|
|
|
|
// find first block that affects those keys, if there are any left
|
|
for (const auto& entry : mapWallet) {
|
|
// iterate over all wallet transactions...
|
|
const CWalletTx &wtx = entry.second;
|
|
if (wtx.m_confirm.status == CWalletTx::CONFIRMED) {
|
|
// ... which are already in a block
|
|
for (const CTxOut &txout : wtx.tx->vout) {
|
|
// iterate over all their outputs
|
|
for (const auto &keyid : GetAffectedKeys(txout.scriptPubKey, *spk_man)) {
|
|
// ... and all their affected keys
|
|
auto rit = mapKeyFirstBlock.find(keyid);
|
|
if (rit != mapKeyFirstBlock.end() && wtx.m_confirm.block_height < rit->second->block_height) {
|
|
rit->second = &wtx.m_confirm;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Extract block timestamps for those keys
|
|
for (const auto& entry : mapKeyFirstBlock) {
|
|
int64_t block_time;
|
|
CHECK_NONFATAL(chain().findBlock(entry.second->hashBlock, FoundBlock().time(block_time)));
|
|
mapKeyBirth[entry.first] = block_time - TIMESTAMP_WINDOW; // block times can be 2h off
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Compute smart timestamp for a transaction being added to the wallet.
|
|
*
|
|
* Logic:
|
|
* - If sending a transaction, assign its timestamp to the current time.
|
|
* - If receiving a transaction outside a block, assign its timestamp to the
|
|
* current time.
|
|
* - If receiving a block with a future timestamp, assign all its (not already
|
|
* known) transactions' timestamps to the current time.
|
|
* - If receiving a block with a past timestamp, before the most recent known
|
|
* transaction (that we care about), assign all its (not already known)
|
|
* transactions' timestamps to the same timestamp as that most-recent-known
|
|
* transaction.
|
|
* - If receiving a block with a past timestamp, but after the most recent known
|
|
* transaction, assign all its (not already known) transactions' timestamps to
|
|
* the block time.
|
|
*
|
|
* For more information see CWalletTx::nTimeSmart,
|
|
* https://bitcointalk.org/?topic=54527, or
|
|
* https://github.com/bitcoin/bitcoin/pull/1393.
|
|
*/
|
|
unsigned int CWallet::ComputeTimeSmart(const CWalletTx& wtx) const
|
|
{
|
|
unsigned int nTimeSmart = wtx.nTimeReceived;
|
|
if (!wtx.isUnconfirmed() && !wtx.isAbandoned()) {
|
|
int64_t blocktime;
|
|
if (chain().findBlock(wtx.m_confirm.hashBlock, FoundBlock().time(blocktime))) {
|
|
int64_t latestNow = wtx.nTimeReceived;
|
|
int64_t latestEntry = 0;
|
|
|
|
// Tolerate times up to the last timestamp in the wallet not more than 5 minutes into the future
|
|
int64_t latestTolerated = latestNow + 300;
|
|
const TxItems& txOrdered = wtxOrdered;
|
|
for (auto it = txOrdered.rbegin(); it != txOrdered.rend(); ++it) {
|
|
CWalletTx* const pwtx = it->second;
|
|
if (pwtx == &wtx) {
|
|
continue;
|
|
}
|
|
int64_t nSmartTime;
|
|
nSmartTime = pwtx->nTimeSmart;
|
|
if (!nSmartTime) {
|
|
nSmartTime = pwtx->nTimeReceived;
|
|
}
|
|
if (nSmartTime <= latestTolerated) {
|
|
latestEntry = nSmartTime;
|
|
if (nSmartTime > latestNow) {
|
|
latestNow = nSmartTime;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
nTimeSmart = std::max(latestEntry, std::min(blocktime, latestNow));
|
|
} else {
|
|
WalletLogPrintf("%s: found %s in block %s not in index\n", __func__, wtx.GetHash().ToString(), wtx.m_confirm.hashBlock.ToString());
|
|
}
|
|
}
|
|
return nTimeSmart;
|
|
}
|
|
|
|
bool CWallet::SetAddressUsed(WalletBatch& batch, const CTxDestination& dest, bool used)
|
|
{
|
|
const std::string key{"used"};
|
|
if (std::get_if<CNoDestination>(&dest))
|
|
return false;
|
|
|
|
if (!used) {
|
|
if (auto* data = util::FindKey(m_address_book, dest)) data->destdata.erase(key);
|
|
return batch.EraseDestData(EncodeDestination(dest), key);
|
|
}
|
|
|
|
const std::string value{"1"};
|
|
m_address_book[dest].destdata.insert(std::make_pair(key, value));
|
|
return batch.WriteDestData(EncodeDestination(dest), key, value);
|
|
}
|
|
|
|
void CWallet::LoadDestData(const CTxDestination &dest, const std::string &key, const std::string &value)
|
|
{
|
|
m_address_book[dest].destdata.insert(std::make_pair(key, value));
|
|
}
|
|
|
|
bool CWallet::IsAddressUsed(const CTxDestination& dest) const
|
|
{
|
|
const std::string key{"used"};
|
|
std::map<CTxDestination, CAddressBookData>::const_iterator i = m_address_book.find(dest);
|
|
if(i != m_address_book.end())
|
|
{
|
|
CAddressBookData::StringMap::const_iterator j = i->second.destdata.find(key);
|
|
if(j != i->second.destdata.end())
|
|
{
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
std::vector<std::string> CWallet::GetAddressReceiveRequests() const
|
|
{
|
|
const std::string prefix{"rr"};
|
|
std::vector<std::string> values;
|
|
for (const auto& address : m_address_book) {
|
|
for (const auto& data : address.second.destdata) {
|
|
if (!data.first.compare(0, prefix.size(), prefix)) {
|
|
values.emplace_back(data.second);
|
|
}
|
|
}
|
|
}
|
|
return values;
|
|
}
|
|
|
|
bool CWallet::SetAddressReceiveRequest(WalletBatch& batch, const CTxDestination& dest, const std::string& id, const std::string& value)
|
|
{
|
|
const std::string key{"rr" + id}; // "rr" prefix = "receive request" in destdata
|
|
CAddressBookData& data = m_address_book.at(dest);
|
|
if (value.empty()) {
|
|
if (!batch.EraseDestData(EncodeDestination(dest), key)) return false;
|
|
data.destdata.erase(key);
|
|
} else {
|
|
if (!batch.WriteDestData(EncodeDestination(dest), key, value)) return false;
|
|
data.destdata[key] = value;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
std::unique_ptr<WalletDatabase> MakeWalletDatabase(const std::string& name, const DatabaseOptions& options, DatabaseStatus& status, bilingual_str& error_string)
|
|
{
|
|
// Do some checking on wallet path. It should be either a:
|
|
//
|
|
// 1. Path where a directory can be created.
|
|
// 2. Path to an existing directory.
|
|
// 3. Path to a symlink to a directory.
|
|
// 4. For backwards compatibility, the name of a data file in -walletdir.
|
|
const fs::path wallet_path = fsbridge::AbsPathJoin(GetWalletDir(), fs::PathFromString(name));
|
|
fs::file_type path_type = fs::symlink_status(wallet_path).type();
|
|
if (!(path_type == fs::file_type::not_found || path_type == fs::file_type::directory ||
|
|
(path_type == fs::file_type::symlink && fs::is_directory(wallet_path)) ||
|
|
(path_type == fs::file_type::regular && fs::PathFromString(name).filename() == fs::PathFromString(name)))) {
|
|
error_string = Untranslated(strprintf(
|
|
"Invalid -wallet path '%s'. -wallet path should point to a directory where wallet.dat and "
|
|
"database/log.?????????? files can be stored, a location where such a directory could be created, "
|
|
"or (for backwards compatibility) the name of an existing data file in -walletdir (%s)",
|
|
name, fs::quoted(fs::PathToString(GetWalletDir()))));
|
|
status = DatabaseStatus::FAILED_BAD_PATH;
|
|
return nullptr;
|
|
}
|
|
|
|
return MakeDatabase(wallet_path, options, status, error_string);
|
|
}
|
|
|
|
std::shared_ptr<CWallet> CWallet::Create(interfaces::Chain* chain, interfaces::CoinJoin::Loader* coinjoin_loader, const std::string& name, std::unique_ptr<WalletDatabase> database, uint64_t wallet_creation_flags, bilingual_str& error, std::vector<bilingual_str>& warnings)
|
|
{
|
|
const std::string& walletFile = database->Filename();
|
|
|
|
int64_t nStart = GetTimeMillis();
|
|
// TODO: Can't use std::make_shared because we need a custom deleter but
|
|
// should be possible to use std::allocate_shared.
