Obsolete keypool and make sure database removes log files on shutdown.

This commit is contained in:
Gavin Andresen 2011-11-10 21:12:46 -05:00
parent 9e9869d0fe
commit d764d9161e
6 changed files with 89 additions and 36 deletions

View file

@ -1557,6 +1557,11 @@ Value encryptwallet(const Array& params, bool fHelp)
if (pwalletMain->IsCrypted()) if (pwalletMain->IsCrypted())
throw JSONRPCError(-15, "Error: running with an encrypted wallet, but encryptwallet was called."); throw JSONRPCError(-15, "Error: running with an encrypted wallet, but encryptwallet was called.");
#ifdef QT_GUI
// shutting down via RPC while the GUI is running does not work (yet):
throw runtime_error("Not Yet Implemented: use GUI to encrypt wallet, not RPC command");
#endif
string strWalletPass; string strWalletPass;
strWalletPass.reserve(100); strWalletPass.reserve(100);
mlock(&strWalletPass[0], strWalletPass.capacity()); mlock(&strWalletPass[0], strWalletPass.capacity());
@ -1576,7 +1581,11 @@ Value encryptwallet(const Array& params, bool fHelp)
fill(strWalletPass.begin(), strWalletPass.end(), '\0'); fill(strWalletPass.begin(), strWalletPass.end(), '\0');
munlock(&strWalletPass[0], strWalletPass.capacity()); munlock(&strWalletPass[0], strWalletPass.capacity());
return Value::null; // BDB seems to have a bad habit of writing old data into
// slack space in .dat files; that is bad if the old data is
// unencrypted private keys. So:
CreateThread(Shutdown, NULL);
return "wallet encrypted; bitcoin server stopping, restart to run with encrypted wallet";
} }

