From fe6d7c1507a2c419f5c72ccf480131ac008ce2ea Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Tue, 5 May 2026 11:02:25 +0200 Subject: [PATCH 01/22] fix(rs-sdk): case-insensitive .dash suffix in resolve_dpns_name MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit `Sdk::resolve_dpns_name` stripped the `.dash` suffix using exact byte-match. Inputs like "Alice.DASH" or "alice.Dash" fell into the else branch and the entire string was treated as the label, missing the DPNS lookup even though DPNS itself stores `normalizedLabel` lowercased. Backport from dash-evo-tool PR #810 / platform PR #3466 fix 1. Co-Authored-By: Claude Opus 4.6 🤖 Co-authored by [Claudius the Magnificent](https://github.com/lklimek/claudius) AI Agent --- packages/rs-sdk/src/platform/dpns_usernames/mod.rs | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs index 58c1b4a9792..e38a984238e 100644 --- a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs +++ b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs @@ -426,8 +426,8 @@ impl Sdk { // Handle both "alice" and "alice.dash" formats let label = if let Some(dot_pos) = name.rfind('.') { let (label_part, suffix) = name.split_at(dot_pos); - // Only strip the suffix if it's exactly ".dash" - if suffix == ".dash" { + // Strip ".dash" / ".DASH" / mixed case — DPNS itself is case-insensitive. + if suffix.eq_ignore_ascii_case(".dash") { label_part } else { // If it's not ".dash", treat the whole thing as the label From 26f13d96537d9b7c401d921780f09ae5b11cebc4 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Tue, 5 May 2026 11:02:43 +0200 Subject: [PATCH 02/22] fix(rs-platform-wallet): prevent UTXO double-spend race in send_to_addresses MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit `CoreWallet::send_to_addresses` had a TOCTOU window between dropping the wallet write lock (after build/select/sign) and broadcasting the transaction. Mempool / block events processed before the build lock was acquired could invalidate selected UTXOs, leaving the caller with an opaque network rejection. Pattern (Option A — defer-mark-spent): 1. While still holding the write lock used to build the transaction, re-validate that every selected outpoint is still in the spendable set. If any are gone, return `TransactionBuild("Selected UTXOs are no longer available (concurrent transaction). Please retry.")` so callers can retry on a fresh UTXO snapshot. 2. Drop the lock and broadcast. 3. Only on broadcast success, re-acquire the write lock and call `check_core_transaction(.., TransactionContext::Mempool, .., true, true)` to mark the inputs spent in the local wallet view. Marking spent strictly after broadcast addresses the review concern on PR #3466 that the original "mark spent before broadcast" ordering would corrupt local state on transient broadcast failures. The original PR #3466 patched `CoreWallet::send_transaction`. That function no longer exists post-rewrite around `TransactionBuilder` (see the `feat(platform-wallet): CoreWallet FFI ... TransactionBuilder integration` and `refactor(platform-wallet): collapse 7+ locks into single RwLock` migrations). Same bug, different call site, same optimistic-validation cure. Co-Authored-By: Claude Opus 4.6 🤖 Co-authored by [Claudius the Magnificent](https://github.com/lklimek/claudius) AI Agent --- .../src/wallet/core/broadcast.rs | 61 +++++++++++++++++-- 1 file changed, 57 insertions(+), 4 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 10578a7a682..f3c9f0ae525 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -1,5 +1,9 @@ -use dashcore::{Address as DashAddress, Transaction}; +use std::collections::BTreeSet; + +use dashcore::{Address as DashAddress, OutPoint, Transaction}; use key_wallet::account::account_type::StandardAccountType; +use key_wallet::transaction_checking::{TransactionContext, WalletTransactionChecker}; +use key_wallet::wallet::managed_wallet_info::wallet_info_interface::WalletInfoInterface; use crate::broadcaster::TransactionBroadcaster; use crate::{CoreWallet, PlatformWalletError}; @@ -35,7 +39,6 @@ impl CoreWallet { ) -> Result { use key_wallet::wallet::managed_wallet_info::coin_selection::SelectionStrategy; use key_wallet::wallet::managed_wallet_info::transaction_builder::TransactionBuilder; - use key_wallet::wallet::managed_wallet_info::wallet_info_interface::WalletInfoInterface; if outputs.is_empty() { return Err(PlatformWalletError::TransactionBuild( @@ -127,12 +130,62 @@ impl CoreWallet { ) .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; - builder + let tx = builder .build() - .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))? + .