|
|
std::shared_ptr<CWallet> walletInstance(new CWallet(chain, coinjoin_loader, name, std::move(database)), ReleaseWallet);
|
|
// TODO: refactor this condition: validation of error looks like workaround
|
|
if (!walletInstance->AutoBackupWallet(fs::PathFromString(walletFile), error, warnings) && !error.original.empty()) {
|
|
return nullptr;
|
|
}
|
|
DBErrors nLoadWalletRet = walletInstance->LoadWallet();
|
|
if (nLoadWalletRet != DBErrors::LOAD_OK)
|
|
{
|
|
if (nLoadWalletRet == DBErrors::CORRUPT) {
|
|
error = strprintf(_("Error loading %s: Wallet corrupted"), walletFile);
|
|
return nullptr;
|
|
}
|
|
else if (nLoadWalletRet == DBErrors::NONCRITICAL_ERROR)
|
|
{
|
|
warnings.push_back(strprintf(_("Error reading %s! All keys read correctly, but transaction data"
|
|
" or address book entries might be missing or incorrect."),
|
|
walletFile));
|
|
}
|
|
else if (nLoadWalletRet == DBErrors::TOO_NEW) {
|
|
error = strprintf(_("Error loading %s: Wallet requires newer version of %s"), walletFile, PACKAGE_NAME);
|
|
return nullptr;
|
|
}
|
|
else if (nLoadWalletRet == DBErrors::NEED_REWRITE)
|
|
{
|
|
error = strprintf(_("Wallet needed to be rewritten: restart %s to complete"), PACKAGE_NAME);
|
|
return nullptr;
|
|
}
|
|
else {
|
|
error = strprintf(_("Error loading %s"), walletFile);
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
// This wallet is in its first run if there are no ScriptPubKeyMans and it isn't blank or no privkeys
|
|
const bool fFirstRun = walletInstance->m_spk_managers.empty() &&
|
|
!walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS) &&
|
|
!walletInstance->IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET);
|
|
if (fFirstRun)
|
|
{
|
|
walletInstance->SetMinVersion(FEATURE_LATEST);
|
|
|
|
walletInstance->AddWalletFlags(wallet_creation_flags);
|
|
|
|
// Only create LegacyScriptPubKeyMan when not descriptor wallet
|
|
if (!walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
|
|
walletInstance->SetupLegacyScriptPubKeyMan();
|
|
}
|
|
|
|
if (!(wallet_creation_flags & (WALLET_FLAG_DISABLE_PRIVATE_KEYS | WALLET_FLAG_BLANK_WALLET))) {
|
|
// Create new HD chain
|
|
if (gArgs.GetBoolArg("-usehd", DEFAULT_USE_HD_WALLET) && !walletInstance->IsHDEnabled()) {
|
|
std::string strSeed = gArgs.GetArg("-hdseed", "not hex");
|
|
|
|
// ensure this wallet.dat can only be opened by clients supporting HD
|
|
walletInstance->WalletLogPrintf("Upgrading wallet to HD\n");
|
|
walletInstance->SetMinVersion(FEATURE_HD);
|
|
|
|
if (gArgs.IsArgSet("-hdseed") && IsHex(strSeed)) {
|
|
CHDChain newHdChain;
|
|
std::vector<unsigned char> vchSeed = ParseHex(strSeed);
|
|
if (!newHdChain.SetSeed(SecureVector(vchSeed.begin(), vchSeed.end()), true)) {
|
|
error = strprintf(_("%s failed"), "SetSeed");
|
|
return nullptr;
|
|
}
|
|
LOCK(walletInstance->cs_wallet);
|
|
if (auto spk_man = walletInstance->GetLegacyScriptPubKeyMan()) {
|
|
if (!spk_man->AddHDChainSingle(newHdChain)) {
|
|
error = strprintf(_("%s failed"), "AddHDChainSingle");
|
|
return nullptr;
|
|
}
|
|
}
|
|
// add default account
|
|
newHdChain.AddAccount();
|
|
} else {
|
|
if (gArgs.IsArgSet("-hdseed") && !IsHex(strSeed)) {
|
|
error = strprintf(_("%s -- Incorrect seed, it should be a hex string"), __func__);
|
|
return nullptr;
|
|
}
|
|
SecureString secureMnemonic = gArgs.GetArg("-mnemonic", "").c_str();
|
|
SecureString secureMnemonicPassphrase = gArgs.GetArg("-mnemonicpassphrase", "").c_str();
|
|
LOCK(walletInstance->cs_wallet);
|
|
if (auto spk_man = walletInstance->GetLegacyScriptPubKeyMan()) {
|
|
spk_man->GenerateNewHDChain(secureMnemonic, secureMnemonicPassphrase);
|
|
}
|
|
}
|
|
|
|
// clean up
|
|
gArgs.ForceRemoveArg("hdseed");
|
|
gArgs.ForceRemoveArg("mnemonic");
|
|
gArgs.ForceRemoveArg("mnemonicpassphrase");
|
|
} // Otherwise, do not create a new HD chain
|
|
|
|
LOCK(walletInstance->cs_wallet);
|
|
if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
|
|
walletInstance->SetupDescriptorScriptPubKeyMans();
|
|
// SetupDescriptorScriptPubKeyMans already calls SetupGeneration for us so we don't need to call SetupGeneration separately
|
|
} else { // Top up the keypool
|
|
// Legacy wallets need SetupGeneration here.
|
|
if (auto spk_man = walletInstance->GetLegacyScriptPubKeyMan()) {
|
|
if (spk_man->CanGenerateKeys() && !spk_man->TopUp()) {
|
|
error = _("Unable to generate initial keys");
|
|
return nullptr;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (chain) {
|
|
walletInstance->chainStateFlushed(chain->getTipLocator());
|
|
}
|
|
|
|
// Try to create wallet backup right after new wallet was created
|
|
bilingual_str strBackupError;
|
|
if(!walletInstance->AutoBackupWallet("", strBackupError, warnings)) {
|
|
if (!strBackupError.original.empty()) {
|
|
error = strBackupError;
|
|
return nullptr;
|
|
}
|
|
}
|
|
} else if (wallet_creation_flags & WALLET_FLAG_DISABLE_PRIVATE_KEYS) {
|
|
// Make it impossible to disable private keys after creation
|
|
error = strprintf(_("Error loading %s: Private keys can only be disabled during creation"), walletFile);
|
|
return NULL;
|
|
} else if (walletInstance->IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
|
|
for (auto spk_man : walletInstance->GetActiveScriptPubKeyMans()) {
|
|
if (spk_man->HavePrivateKeys()) {
|
|
warnings.push_back(strprintf(_("Warning: Private keys detected in wallet {%s} with disabled private keys"), walletFile));
|
|
}
|
|
}
|
|
}
|
|
else if (gArgs.IsArgSet("-usehd")) {
|
|
bool useHD = gArgs.GetBoolArg("-usehd", DEFAULT_USE_HD_WALLET);
|
|
if (walletInstance->IsHDEnabled() && !useHD) {
|
|
error = strprintf(_("Error loading %s: You can't disable HD on an already existing HD wallet"), walletInstance->GetName());
|
|
return nullptr;
|
|
}
|
|
if (!walletInstance->IsHDEnabled() && useHD) {
|
|
error = strprintf(_("Error loading %s: You can't enable HD on an already existing non-HD wallet"), walletInstance->GetName());
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
// Warn user every time a non-encrypted HD wallet is started
|
|
if (walletInstance->IsHDEnabled() && !walletInstance->IsLocked()) {
|
|
SetMiscWarning(_("Make sure to encrypt your wallet and delete all non-encrypted backups after you have verified that the wallet works!"));
|
|
}
|
|
|
|
if (gArgs.IsArgSet("-mintxfee")) {
|
|
std::optional<CAmount> min_tx_fee = ParseMoney(gArgs.GetArg("-mintxfee", ""));
|
|
if (!min_tx_fee || min_tx_fee.value() == 0) {
|
|
error = AmountErrMsg("mintxfee", gArgs.GetArg("-mintxfee", ""));
|
|
return nullptr;
|
|
} else if (min_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
|
|
warnings.push_back(AmountHighWarn("-mintxfee") + Untranslated(" ") +
|
|
_("This is the minimum transaction fee you pay on every transaction."));
|
|
}
|
|
|
|
walletInstance->m_min_fee = CFeeRate{min_tx_fee.value()};
|
|
}
|
|
|
|
if (gArgs.IsArgSet("-maxapsfee")) {
|
|
const std::string max_aps_fee{gArgs.GetArg("-maxapsfee", "")};
|
|
if (max_aps_fee == "-1") {
|
|
walletInstance->m_max_aps_fee = -1;
|
|
} else if (std::optional<CAmount> max_fee = ParseMoney(max_aps_fee)) {
|
|
if (max_fee.value() > HIGH_APS_FEE) {
|
|
warnings.push_back(AmountHighWarn("-maxapsfee") + Untranslated(" ") +
|
|
_("This is the maximum transaction fee you pay (in addition to the normal fee) to prioritize partial spend avoidance over regular coin selection."));