View file

@ -28,6 +28,34 @@ DbEnv dbenv(0);
static map<string, int> mapFileUseCount; static map<string, int> mapFileUseCount;
static map<string, Db*> mapDb; static map<string, Db*> mapDb;
static void EnvShutdown(bool fRemoveLogFiles)
{
if (!fDbEnvInit)
return;
fDbEnvInit = false;
dbenv.close(0);
DbEnv(0).remove(GetDataDir().c_str(), 0);
if (fRemoveLogFiles)
{
filesystem::path datadir(GetDataDir());
filesystem::directory_iterator it(datadir / "database");
while (it != filesystem::directory_iterator())
{
const filesystem::path& p = it->path();
#if BOOST_FILESYSTEM_VERSION == 2
std::string f = p.filename();
#else
std::string f = p.filename().generic_string();
#endif
if (f.find("log.") == 0)
filesystem::remove(p);
++it;
}
}
}
class CDBInit class CDBInit
{ {
public: public:
@ -36,11 +64,7 @@ public:
} }
~CDBInit() ~CDBInit()
{ {
if (fDbEnvInit) EnvShutdown(false);
{
dbenv.close(0);
fDbEnvInit = false;
}
} }
} }
instance_of_cdbinit; instance_of_cdbinit;
@ -165,7 +189,7 @@ void static CloseDb(const string& strFile)
} }
} }
bool Resilver(const string& strFile) bool CDB::Rewrite(const string& strFile, const char* pszSkip)
{ {
while (!fShutdown) while (!fShutdown)
{ {
@ -180,8 +204,8 @@ bool Resilver(const string& strFile)
mapFileUseCount.erase(strFile); mapFileUseCount.erase(strFile);
bool fSuccess = true; bool fSuccess = true;
printf("Resilvering %s...\n", strFile.c_str()); printf("Rewriting %s...\n", strFile.c_str());
string strFileRes = strFile + ".resilver"; string strFileRes = strFile + ".rewrite";
CDB db(strFile.c_str(), "r"); CDB db(strFile.c_str(), "r");
Db* pdbCopy = new Db(&dbenv, 0); Db* pdbCopy = new Db(&dbenv, 0);
@ -212,6 +236,15 @@ bool Resilver(const string& strFile)
fSuccess = false; fSuccess = false;
break; break;
} }
if (pszSkip &&
strncmp(&ssKey[0], pszSkip, std::min(ssKey.size(), strlen(pszSkip))) == 0)
continue;
if (strncmp(&ssKey[0], "\x07version", 8) == 0)
{
// Update version:
ssValue.clear();
ssValue << VERSION;
}
Dbt datKey(&ssKey[0], ssKey.size()); Dbt datKey(&ssKey[0], ssKey.size());
Dbt datValue(&ssValue[0], ssValue.size()); Dbt datValue(&ssValue[0], ssValue.size());
int ret2 = pdbCopy->put(NULL, &datKey, &datValue, DB_NOOVERWRITE); int ret2 = pdbCopy->put(NULL, &datKey, &datValue, DB_NOOVERWRITE);
@ -239,7 +272,7 @@ bool Resilver(const string& strFile)
fSuccess = false; fSuccess = false;
} }
if (!fSuccess) if (!fSuccess)
printf("Resilvering of %s FAILED!\n", strFileRes.c_str()); printf("Rewriting of %s FAILED!\n", strFileRes.c_str());
return fSuccess; return fSuccess;
} }
} }
@ -249,7 +282,7 @@ bool Resilver(const string& strFile)
} }
void DBFlush(bool fShutdown) void DBFlush(bool fShutdown, bool fRemoveLogFiles)
{ {
// Flush log data to the actual data file // Flush log data to the actual data file
// on all files that are not in use // on all files that are not in use
@ -280,9 +313,10 @@ void DBFlush(bool fShutdown)
{ {
char** listp; char** listp;
if (mapFileUseCount.empty()) if (mapFileUseCount.empty())
{
dbenv.log_archive(&listp, DB_ARCH_REMOVE); dbenv.log_archive(&listp, DB_ARCH_REMOVE);
dbenv.close(0); EnvShutdown(fRemoveLogFiles);
fDbEnvInit = false; }
} }
} }
} }
@ -740,7 +774,6 @@ int CWalletDB::LoadWallet(CWallet* pwallet)
pwallet->vchDefaultKey.clear(); pwallet->vchDefaultKey.clear();
int nFileVersion = 0; int nFileVersion = 0;
vector<uint256> vWalletUpgrade; vector<uint256> vWalletUpgrade;
bool fIsResilvered = false;
bool fIsEncrypted = false; bool fIsEncrypted = false;
// Modify defaults // Modify defaults
@ -901,7 +934,6 @@ int CWalletDB::LoadWallet(CWallet* pwallet)
if (strKey == "fMinimizeOnClose") ssValue >> fMinimizeOnClose; if (strKey == "fMinimizeOnClose") ssValue >> fMinimizeOnClose;
if (strKey == "fUseProxy") ssValue >> fUseProxy; if (strKey == "fUseProxy") ssValue >> fUseProxy;
if (strKey == "addrProxy") ssValue >> addrProxy; if (strKey == "addrProxy") ssValue >> addrProxy;
if (strKey == "fIsResilvered") ssValue >> fIsResilvered;
if (fHaveUPnP && strKey == "fUseUPnP") ssValue >> fUseUPnP; if (fHaveUPnP && strKey == "fUseUPnP") ssValue >> fUseUPnP;
} }
else if (strType == "minversion") else if (strType == "minversion")
@ -929,8 +961,11 @@ int CWalletDB::LoadWallet(CWallet* pwallet)
printf("fUseUPnP = %d\n", fUseUPnP); printf("fUseUPnP = %d\n", fUseUPnP);
// Upgrade // Rewrite encrypted wallets of versions 0.4.0 and 0.5.0rc:
if (nFileVersion < VERSION) if (fIsEncrypted && (nFileVersion == 40000 || nFileVersion == 50000))
return DB_NEED_REWRITE;
if (nFileVersion < VERSION) // Update
{ {
// Get rid of old debug.log file in current directory // Get rid of old debug.log file in current directory
if (nFileVersion <= 105 && !pszSetDataDir[0]) if (nFileVersion <= 105 && !pszSetDataDir[0])
@ -939,9 +974,6 @@ int CWalletDB::LoadWallet(CWallet* pwallet)
WriteVersion(VERSION); WriteVersion(VERSION);
} }
if (fIsEncrypted && !fIsResilvered)
return DB_NEED_RESILVER;
return DB_LOAD_OK; return DB_LOAD_OK;
} }

View file

@ -29,10 +29,9 @@ extern unsigned int nWalletDBUpdated;
extern DbEnv dbenv; extern DbEnv dbenv;
extern void DBFlush(bool fShutdown); extern void DBFlush(bool fShutdown, bool fRemoveLogFiles);
void ThreadFlushWalletDB(void* parg); void ThreadFlushWalletDB(void* parg);
bool BackupWallet(const CWallet& wallet, const std::string& strDest); bool BackupWallet(const CWallet& wallet, const std::string& strDest);
extern bool Resilver(const std::string& strFile);
@ -258,7 +257,7 @@ public:
return Write(std::string("version"), nVersion); return Write(std::string("version"), nVersion);
} }
friend bool Resilver(const std::string&); bool static Rewrite(const std::string& strFile, const char* pszSkip = NULL);
}; };
@ -351,7 +350,7 @@ enum DBErrors
DB_CORRUPT, DB_CORRUPT,
DB_TOO_NEW, DB_TOO_NEW,
DB_LOAD_FAIL, DB_LOAD_FAIL,
DB_NEED_RESILVER DB_NEED_REWRITE
}; };
class CWalletDB : public CDB class CWalletDB : public CDB