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; + + // Re-validate the selected outpoints are still spendable while + // we still hold the write lock. The lock makes our build atomic + // against other callers on this handle, but external mempool / + // block events processed before we acquired the lock may have + // invalidated UTXOs that were still in the spendable set when + // `select_inputs` ran. + // + // We deliberately do NOT mark the inputs as spent here — that + // happens after a successful broadcast (see #3466 review). A + // failed broadcast must not leave UTXOs falsely marked spent. + let selected: BTreeSet = + tx.input.iter().map(|txin| txin.previous_output).collect(); + let still_spendable: BTreeSet = info + .get_spendable_utxos() + .into_iter() + .map(|utxo| utxo.outpoint) + .collect(); + if !selected.is_subset(&still_spendable) { + return Err(PlatformWalletError::TransactionBuild( + "Selected UTXOs are no longer available (concurrent transaction). \ + Please retry." + .to_string(), + )); + } + + tx }; + // Broadcast first; if the network rejects we leave wallet state + // untouched so the caller can retry without manual sync repair. self.broadcast_transaction(&tx).await?; + + // Now that the tx is in flight, register it as a mempool transaction + // so subsequent callers see the inputs as spent and don't reselect + // them. The trade-off is that two callers racing between the lock + // drop above and the broadcast can both pick the same UTXOs; the + // network resolves that race exactly as it does on `v3.1-dev` + // today, but neither caller corrupts local state on a transient + // broadcast failure. + { + let mut wm = self.wallet_manager.write().await; + let (wallet, info) = + wm.get_wallet_mut_and_info_mut(&self.wallet_id) + .ok_or_else(|| { + crate::error::PlatformWalletError::WalletNotFound( + "Wallet not found in wallet manager".to_string(), + ) + })?; + info.check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) + .await; + } + Ok(tx) } } From 1bd306a05736f4ab84c56f59ee51e6e118dc7ef2 Mon Sep 17 00:00:00 2001 From: Lil Claw Date: Wed, 6 May 2026 05:21:22 -0500 Subject: [PATCH 03/22] fix: improve platform wallet UTXO checks and DPNS parsing (#3595) Co-authored-by: PastaClaw --- .../src/wallet/core/broadcast.rs | 87 +++++++++++------ .../rs-sdk/src/platform/dpns_usernames/mod.rs | 97 ++++++++++++++----- 2 files changed, 133 insertions(+), 51 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index f3c9f0ae525..47193fcd34d 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -134,28 +134,18 @@ impl CoreWallet { .build() .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; - // Re-validate the selected outpoints are still spendable while - // we still hold the write lock. The lock makes our build atomic - // against other callers on this handle, but external mempool / - // block events processed before we acquired the lock may have - // invalidated UTXOs that were still in the spendable set when - // `select_inputs` ran. - // - // We deliberately do NOT mark the inputs as spent here — that - // happens after a successful broadcast (see #3466 review). A - // failed broadcast must not leave UTXOs falsely marked spent. + // Sanity-check that the builder only selected outpoints from + // the same height-aware spendable set we handed to input + // selection. We deliberately do NOT mark the inputs as spent here + // — that happens after a successful broadcast (see #3466 review). + // A failed broadcast must not leave UTXOs falsely marked spent. let selected: BTreeSet = tx.input.iter().map(|txin| txin.previous_output).collect(); - let still_spendable: BTreeSet = info - .get_spendable_utxos() - .into_iter() - .map(|utxo| utxo.outpoint) - .collect(); - if !selected.is_subset(&still_spendable) { + let spendable_outpoints: BTreeSet = + spendable.iter().map(|utxo| utxo.outpoint).collect(); + if !selected.is_subset(&spendable_outpoints) { return Err(PlatformWalletError::TransactionBuild( - "Selected UTXOs are no longer available (concurrent transaction). \ - Please retry." - .to_string(), + "Transaction builder selected an unavailable UTXO. Please retry.".to_string(), )); } @@ -164,6 +154,11 @@ impl CoreWallet { // Broadcast first; if the network rejects we leave wallet state // untouched so the caller can retry without manual sync repair. + // This is intentional even if the remote accepted the transaction + // but the broadcast path returned an error: in that ambiguous case + // later attempts may reuse the same inputs locally, but the network + // rejects the duplicate spend instead of us marking UTXOs spent for + // a transaction that might not have propagated. self.broadcast_transaction(&tx).await?; // Now that the tx is in flight, register it as a mempool transaction @@ -173,17 +168,53 @@ impl CoreWallet { // network resolves that race exactly as it does on `v3.1-dev` // today, but neither caller corrupts local state on a transient // broadcast failure. + // + // Broadcast-first semantics: by the time we get here the network has + // already accepted the transaction, so the two warning paths below + // intentionally do NOT convert into a post-success `Err`. They + // simply mean local wallet state did not get updated to reflect the + // mempool spend / change output. Recovery in both cases: + // + // * The next `send_to_addresses` from the same handle may reselect + // the same UTXOs because they still look spendable locally. That + // follow-up transaction will be rejected by the network as a + // duplicate