|
|
}
|
|
walletInstance->m_max_aps_fee = max_fee.value();
|
|
} else {
|
|
error = AmountErrMsg("maxapsfee", max_aps_fee);
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
if (gArgs.IsArgSet("-fallbackfee")) {
|
|
std::optional<CAmount> fallback_fee = ParseMoney(gArgs.GetArg("-fallbackfee", ""));
|
|
if (!fallback_fee) {
|
|
error = strprintf(_("Invalid amount for -fallbackfee=<amount>: '%s'"), gArgs.GetArg("-fallbackfee", ""));
|
|
return nullptr;
|
|
} else if (fallback_fee.value() > HIGH_TX_FEE_PER_KB) {
|
|
warnings.push_back(AmountHighWarn("-fallbackfee") + Untranslated(" ") +
|
|
_("This is the transaction fee you may pay when fee estimates are not available."));
|
|
}
|
|
walletInstance->m_fallback_fee = CFeeRate{fallback_fee.value()};
|
|
}
|
|
// Disable fallback fee in case value was set to 0, enable if non-null value
|
|
walletInstance->m_allow_fallback_fee = walletInstance->m_fallback_fee.GetFeePerK() != 0;
|
|
|
|
if (gArgs.IsArgSet("-discardfee")) {
|
|
std::optional<CAmount> discard_fee = ParseMoney(gArgs.GetArg("-discardfee", ""));
|
|
if (!discard_fee) {
|
|
error = strprintf(_("Invalid amount for -discardfee=<amount>: '%s'"), gArgs.GetArg("-discardfee", ""));
|
|
return nullptr;
|
|
} else if (discard_fee.value() > HIGH_TX_FEE_PER_KB) {
|
|
warnings.push_back(AmountHighWarn("-discardfee") + Untranslated(" ") +
|
|
_("This is the transaction fee you may discard if change is smaller than dust at this level"));
|
|
}
|
|
walletInstance->m_discard_rate = CFeeRate{discard_fee.value()};
|
|
}
|
|
|
|
if (gArgs.IsArgSet("-paytxfee")) {
|
|
std::optional<CAmount> pay_tx_fee = ParseMoney(gArgs.GetArg("-paytxfee", ""));
|
|
if (!pay_tx_fee) {
|
|
error = AmountErrMsg("paytxfee", gArgs.GetArg("-paytxfee", ""));
|
|
return nullptr;
|
|
} else if (pay_tx_fee.value() > HIGH_TX_FEE_PER_KB) {
|
|
warnings.push_back(AmountHighWarn("-paytxfee") + Untranslated(" ") +
|
|
_("This is the transaction fee you will pay if you send a transaction."));
|
|
}
|
|
walletInstance->m_pay_tx_fee = CFeeRate{pay_tx_fee.value(), 1000};
|
|
if (chain && walletInstance->m_pay_tx_fee < chain->relayMinFee()) {
|
|
error = strprintf(_("Invalid amount for -paytxfee=<amount>: '%s' (must be at least %s)"),
|
|
gArgs.GetArg("-paytxfee", ""), chain->relayMinFee().ToString());
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
if (gArgs.IsArgSet("-maxtxfee")) {
|
|
std::optional<CAmount> max_fee = ParseMoney(gArgs.GetArg("-maxtxfee", ""));
|
|
if (!max_fee) {
|
|
error = AmountErrMsg("maxtxfee", gArgs.GetArg("-maxtxfee", ""));
|
|
return nullptr;
|
|
} else if (max_fee.value() > HIGH_MAX_TX_FEE) {
|
|
warnings.push_back(_("-maxtxfee is set very high! Fees this large could be paid on a single transaction."));
|
|
}
|
|
if (chain && CFeeRate{max_fee.value(), 1000} < chain->relayMinFee()) {
|
|
error = strprintf(_("Invalid amount for -maxtxfee=<amount>: '%s' (must be at least the minrelay fee of %s to prevent stuck transactions)"),
|
|
gArgs.GetArg("-maxtxfee", ""), chain->relayMinFee().ToString());
|
|
return nullptr;
|
|
}
|
|
|
|
walletInstance->m_default_max_tx_fee = max_fee.value();
|
|
}
|
|
|
|
if (chain && chain->relayMinFee().GetFeePerK() > HIGH_TX_FEE_PER_KB)
|
|
warnings.push_back(AmountHighWarn("-minrelaytxfee") + Untranslated(" ") +
|
|
_("The wallet will avoid paying less than the minimum relay fee."));
|
|
|
|
walletInstance->m_confirm_target = gArgs.GetArg("-txconfirmtarget", DEFAULT_TX_CONFIRM_TARGET);
|
|
walletInstance->m_spend_zero_conf_change = gArgs.GetBoolArg("-spendzeroconfchange", DEFAULT_SPEND_ZEROCONF_CHANGE);
|
|
|
|
walletInstance->WalletLogPrintf("Wallet completed loading in %15dms\n", GetTimeMillis() - nStart);
|
|
|
|
// Try to top up keypool. No-op if the wallet is locked.
|
|
walletInstance->TopUpKeyPool();
|
|
|
|
if (chain && !AttachChain(walletInstance, *chain, error, warnings)) {
|
|
return nullptr;
|
|
}
|
|
|
|
if (coinjoin_loader) {
|
|
coinjoin_loader->AddWallet(*walletInstance);
|
|
}
|
|
|
|
{
|
|
LOCK(cs_wallets);
|
|
for (auto& load_wallet : g_load_wallet_fns) {
|
|
load_wallet(interfaces::MakeWallet(walletInstance));
|
|
}
|
|
}
|
|
|
|
|
|
{
|
|
LOCK(walletInstance->cs_wallet);
|
|
walletInstance->SetBroadcastTransactions(gArgs.GetBoolArg("-walletbroadcast", DEFAULT_WALLETBROADCAST));
|
|
walletInstance->WalletLogPrintf("setExternalKeyPool.size() = %u\n", walletInstance->KeypoolCountExternalKeys());
|
|
walletInstance->WalletLogPrintf("GetKeyPoolSize() = %u\n", walletInstance->GetKeyPoolSize());
|
|
walletInstance->WalletLogPrintf("mapWallet.size() = %u\n", walletInstance->mapWallet.size());
|
|
walletInstance->WalletLogPrintf("m_address_book.size() = %u\n", walletInstance->m_address_book.size());
|
|
for (auto spk_man : walletInstance->GetAllScriptPubKeyMans()) {
|
|
walletInstance->WalletLogPrintf("nTimeFirstKey = %u\n", spk_man->GetTimeFirstKey());
|
|
}
|
|
}
|
|
|
|
return walletInstance;
|
|
}
|
|
|
|
bool CWallet::AttachChain(const std::shared_ptr<CWallet>& walletInstance, interfaces::Chain& chain, bilingual_str& error, std::vector<bilingual_str>& warnings)
|
|
{
|
|
LOCK(walletInstance->cs_wallet);
|
|
// allow setting the chain if it hasn't been set already but prevent changing it
|
|
assert(!walletInstance->m_chain || walletInstance->m_chain == &chain);
|
|
walletInstance->m_chain = &chain;
|
|
|
|
// Register wallet with validationinterface. It's done before rescan to avoid
|
|
// missing block connections between end of rescan and validation subscribing.
|
|
// Because of wallet lock being hold, block connection notifications are going to
|
|
// be pending on the validation-side until lock release. It's likely to have
|
|
// block processing duplicata (if rescan block range overlaps with notification one)
|
|
// but we guarantee at least than wallet state is correct after notifications delivery.
|
|
// However, chainStateFlushed notifications are ignored until the rescan is finished
|
|
// so that in case of a shutdown event, the rescan will be repeated at the next start.
|
|
// This is temporary until rescan and notifications delivery are unified under same
|
|
// interface.
|
|
walletInstance->m_attaching_chain = true; //ignores chainStateFlushed notifications
|
|
walletInstance->m_chain_notifications_handler = walletInstance->chain().handleNotifications(walletInstance);
|
|
|
|
int rescan_height = 0;
|
|
if (!gArgs.GetBoolArg("-rescan", false))
|
|
{
|
|
WalletBatch batch(walletInstance->GetDatabase());
|
|
CBlockLocator locator;
|
|
if (batch.ReadBestBlock(locator)) {
|
|
if (const std::optional<int> fork_height = chain.findLocatorFork(locator)) {
|
|
rescan_height = *fork_height;
|
|
}
|
|
}
|
|
}
|
|
|
|
const std::optional<int> tip_height = chain.getHeight();
|
|
if (tip_height) {
|
|
walletInstance->m_last_block_processed = chain.getBlockHash(*tip_height);
|
|
walletInstance->m_last_block_processed_height = *tip_height;
|
|
} else {
|
|
walletInstance->m_last_block_processed.SetNull();
|
|
walletInstance->m_last_block_processed_height = -1;
|
|
}
|
|
|
|
if (tip_height && *tip_height != rescan_height)
|
|
{
|
|
// Technically we could execute the code below in any case, but performing the
|
|
// `while` loop below can make startup very slow, so only check blocks on disk
|
|
// if necessary.