View file

@ -44,8 +44,8 @@ void Shutdown(void* parg)
{ {
static CCriticalSection cs_Shutdown; static CCriticalSection cs_Shutdown;
static bool fTaken; static bool fTaken;
bool fFirstThread; bool fFirstThread = false;
CRITICAL_BLOCK(cs_Shutdown) TRY_CRITICAL_BLOCK(cs_Shutdown)
{ {
fFirstThread = !fTaken; fFirstThread = !fTaken;
fTaken = true; fTaken = true;
@ -55,9 +55,9 @@ void Shutdown(void* parg)
{ {
fShutdown = true; fShutdown = true;
nTransactionsUpdated++; nTransactionsUpdated++;
DBFlush(false); DBFlush(false, false);
StopNode(); StopNode();
DBFlush(true); DBFlush(true, true);
boost::filesystem::remove(GetPidFile()); boost::filesystem::remove(GetPidFile());
UnregisterWallet(pwalletMain); UnregisterWallet(pwalletMain);
delete pwalletMain; delete pwalletMain;
@ -362,6 +362,12 @@ bool AppInit2(int argc, char* argv[])
strErrors += _("Error loading wallet.dat: Wallet corrupted \n"); strErrors += _("Error loading wallet.dat: Wallet corrupted \n");
else if (nLoadWalletRet == DB_TOO_NEW) else if (nLoadWalletRet == DB_TOO_NEW)
strErrors += _("Error loading wallet.dat: Wallet requires newer version of Bitcoin \n"); strErrors += _("Error loading wallet.dat: Wallet requires newer version of Bitcoin \n");
else if (nLoadWalletRet == DB_NEED_REWRITE)
{
strErrors += _("Wallet needed to be rewritten: restart Bitcoin to complete \n");
wxMessageBox(strErrors, "Bitcoin", wxOK | wxICON_ERROR);
return false;
}
else else
strErrors += _("Error loading wallet.dat \n"); strErrors += _("Error loading wallet.dat \n");
} }

View file

@ -60,7 +60,7 @@ class CDataStream;
class CAutoFile; class CAutoFile;
static const unsigned int MAX_SIZE = 0x02000000; static const unsigned int MAX_SIZE = 0x02000000;
static const int VERSION = 50000; static const int VERSION = 50001;
static const char* pszSubVer = ""; static const char* pszSubVer = "";
static const bool VERSION_IS_BETA = true; static const bool VERSION_IS_BETA = true;

View file

@ -187,10 +187,12 @@ bool CWallet::EncryptWallet(const string& strWalletPassphrase)
} }
Lock(); Lock();
}
if (Resilver(strWalletFile)) // Need to completely rewrite the wallet file; if we don't, bdb might keep
CWalletDB(strWalletFile, "r+").WriteSetting("fIsResilvered", true); // bits of the unencrypted private key in slack space in the database file.
setKeyPool.clear();
CDB::Rewrite(strWalletFile, "\x04pool");
}
return true; return true;
} }
@ -1145,11 +1147,16 @@ int CWallet::LoadWallet(bool& fFirstRunRet)
return false; return false;
fFirstRunRet = false; fFirstRunRet = false;
int nLoadWalletRet = CWalletDB(strWalletFile,"cr+").LoadWallet(this); int nLoadWalletRet = CWalletDB(strWalletFile,"cr+").LoadWallet(this);
if (nLoadWalletRet == DB_NEED_RESILVER) if (nLoadWalletRet == DB_NEED_REWRITE)
{ {
if (Resilver(strWalletFile)) if (CDB::Rewrite(strWalletFile, "\x04pool"))
CWalletDB(strWalletFile, "r+").WriteSetting("fIsResilvered", true); {
nLoadWalletRet = DB_LOAD_OK; setKeyPool.clear();
// Note: can't top-up keypool here, because wallet is locked.
// User will be prompted to unlock wallet the next operation
// the requires a new key.
}
nLoadWalletRet = DB_NEED_REWRITE;
} }
if (nLoadWalletRet != DB_LOAD_OK) if (nLoadWalletRet != DB_LOAD_OK)