|
|
if (chain.havePruned() || chain.hasAssumedValidChain()) {
|
|
int block_height = *tip_height;
|
|
while (block_height > 0 && chain.haveBlockOnDisk(block_height - 1) && rescan_height != block_height) {
|
|
--block_height;
|
|
}
|
|
|
|
if (rescan_height != block_height) {
|
|
// We can't rescan beyond blocks we don't have data for, stop and throw an error.
|
|
// This might happen if a user uses an old wallet within a pruned node
|
|
// or if they ran -disablewallet for a longer time, then decided to re-enable
|
|
// Exit early and print an error.
|
|
// It also may happen if an assumed-valid chain is in use and therefore not
|
|
// all block data is available.
|
|
// If a block is pruned after this check, we will load the wallet,
|
|
// but fail the rescan with a generic error.
|
|
|
|
error = chain.havePruned() ?
|
|
_("Prune: last wallet synchronisation goes beyond pruned data. You need to -reindex (download the whole blockchain again in case of pruned node)") :
|
|
strprintf(_(
|
|
"Error loading wallet. Wallet requires blocks to be downloaded, "
|
|
"and software does not currently support loading wallets while "
|
|
"blocks are being downloaded out of order when using assumeutxo "
|
|
"snapshots. Wallet should be able to load successfully after "
|
|
"node sync reaches height %s"), block_height);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
chain.initMessage(_("Rescanning…").translated);
|
|
walletInstance->WalletLogPrintf("Rescanning last %i blocks (from block %i)...\n", *tip_height - rescan_height, rescan_height);
|
|
|
|
// No need to read and scan block if block was created before
|
|
// our wallet birthday (as adjusted for block time variability)
|
|
// unless a full rescan was requested
|
|
if (gArgs.GetArg("-rescan", 0) != 2) {
|
|
std::optional<int64_t> time_first_key;
|
|
for (auto spk_man : walletInstance->GetAllScriptPubKeyMans()) {
|
|
int64_t time = spk_man->GetTimeFirstKey();
|
|
if (!time_first_key || time < *time_first_key) time_first_key = time;
|
|
}
|
|
if (time_first_key) {
|
|
chain.findFirstBlockWithTimeAndHeight(*time_first_key - TIMESTAMP_WINDOW, rescan_height, FoundBlock().height(rescan_height));
|
|
}
|
|
}
|
|
|
|
{
|
|
WalletRescanReserver reserver(*walletInstance);
|
|
if (!reserver.reserve() || (ScanResult::SUCCESS != walletInstance->ScanForWalletTransactions(chain.getBlockHash(rescan_height), rescan_height, {} /* max height */, reserver, true /* update */).status)) {
|
|
error = _("Failed to rescan the wallet during initialization");
|
|
return false;
|
|
}
|
|
}
|
|
walletInstance->m_attaching_chain = false;
|
|
walletInstance->chainStateFlushed(chain.getTipLocator());
|
|
walletInstance->GetDatabase().IncrementUpdateCounter();
|
|
}
|
|
walletInstance->m_attaching_chain = false;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::UpgradeWallet(int version, bilingual_str& error)
|
|
{
|
|
int prev_version = GetVersion();
|
|
int nMaxVersion = version;
|
|
auto nMinVersion = DEFAULT_USE_HD_WALLET ? FEATURE_LATEST : FEATURE_COMPRPUBKEY;
|
|
if (nMaxVersion == 0) {
|
|
WalletLogPrintf("Performing wallet upgrade to %i\n", nMinVersion);
|
|
nMaxVersion = FEATURE_LATEST;
|
|
SetMinVersion(nMinVersion); // permanently upgrade the wallet immediately
|
|
} else {
|
|
WalletLogPrintf("Allowing wallet upgrade up to %i\n", nMaxVersion);
|
|
}
|
|
|
|
if (nMaxVersion < GetVersion()) {
|
|
error = strprintf(_("Cannot downgrade wallet from version %i to version %i. Wallet version unchanged."), prev_version, version);
|
|
return false;
|
|
}
|
|
|
|
// TODO: consider discourage users to skip passphrase for HD wallets for v21
|
|
if (false && nMaxVersion >= FEATURE_HD && !IsHDEnabled()) {
|
|
error = Untranslated("You should use upgradetohd RPC to upgrade non-HD wallet to HD");
|
|
error = strprintf(_("Cannot upgrade a non HD wallet from version %i to version %i which is non-HD wallet. Use upgradetohd RPC"), prev_version, version);
|
|
return false;
|
|
}
|
|
|
|
SetMinVersion(GetClosestWalletFeature(version));
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::UpgradeToHD(const SecureString& secureMnemonic, const SecureString& secureMnemonicPassphrase, const SecureString& secureWalletPassphrase, bilingual_str& error)
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
// Do not do anything to HD wallets
|
|
if (IsHDEnabled()) {
|
|
error = Untranslated("Cannot upgrade a wallet to HD if it is already upgraded to HD.");
|
|
return false;
|
|
}
|
|
|
|
if (IsWalletFlagSet(WALLET_FLAG_DISABLE_PRIVATE_KEYS)) {
|
|
error = Untranslated("Private keys are disabled for this wallet");
|
|
return false;
|
|
}
|
|
|
|
if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
|
|
error = Untranslated("Use RPC 'importdescriptors' to add new descriptors to Descriptor Wallets");
|
|
return false;
|
|
}
|
|
|
|
WalletLogPrintf("Upgrading wallet to HD\n");
|
|
SetMinVersion(FEATURE_HD);
|
|
|
|
if (!GenerateNewHDChain(secureMnemonic, secureMnemonicPassphrase, secureWalletPassphrase)) {
|
|
error = Untranslated("Failed to generate HD wallet");
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
const CAddressBookData* CWallet::FindAddressBookEntry(const CTxDestination& dest, bool allow_change) const
|
|
{
|
|
const auto& address_book_it = m_address_book.find(dest);
|
|
if (address_book_it == m_address_book.end()) return nullptr;
|
|
if ((!allow_change) && address_book_it->second.IsChange()) {
|
|
return nullptr;
|
|
}
|
|
return &address_book_it->second;
|
|
}
|
|
|
|
void CWallet::postInitProcess()
|
|
{
|
|
LOCK(cs_wallet);
|
|
|
|
// Add wallet transactions that aren't already in a block to mempool
|
|
// Do this here as mempool requires genesis block to be loaded
|
|
ReacceptWalletTransactions();
|
|
|
|
// Update wallet transactions with current mempool transactions.
|
|
chain().requestMempoolTransactions(*this);
|
|
}
|
|
|
|
bool CWallet::InitAutoBackup()
|
|
{
|
|
if (gArgs.GetBoolArg("-disablewallet", DEFAULT_DISABLE_WALLET))
|
|
return true;
|
|
|
|
nWalletBackups = gArgs.GetArg("-createwalletbackups", 10);
|
|
nWalletBackups = std::max(0, std::min(10, nWalletBackups));
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::BackupWallet(const std::string& strDest) const
|
|
{
|
|
return GetDatabase().Backup(strDest);
|
|
}
|
|
|
|
// This should be called carefully:
|
|
// either supply the actual wallet_path to make a raw copy of wallet.dat or "" to backup current instance via BackupWallet()
|
|
#ifdef USE_BDB
|
|
bool CWallet::AutoBackupWallet(const fs::path& wallet_path, bilingual_str& error_string, std::vector<bilingual_str>& warnings)
|
|
{
|
|
std::string strWalletName = GetName();
|
|
if (strWalletName.empty()) {
|
|
strWalletName = "wallet.dat";
|
|
}
|
|
// This condition is required to be sure that wallet.dat won't be re-opened by IsBDBFile
|
|
// Re-opening of database file brokes an exclusive inter-process lock for SQLite
|
|
if (m_database && !m_database->SupportsAutoBackup()) {
|
|
WalletLogPrintf("Automatic wallet backups are not supported!\n");
|
|
return false;
|
|
}
|
|
if (!wallet_path.empty() && !IsBDBFile(BDBDataFile(wallet_path))) {
|
|
WalletLogPrintf("Automatic wallet backups are currently only supported with Berkeley DB!\n");
|
|
return false;
|
|
}
|
|
|
|
if (IsWalletFlagSet(WALLET_FLAG_BLANK_WALLET)) {
|
|
WalletLogPrintf("Wallet is blank, won't create new backup for it!\n");
|
|
return false;
|
|
}
|
|
|
|
if (nWalletBackups <= 0) {
|
|
WalletLogPrintf("Automatic wallet backups are disabled!\n");
|
|
return false;
|
|
}
|
|
|
|
fs::path backupsDir = gArgs.GetBackupsDirPath();
|
|
backupsDir.make_preferred();
|
|
|
|
if (!fs::exists(backupsDir))
|
|
{
|
|
// Always create backup folder to not confuse the operating system's file browser
|
|
WalletLogPrintf("Creating backup folder %s\n", fs::PathToString(backupsDir));
|
|
if(!fs::create_directories(backupsDir)) {
|
|
// something is wrong, we shouldn't continue until it's resolved
|
|
error_string = strprintf(_("Wasn't able to create wallet backup folder %s!"), fs::PathToString(backupsDir));
|
|
WalletLogPrintf("%s\n", error_string.translated);
|
|
nWalletBackups = -1;
|
|
return false;
|
|
}
|
|
} else if (!fs::is_directory(backupsDir)) {
|
|
// something is wrong, we shouldn't continue until it's resolved
|
|
error_string = strprintf(_("%s is not a valid backup folder!"), fs::PathToString(backupsDir));
|
|
WalletLogPrintf("%s\n", error_string.translated);
|
|
nWalletBackups = -1;
|
|
return false;
|
|
}
|
|
|
|
// Create backup of the ...
|
|
struct tm ts;
|
|
time_t time_val = GetTime();
|
|
#ifdef HAVE_GMTIME_R
|
|
gmtime_r(&time_val, &ts);
|
|
#else
|
|
gmtime_s(&ts, &time_val);
|
|
#endif
|
|
std::string dateTimeStr = strprintf(".%04i-%02i-%02i-%02i-%02i",
|
|
ts.tm_year + 1900, ts.tm_mon + 1, ts.tm_mday, ts.tm_hour, ts.tm_min);
|
|
|
|
if (wallet_path.empty()) {
|
|
// ... opened wallet
|
|
LOCK(cs_wallet);
|
|
fs::path backupFile = backupsDir / (strWalletName + dateTimeStr);
|
|
backupFile.make_preferred();
|
|
if (!BackupWallet(fs::PathToString(backupFile))) {
|
|
warnings.push_back(strprintf(_("Failed to create backup %s!"), fs::PathToString(backupFile)));
|
|
WalletLogPrintf("%s\n", Join(warnings, Untranslated("\n")).original);
|
|
nWalletBackups = -1;
|
|
return false;
|
|
}
|
|
|
|
// Update nKeysLeftSinceAutoBackup using current external keypool size
|
|
nKeysLeftSinceAutoBackup = KeypoolCountExternalKeys();
|
|
WalletLogPrintf("nKeysLeftSinceAutoBackup: %d\n", nKeysLeftSinceAutoBackup);
|
|
if (IsLocked(true)) {
|
|
warnings.push_back(_("Wallet is locked, can't replenish keypool! Automatic backups and mixing are disabled, please unlock your wallet to replenish keypool."));
|
|
WalletLogPrintf("%s\n", Join(warnings, Untranslated("\n")).original);
|
|
nWalletBackups = -2;
|
|
return false;
|
|
}
|
|
} else {
|
|
// ... strWalletName file
|
|
fs::path strSourceFile = BDBDataFile(wallet_path);
|
|
std::shared_ptr<BerkeleyEnvironment> env = GetBerkeleyEnv(strSourceFile.parent_path());
|
|
fs::path sourceFile = env->Directory() / strSourceFile;
|
|
fs::path backupFile = backupsDir / (strWalletName + dateTimeStr);
|
|
sourceFile.make_preferred();
|
|
backupFile.make_preferred();
|
|
if (fs::exists(backupFile))
|
|
{
|
|
warnings.push_back(_("Failed to create backup, file already exists! This could happen if you restarted wallet in less than 60 seconds. You can continue if you are ok with this."));
|
|
WalletLogPrintf("%s\n", Join(warnings, Untranslated("\n")).original);
|
|
return false;
|
|
}
|
|
if(fs::exists(sourceFile)) {
|
|
try {
|
|
fs::copy_file(sourceFile, backupFile, fs::copy_options::none);
|
|
WalletLogPrintf("Creating backup of %s -> %s\n", fs::PathToString(sourceFile), fs::PathToString(backupFile));
|
|
} catch(fs::filesystem_error &error) {
|
|
warnings.push_back(strprintf(_("Failed to create backup, error: %s"), fsbridge::get_filesystem_error_message(error)));
|
|
WalletLogPrintf("%s\n", Join(warnings, Untranslated("\n")).original);
|
|
nWalletBackups = -1;
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Keep only the last 10 backups, including the new one of course
|
|
typedef std::multimap<std::time_t, fs::path> folder_set_t;
|
|
folder_set_t folder_set;
|
|
fs::directory_iterator end_iter;
|
|
// Build map of backup files for current(!) wallet sorted by last write time
|
|
fs::path currentFile;
|
|
for (fs::directory_iterator dir_iter(backupsDir); dir_iter != end_iter; ++dir_iter)
|
|
{
|
|
// Only check regular files
|
|
if ( fs::is_regular_file(dir_iter->status()))
|
|
{
|
|
currentFile = dir_iter->path().filename();
|
|
// Only add the backups for the current wallet, e.g. wallet.dat.*
|
|
if (fs::PathToString(dir_iter->path().stem()) == strWalletName) {
|
|
folder_set.insert(folder_set_t::value_type(
|
|
// TODO: C++17 compliant time conversion code is abominable, switch to C++20
|
|
// compliant code when C++17 support is dropped
|
|
std::chrono::system_clock::to_time_t(
|
|
std::chrono::time_point_cast<std::chrono::system_clock::duration>(
|
|
fs::last_write_time(dir_iter->path()) - fs::file_time_type::clock::now() + std::chrono::system_clock::now()
|
|
)
|
|
),
|
|
*dir_iter
|
|
));
|
|
}
|
|
}
|
|
}
|
|
|
|
// Loop backward through backup files and keep the N newest ones (1 <= N <= 10)
|
|
int counter = 0;
|
|
for(auto it = folder_set.rbegin(); it != folder_set.rend(); ++it) {
|
|
std::pair<const std::time_t, fs::path> file = *it;
|
|
counter++;
|
|
if (counter > nWalletBackups)
|
|
{
|
|
// More than nWalletBackups backups: delete oldest one(s)
|
|
try {
|
|
fs::remove(file.second);
|
|
WalletLogPrintf("Old backup deleted: %s\n", fs::PathToString(file.second));
|
|
} catch(fs::filesystem_error &error) {
|
|
warnings.push_back(strprintf(_("Failed to delete backup, error: %s"), fsbridge::get_filesystem_error_message(error)));
|
|
WalletLogPrintf("%s\n", Join(warnings, Untranslated("\n")).original);
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
#elif defined(USE_SQLITE)
|
|
bool CWallet::AutoBackupWallet(const fs::path& wallet_path, bilingual_str& error_string, std::vector<bilingual_str>& warnings)
|
|
{
|
|
WalletLogPrintf("Automatic wallet backups are currently only supported with Berkeley DB!\n");
|
|
return false;
|
|
}
|
|
#endif // USE_BDB
|
|
|
|
void CWallet::notifyTransactionLock(const CTransactionRef &tx, const std::shared_ptr<const llmq::CInstantSendLock>& islock)
|
|
{
|
|
LOCK(cs_wallet);
|
|
// Only notify UI if this transaction is in this wallet
|
|
uint256 txHash = tx->GetHash();
|
|
std::map<uint256, CWalletTx>::const_iterator mi = mapWallet.find(txHash);
|
|
if (mi != mapWallet.end()){
|
|
NotifyTransactionChanged(txHash, CT_UPDATED);
|
|
NotifyISLockReceived();
|
|
#if HAVE_SYSTEM
|
|
// notify an external script
|
|
std::string strCmd = gArgs.GetArg("-instantsendnotify", "");
|
|
if (!strCmd.empty()) {
|
|
ReplaceAll(strCmd, "%s", txHash.GetHex());
|
|
#ifndef WIN32
|
|
// Substituting the wallet name isn't currently supported on windows
|
|
// because windows shell escaping has not been implemented yet:
|
|
// https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-537384875
|
|
// A few ways it could be implemented in the future are described in:
|
|
// https://github.com/bitcoin/bitcoin/pull/13339#issuecomment-461288094
|
|
ReplaceAll(strCmd, "%w", ShellEscape(GetName()));
|
|
#endif
|
|
std::thread t(runCommand, strCmd);
|
|
t.detach(); // thread runs free
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void CWallet::notifyChainLock(const CBlockIndex* pindexChainLock, const std::shared_ptr<const llmq::CChainLockSig>& clsig)
|
|
{
|
|
NotifyChainLockReceived(pindexChainLock->nHeight);
|
|
}
|
|
|
|
bool CWallet::LoadGovernanceObject(const Governance::Object& obj)
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
return m_gobjects.emplace(obj.GetHash(), obj).second;
|
|
}
|
|
|
|
bool CWallet::WriteGovernanceObject(const Governance::Object& obj)
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
WalletBatch batch(GetDatabase());
|
|
return batch.WriteGovernanceObject(obj) && LoadGovernanceObject(obj);
|
|
}
|
|
|
|
std::vector<const Governance::Object*> CWallet::GetGovernanceObjects()
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
std::vector<const Governance::Object*> vecObjects;
|
|
vecObjects.reserve(m_gobjects.size());
|
|
for (auto& obj : m_gobjects) {
|
|
vecObjects.push_back(&obj.second);
|
|
}
|
|
return vecObjects;
|
|
}
|
|
|
|
CKeyPool::CKeyPool()
|
|
{
|
|
nTime = GetTime();
|
|
fInternal = false;
|
|
}
|
|
|
|
CKeyPool::CKeyPool(const CPubKey& vchPubKeyIn, bool fInternalIn)
|
|
{
|
|
nTime = GetTime();
|
|
vchPubKey = vchPubKeyIn;
|
|
fInternal = fInternalIn;
|
|
}
|
|
|
|
int CWalletTx::GetDepthInMainChain() const
|
|
{
|
|
assert(pwallet != nullptr);
|
|
AssertLockHeld(pwallet->cs_wallet);
|
|
if (isUnconfirmed() || isAbandoned()) return 0;
|
|
|
|
return (pwallet->GetLastBlockHeight() - m_confirm.block_height + 1) * (isConflicted() ? -1 : 1);
|
|
}
|
|
|
|
bool CWalletTx::IsLockedByInstantSend() const
|
|
{
|
|
if (fIsChainlocked) {
|
|
fIsInstantSendLocked = false;
|
|
} else if (!fIsInstantSendLocked) {
|
|
fIsInstantSendLocked = pwallet->chain().isInstantSendLockedTx(GetHash());
|
|
}
|
|
return fIsInstantSendLocked;
|
|
}
|
|
|
|
bool CWalletTx::IsChainLocked() const
|
|
{
|
|
if (!fIsChainlocked) {
|
|
assert(pwallet != nullptr);
|
|
AssertLockHeld(pwallet->cs_wallet);
|
|
bool active;
|
|
int height;
|
|
if (pwallet->chain().findBlock(m_confirm.hashBlock, FoundBlock().inActiveChain(active).height(height)) && active) {
|
|
fIsChainlocked = pwallet->chain().hasChainLock(height, m_confirm.hashBlock);
|
|
}
|
|
}
|
|
return fIsChainlocked;
|
|
}
|
|
|
|
int CWalletTx::GetBlocksToMaturity() const
|
|
{
|
|
if (!IsCoinBase())
|
|
return 0;
|
|
int chain_depth = GetDepthInMainChain();
|
|
assert(chain_depth >= 0); // coinbase tx should not be conflicted
|
|
return std::max(0, (COINBASE_MATURITY+1) - chain_depth);
|
|
}
|
|
|
|
bool CWalletTx::IsImmatureCoinBase() const
|
|
{
|
|
// note GetBlocksToMaturity is 0 for non-coinbase tx
|
|
return GetBlocksToMaturity() > 0;
|
|
}
|
|
|
|
std::vector<OutputGroup> CWallet::GroupOutputs(const std::vector<COutput>& outputs, bool separate_coins, const CFeeRate& effective_feerate, const CFeeRate& long_term_feerate, const CoinEligibilityFilter& filter, bool positive_only) const
|
|
{
|
|
std::vector<OutputGroup> groups_out;
|
|
|
|
if (separate_coins) {
|
|
// Single coin means no grouping. Each COutput gets its own OutputGroup.
|
|
for (const COutput& output : outputs) {
|
|
// Skip outputs we cannot spend
|
|
if (!output.fSpendable) continue;
|
|
|
|
size_t ancestors, descendants;
|
|
chain().getTransactionAncestry(output.tx->GetHash(), ancestors, descendants);
|
|
CInputCoin input_coin = output.GetInputCoin();
|
|
|
|
// Make an OutputGroup containing just this output
|
|
OutputGroup group{effective_feerate, long_term_feerate};
|
|
group.Insert(input_coin, output.nDepth, output.tx->IsFromMe(ISMINE_ALL), ancestors, descendants, positive_only);
|
|
|
|
// Check the OutputGroup's eligibility. Only add the eligible ones.
|
|
if (positive_only && group.effective_value <= 0) continue;
|
|
bool isISLocked = isGroupISLocked(group, chain());
|
|
if (group.m_outputs.size() > 0 && group.EligibleForSpending(filter, isISLocked)) groups_out.push_back(group);
|
|
}
|
|
return groups_out;
|
|
}
|
|
|
|
// We want to combine COutputs that have the same scriptPubKey into single OutputGroups
|
|
// except when there are more than OUTPUT_GROUP_MAX_ENTRIES COutputs grouped in an OutputGroup.
|
|
// To do this, we maintain a map where the key is the scriptPubKey and the value is a vector of OutputGroups.
|
|
// For each COutput, we check if the scriptPubKey is in the map, and if it is, the COutput's CInputCoin is added
|
|
// to the last OutputGroup in the vector for the scriptPubKey. When the last OutputGroup has
|
|
// OUTPUT_GROUP_MAX_ENTRIES CInputCoins, a new OutputGroup is added to the end of the vector.
|
|
std::map<CScript, std::vector<OutputGroup>> spk_to_groups_map;
|
|
for (const auto& output : outputs) {
|
|
// Skip outputs we cannot spend
|
|
if (!output.fSpendable) continue;
|
|
|
|
size_t ancestors, descendants;
|
|
chain().getTransactionAncestry(output.tx->GetHash(), ancestors, descendants);
|
|
CInputCoin input_coin = output.GetInputCoin();
|
|
CScript spk = input_coin.txout.scriptPubKey;
|
|
|
|
std::vector<OutputGroup>& groups = spk_to_groups_map[spk];
|
|
|
|
if (groups.size() == 0) {
|
|
// No OutputGroups for this scriptPubKey yet, add one
|
|
groups.emplace_back(effective_feerate, long_term_feerate);
|
|
}
|
|
|
|
// Get the last OutputGroup in the vector so that we can add the CInputCoin to it
|
|
// A pointer is used here so that group can be reassigned later if it is full.
|
|
OutputGroup* group = &groups.back();
|
|
|
|
// Check if this OutputGroup is full. We limit to OUTPUT_GROUP_MAX_ENTRIES when using -avoidpartialspends
|
|
// to avoid surprising users with very high fees.
|
|
if (group->m_outputs.size() >= OUTPUT_GROUP_MAX_ENTRIES) {
|
|
// The last output group is full, add a new group to the vector and use that group for the insertion
|
|
groups.emplace_back(effective_feerate, long_term_feerate);
|
|
group = &groups.back();
|
|
}
|
|
|
|
// Add the input_coin to group
|
|
group->Insert(input_coin, output.nDepth, output.tx->IsFromMe(ISMINE_ALL), ancestors, descendants, positive_only);
|
|
}
|
|
|
|
// Now we go through the entire map and pull out the OutputGroups
|
|
for (const auto& spk_and_groups_pair: spk_to_groups_map) {
|
|
const std::vector<OutputGroup>& groups_per_spk= spk_and_groups_pair.second;
|
|
|
|
// Go through the vector backwards. This allows for the first item we deal with being the partial group.
|
|
for (auto group_it = groups_per_spk.rbegin(); group_it != groups_per_spk.rend(); group_it++) {
|
|
const OutputGroup& group = *group_it;
|
|
|
|
// Don't include partial groups if there are full groups too and we don't want partial groups
|
|
if (group_it == groups_per_spk.rbegin() && groups_per_spk.size() > 1 && !filter.m_include_partial_groups) {
|
|
continue;
|
|
}
|
|
|
|
// Check the OutputGroup's eligibility. Only add the eligible ones.
|
|
if (positive_only && group.effective_value <= 0) continue;
|
|
bool isISLocked = isGroupISLocked(group, chain());
|
|
if (group.m_outputs.size() > 0 && group.EligibleForSpending(filter, isISLocked)) groups_out.push_back(group);
|
|
}
|
|
}
|
|
|
|
return groups_out;
|
|
}
|
|
|
|
bool CWallet::IsCrypted() const
|
|
{
|
|
return HasEncryptionKeys();
|
|
}
|
|
|
|
// This function should be used in a different combinations to determine
|
|
// if FillableSigningProvider is fully locked so that no operations requiring access
|
|
// to private keys are possible:
|
|
// IsLocked(true)
|
|
// or if FillableSigningProvider's private keys are available for mixing only:
|
|
// !IsLocked(true) && IsLocked()
|
|
// or if they are available for everything:
|
|
// !IsLocked()
|
|
bool CWallet::IsLocked(bool fForMixing) const
|
|
{
|
|
if (!IsCrypted())
|
|
return false;
|
|
|
|
if(!fForMixing && fOnlyMixingAllowed) return true;
|
|
|
|
LOCK(cs_wallet);
|
|
return vMasterKey.empty();
|
|
}
|
|
|
|
bool CWallet::Lock(bool fAllowMixing)
|
|
{
|
|
if (!IsCrypted())
|
|
return false;
|
|
|
|
if(!fAllowMixing) {
|
|
LOCK(cs_wallet);
|
|
if (!vMasterKey.empty()) {
|
|
memory_cleanse(vMasterKey.data(), vMasterKey.size() * sizeof(decltype(vMasterKey)::value_type));
|
|
vMasterKey.clear();
|
|
}
|
|
}
|
|
|
|
fOnlyMixingAllowed = fAllowMixing;
|
|
NotifyStatusChanged(this);
|
|
return true;
|
|
}
|
|
|
|
bool CWallet::Unlock(const SecureString& strWalletPassphrase, bool fForMixingOnly, bool accept_no_keys)
|
|
{
|
|
if (!IsLocked()) // was already fully unlocked, not only for mixing
|
|
return true;
|
|
|
|
CCrypter crypter;
|
|
CKeyingMaterial _vMasterKey;
|
|
|
|
{
|
|
LOCK(cs_wallet);
|
|
for (const MasterKeyMap::value_type& pMasterKey : mapMasterKeys)
|
|
{
|
|
if (!crypter.SetKeyFromPassphrase(strWalletPassphrase, pMasterKey.second.vchSalt, pMasterKey.second.nDeriveIterations, pMasterKey.second.nDerivationMethod))
|
|
return false;
|
|
if (!crypter.Decrypt(pMasterKey.second.vchCryptedKey, _vMasterKey))
|
|
continue; // try another master key
|
|
if (Unlock(_vMasterKey, fForMixingOnly, accept_no_keys)) {
|
|
// Now that we've unlocked, upgrade the key metadata
|
|
UpgradeKeyMetadata();
|
|
if(nWalletBackups == -2) {
|
|
TopUpKeyPool();
|
|
WalletLogPrintf("Keypool replenished, re-initializing automatic backups.\n");
|
|
nWalletBackups = gArgs.GetArg("-createwalletbackups", 10);
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool CWallet::Unlock(const CKeyingMaterial& vMasterKeyIn, bool fForMixingOnly, bool accept_no_keys)
|
|
{
|
|
{
|
|
LOCK(cs_wallet);
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
if (!spk_man_pair.second->CheckDecryptionKey(vMasterKeyIn, accept_no_keys)) {
|
|
return false;
|
|
}
|
|
}
|
|
vMasterKey = vMasterKeyIn;
|
|
fOnlyMixingAllowed = fForMixingOnly;
|
|
}
|
|
NotifyStatusChanged(this);
|
|
return true;
|
|
}
|
|
|
|
std::set<ScriptPubKeyMan*> CWallet::GetActiveScriptPubKeyMans() const
|
|
{
|
|
std::set<ScriptPubKeyMan*> spk_mans;
|
|
for (bool internal : {false, true}) {
|
|
auto spk_man = GetScriptPubKeyMan(internal);
|
|
if (spk_man) {
|
|
spk_mans.insert(spk_man);
|
|
}
|
|
}
|
|
return spk_mans;
|
|
}
|
|
|
|
std::set<ScriptPubKeyMan*> CWallet::GetAllScriptPubKeyMans() const
|
|
{
|
|
std::set<ScriptPubKeyMan*> spk_mans;
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
spk_mans.insert(spk_man_pair.second.get());
|
|
}
|
|
return spk_mans;
|
|
}
|
|
|
|
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(bool internal) const
|
|
{
|
|
const auto spk_manager = internal ? m_internal_spk_managers : m_external_spk_managers;
|
|
if (spk_manager == nullptr) {
|
|
return nullptr;
|
|
}
|
|
return spk_manager;
|
|
}
|
|
|
|
std::set<ScriptPubKeyMan*> CWallet::GetScriptPubKeyMans(const CScript& script, SignatureData& sigdata) const
|
|
{
|
|
std::set<ScriptPubKeyMan*> spk_mans;
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
if (spk_man_pair.second->CanProvide(script, sigdata)) {
|
|
spk_mans.insert(spk_man_pair.second.get());
|
|
}
|
|
}
|
|
return spk_mans;
|
|
}
|
|
|
|
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const CScript& script) const
|
|
{
|
|
SignatureData sigdata;
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
if (spk_man_pair.second->CanProvide(script, sigdata)) {
|
|
return spk_man_pair.second.get();
|
|
}
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
ScriptPubKeyMan* CWallet::GetScriptPubKeyMan(const uint256& id) const
|
|
{
|
|
if (m_spk_managers.count(id) > 0) {
|
|
return m_spk_managers.at(id).get();
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script) const
|
|
{
|
|
SignatureData sigdata;
|
|
return GetSolvingProvider(script, sigdata);
|
|
}
|
|
|
|
std::unique_ptr<SigningProvider> CWallet::GetSolvingProvider(const CScript& script, SignatureData& sigdata) const
|
|
{
|
|
for (const auto& spk_man_pair : m_spk_managers) {
|
|
if (spk_man_pair.second->CanProvide(script, sigdata)) {
|
|
return spk_man_pair.second->GetSolvingProvider(script);
|
|
}
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
LegacyScriptPubKeyMan* CWallet::GetLegacyScriptPubKeyMan() const
|
|
{
|
|
if (IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
|
|
return nullptr;
|
|
}
|
|
// Legacy wallets only have one ScriptPubKeyMan which is a LegacyScriptPubKeyMan.
|
|
// Everything in m_internal_spk_managers and m_external_spk_managers point to the same legacyScriptPubKeyMan.
|
|
if (m_internal_spk_managers == nullptr) return nullptr;
|
|
return dynamic_cast<LegacyScriptPubKeyMan*>(m_internal_spk_managers);
|
|
}
|
|
|
|
LegacyScriptPubKeyMan* CWallet::GetOrCreateLegacyScriptPubKeyMan()
|
|
{
|
|
SetupLegacyScriptPubKeyMan();
|
|
return GetLegacyScriptPubKeyMan();
|
|
}
|
|
|
|
void CWallet::SetupLegacyScriptPubKeyMan()
|
|
{
|
|
if (m_internal_spk_managers || m_external_spk_managers || !m_spk_managers.empty() || IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
|
|
return;
|
|
}
|
|
|
|
auto spk_manager = std::make_unique<LegacyScriptPubKeyMan>(*this);
|
|
m_internal_spk_managers = spk_manager.get();
|
|
m_external_spk_managers = spk_manager.get();
|
|
m_spk_managers[spk_manager->GetID()] = std::move(spk_manager);
|
|
}
|
|
|
|
bool CWallet::WithEncryptionKey(std::function<bool (const CKeyingMaterial&)> cb) const
|
|
{
|
|
LOCK(cs_wallet);
|
|
return cb(vMasterKey);
|
|
}
|
|
|
|
bool CWallet::HasEncryptionKeys() const
|
|
{
|
|
return !mapMasterKeys.empty();
|
|
}
|
|
|
|
void CWallet::ConnectScriptPubKeyManNotifiers()
|
|
{
|
|
for (const auto& spk_man : GetActiveScriptPubKeyMans()) {
|
|
spk_man->NotifyWatchonlyChanged.connect(NotifyWatchonlyChanged);
|
|
spk_man->NotifyCanGetAddressesChanged.connect(NotifyCanGetAddressesChanged);
|
|
}
|
|
}
|
|
|
|
bool CWallet::GenerateNewHDChain(const SecureString& secureMnemonic, const SecureString& secureMnemonicPassphrase, const SecureString& secureWalletPassphrase)
|
|
{
|
|
auto spk_man = GetLegacyScriptPubKeyMan();
|
|
if (!spk_man) {
|
|
throw std::runtime_error(strprintf("%s: spk_man is not available", __func__));
|
|
}
|
|
|
|
if (IsCrypted()) {
|
|
if (secureWalletPassphrase.empty()) {
|
|
throw std::runtime_error(strprintf("%s: encrypted but supplied empty wallet passphrase", __func__));
|
|
}
|
|
|
|
bool is_locked = IsLocked();
|
|
|
|
CCrypter crypter;
|
|
CKeyingMaterial vMasterKey;
|
|
|
|
// We are intentionally re-locking the wallet so we can validate vMasterKey
|
|
// by verifying if it can unlock the wallet
|
|
Lock();
|
|
|
|
LOCK(cs_wallet);
|
|
for (const auto& [_, master_key] : mapMasterKeys) {
|
|
CKeyingMaterial _vMasterKey;
|
|
if (!crypter.SetKeyFromPassphrase(secureWalletPassphrase, master_key.vchSalt, master_key.nDeriveIterations, master_key.nDerivationMethod)) {
|
|
return false;
|
|
}
|
|
// Try another key if it cannot be decrypted or the key is incapable of encrypting
|
|
if (!crypter.Decrypt(master_key.vchCryptedKey, _vMasterKey) || _vMasterKey.size() != WALLET_CRYPTO_KEY_SIZE) {
|
|
continue;
|
|
}
|
|
// The likelihood of the plaintext being gibberish but also of the expected size is low but not zero.
|
|
// If it can unlock the wallet, it's a good key.
|
|
if (Unlock(_vMasterKey)) {
|
|
vMasterKey = _vMasterKey;
|
|
break;
|
|
}
|
|
}
|
|
|
|
// We got a gibberish key...
|
|
if (vMasterKey.empty()) {
|
|
// Mimicking the error message of RPC_WALLET_PASSPHRASE_INCORRECT as it's possible
|
|
// that the user may see this error when interacting with the upgradetohd RPC
|
|
throw std::runtime_error("Error: The wallet passphrase entered was incorrect");
|
|
}
|
|
|
|
spk_man->GenerateNewHDChain(secureMnemonic, secureMnemonicPassphrase, vMasterKey);
|
|
|
|
if (is_locked) {
|
|
Lock();
|
|
}
|
|
} else {
|
|
spk_man->GenerateNewHDChain(secureMnemonic, secureMnemonicPassphrase);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
void CWallet::UpdateProgress(const std::string& title, int nProgress)
|
|
{
|
|
ShowProgress(title, nProgress);
|
|
}
|
|
|
|
void CWallet::LoadDescriptorScriptPubKeyMan(uint256 id, WalletDescriptor& desc)
|
|
{
|
|
auto spk_manager = std::unique_ptr<ScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc));
|
|
m_spk_managers[id] = std::move(spk_manager);
|
|
}
|
|
|
|
void CWallet::SetupDescriptorScriptPubKeyMans()
|
|
{
|
|
AssertLockHeld(cs_wallet);
|
|
|
|
// Make a seed
|
|
CKey seed_key;
|
|
seed_key.MakeNewKey(true);
|
|
CPubKey seed = seed_key.GetPubKey();
|
|
assert(seed_key.VerifyPubKey(seed));
|
|
|
|
// Get the extended key
|
|
CExtKey master_key;
|
|
master_key.SetSeed(MakeByteSpan(seed_key));
|
|
|
|
for (bool internal : {false, true}) {
|
|
{ // OUTPUT_TYPE is only one: LEGACY
|
|
auto spk_manager = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this));
|
|
if (IsCrypted()) {
|
|
if (IsLocked()) {
|
|
throw std::runtime_error(std::string(__func__) + ": Wallet is locked, cannot setup new descriptors");
|
|
}
|
|
if (!spk_manager->CheckDecryptionKey(vMasterKey) && !spk_manager->Encrypt(vMasterKey, nullptr)) {
|
|
throw std::runtime_error(std::string(__func__) + ": Could not encrypt new descriptors");
|
|
}
|
|
}
|
|
spk_manager->SetupDescriptorGeneration(master_key, internal);
|
|
uint256 id = spk_manager->GetID();
|
|
m_spk_managers[id] = std::move(spk_manager);
|
|
AddActiveScriptPubKeyMan(id, internal);
|
|
}
|
|
}
|
|
}
|
|
|
|
void CWallet::AddActiveScriptPubKeyMan(uint256 id, bool internal)
|
|
{
|
|
WalletBatch batch(GetDatabase());
|
|
if (!batch.WriteActiveScriptPubKeyMan(id, internal)) {
|
|
throw std::runtime_error(std::string(__func__) + ": writing active ScriptPubKeyMan id failed");
|
|
}
|
|
LoadActiveScriptPubKeyMan(id, internal);
|
|
}
|
|
|
|
void CWallet::LoadActiveScriptPubKeyMan(uint256 id, bool internal)
|
|
{
|
|
// Activating ScriptPubKeyManager for a given output and change type is incompatible with legacy wallets.
|
|
// Legacy wallets have only one ScriptPubKeyManager and it's active for all output and change types.
|
|
Assert(IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS));
|
|
|
|
WalletLogPrintf("Setting spkMan to active: id = %s, type = %d, internal = %d\n", id.ToString(), static_cast<int>(OutputType::LEGACY), static_cast<int>(internal));
|
|
auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
|
|
auto& spk_mans_other = internal ? m_external_spk_managers : m_internal_spk_managers;
|
|
auto spk_man = m_spk_managers.at(id).get();
|
|
spk_mans = spk_man;
|
|
|
|
if (spk_mans_other == spk_man) {
|
|
spk_mans_other = nullptr;
|
|
}
|
|
|
|
NotifyCanGetAddressesChanged();
|
|
|
|
}
|
|
|
|
void CWallet::DeactivateScriptPubKeyMan(uint256 id, bool internal)
|
|
{
|
|
auto spk_man = GetScriptPubKeyMan(internal);
|
|
if (spk_man != nullptr && spk_man->GetID() == id) {
|
|
WalletLogPrintf("Deactivate spkMan: id = %s, type = %d, internal = %d\n", id.ToString(), static_cast<int>(OutputType::LEGACY), static_cast<int>(internal));
|
|
WalletBatch batch(GetDatabase());
|
|
if (!batch.EraseActiveScriptPubKeyMan(internal)) {
|
|
throw std::runtime_error(std::string(__func__) + ": erasing active ScriptPubKeyMan id failed");
|
|
}
|
|
|
|
auto& spk_mans = internal ? m_internal_spk_managers : m_external_spk_managers;
|
|
spk_mans = nullptr;
|
|
}
|
|
|
|
NotifyCanGetAddressesChanged();
|
|
}
|
|
|
|
bool CWallet::IsLegacy() const
|
|
{
|
|
if (m_internal_spk_managers == nullptr) return false;
|
|
auto spk_man = dynamic_cast<LegacyScriptPubKeyMan*>(m_internal_spk_managers);
|
|
return spk_man != nullptr;
|
|
}
|
|
|
|
DescriptorScriptPubKeyMan* CWallet::GetDescriptorScriptPubKeyMan(const WalletDescriptor& desc) const
|
|
{
|
|
for (auto& spk_man_pair : m_spk_managers) {
|
|
// Try to downcast to DescriptorScriptPubKeyMan then check if the descriptors match
|
|
DescriptorScriptPubKeyMan* spk_manager = dynamic_cast<DescriptorScriptPubKeyMan*>(spk_man_pair.second.get());
|
|
if (spk_manager != nullptr && spk_manager->HasWalletDescriptor(desc)) {
|
|
return spk_manager;
|
|
}
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
ScriptPubKeyMan* CWallet::AddWalletDescriptor(WalletDescriptor& desc, const FlatSigningProvider& signing_provider, const std::string& label, bool internal)
|
|
{
|
|
if (!IsWalletFlagSet(WALLET_FLAG_DESCRIPTORS)) {
|
|
WalletLogPrintf("Cannot add WalletDescriptor to a non-descriptor wallet\n");
|
|
return nullptr;
|
|
}
|
|
|
|
LOCK(cs_wallet);
|
|
auto spk_man = GetDescriptorScriptPubKeyMan(desc);
|
|
if (spk_man) {
|
|
WalletLogPrintf("Update existing descriptor: %s\n", desc.descriptor->ToString());
|
|
spk_man->UpdateWalletDescriptor(desc);
|
|
} else {
|
|
auto new_spk_man = std::unique_ptr<DescriptorScriptPubKeyMan>(new DescriptorScriptPubKeyMan(*this, desc));
|
|
spk_man = new_spk_man.get();
|
|
|
|
// Save the descriptor to memory
|
|
m_spk_managers[new_spk_man->GetID()] = std::move(new_spk_man);
|
|
}
|
|
|
|
// Add the private keys to the descriptor
|
|
for (const auto& entry : signing_provider.keys) {
|
|
const CKey& key = entry.second;
|
|
spk_man->AddDescriptorKey(key, key.GetPubKey());
|
|
}
|
|
|
|
// Top up key pool, the manager will generate new scriptPubKeys internally
|
|
if (!spk_man->TopUp()) {
|
|
WalletLogPrintf("Could not top up scriptPubKeys\n");
|
|
return nullptr;
|
|
}
|
|
|
|
// Apply the label if necessary
|
|
// Note: we disable labels for ranged descriptors
|
|
if (!desc.descriptor->IsRange()) {
|
|
auto script_pub_keys = spk_man->GetScriptPubKeys();
|
|
if (script_pub_keys.empty()) {
|
|
WalletLogPrintf("Could not generate scriptPubKeys (cache is empty)\n");
|
|
return nullptr;
|
|
}
|
|
|
|
CTxDestination dest;
|
|
if (!internal && ExtractDestination(script_pub_keys.at(0), dest)) {
|
|
SetAddressBook(dest, label, "receive");
|
|
}
|
|
}
|
|
|
|
// Save the descriptor to DB
|
|
spk_man->WriteDescriptor();
|
|
|
|
return spk_man;
|
|
}
|