spend (the broadcaster surfaces that as an error to + // the caller), so funds are never double-spent on-chain. + // * Once mempool/block sync catches up, the wallet will see the + // original transaction and reconcile its UTXO set, after which + // subsequent sends pick up the correct change outputs. + // + // The two cases differ in what they imply: + // + // * `!check_result.is_relevant` is the expected transient: the + // wallet just hasn't ingested the tx yet (or some derivation + // path/script is unrecognised), and a later sync will fix it. + // * The `else` branch (wallet missing in the manager) is NOT a + // normal transient — the broadcast succeeded against a + // `CoreWallet` handle whose underlying wallet entry is gone + // from the manager. That is a broken/inconsistent local handle + // and the warning exists so operators can spot it; future + // sends through the same handle will keep failing the lookup + // above and surface a clean `WalletNotFound` error. { let mut wm = self.wallet_manager.write().await; - let (wallet, info) = - wm.get_wallet_mut_and_info_mut(&self.wallet_id) - .ok_or_else(|| { - crate::error::PlatformWalletError::WalletNotFound( - "Wallet not found in wallet manager".to_string(), - ) - })?; - info.check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) - .await; + if let Some((wallet, info)) = wm.get_wallet_mut_and_info_mut(&self.wallet_id) { + let check_result = info + .check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) + .await; + if !check_result.is_relevant { + tracing::warn!( + txid = %tx.txid(), + "broadcast transaction was not relevant during post-broadcast wallet registration" + ); + } + } else { + tracing::warn!( + wallet_id = %hex::encode(self.wallet_id), + txid = %tx.txid(), + "wallet missing during post-broadcast transaction registration" + ); + } } Ok(tx) diff --git a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs index e38a984238e..3f00fc0fa45 100644 --- a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs +++ b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs @@ -35,6 +35,27 @@ pub fn convert_to_homograph_safe_chars(input: &str) -> String { .collect() } +fn extract_dpns_label(name: &str) -> &str { + if let Some(dot_pos) = name.rfind('.') { + let (label_part, suffix) = name.split_at(dot_pos); + if suffix.eq_ignore_ascii_case(".dash") { + return label_part; + } + } + name +} + +/// Strip an optional case-insensitive `.dash` suffix and apply DPNS +/// homograph-safe normalization, producing a value suitable for matching +/// against the `normalizedLabel` field of `domain` documents. +/// +/// Accepts either a bare label (e.g. `"alice"`) or a full DPNS name +/// (e.g. `"alice.dash"`, `"Alice.DASH"`) and returns the normalized label +/// (e.g. `"a11ce"`). +fn normalize_dpns_label(input: &str) -> String { + convert_to_homograph_safe_chars(extract_dpns_label(input)) +} + /// Check if a username is valid according to DPNS rules /// /// A username is valid if: @@ -365,19 +386,31 @@ impl Sdk { /// /// # Arguments /// - /// * `label` - The username label to check (e.g., "alice") + /// * `name` - The username label (e.g., "alice") or full DPNS name + /// (e.g., "alice.dash"). The `.dash` suffix is matched + /// case-insensitively and stripped before normalization, mirroring + /// [`Sdk::resolve_dpns_name`]. /// /// # Returns /// /// Returns `true` if the name is available, `false` if it's taken - pub async fn is_dpns_name_available(&self, label: &str) -> Result { + pub async fn is_dpns_name_available(&self, name: &str) -> Result { use crate::platform::documents::document_query::DocumentQuery; use drive::query::WhereClause; use drive::query::WhereOperator; - let dpns_contract = self.fetch_dpns_contract().await?; + let normalized_label = normalize_dpns_label(name); + + // An empty normalized label (e.g. `""`, `".dash"`, `".DASH"`) is not + // a registrable DPNS name, so report it as unavailable rather than + // doing a network round-trip that would query for + // `normalizedLabel == ""`. This mirrors the early-return guard in + // `resolve_dpns_name` so the two APIs agree on malformed input. + if normalized_label.is_empty() { + return Ok(false); + } - let normalized_label = convert_to_homograph_safe_chars(label); + let dpns_contract = self.fetch_dpns_contract().await?; // Query for existing domain with this label let query = DocumentQuery { @@ -422,29 +455,13 @@ impl Sdk { let dpns_contract = self.fetch_dpns_contract().await?; - // Extract label from full name if needed - // Handle both "alice" and "alice.dash" formats - let label = if let Some(dot_pos) = name.rfind('.') { - let (label_part, suffix) = name.split_at(dot_pos); - // Strip ".dash" / ".DASH" / mixed case — DPNS itself is case-insensitive. - if suffix.eq_ignore_ascii_case(".dash") { - label_part - } else { - // If it's not ".dash", treat the whole thing as the label - name - } - } else { - // No dot found, use the whole name as the label - name - }; + let normalized_label = normalize_dpns_label(name); - // Validate the label before proceeding - if label.is_empty() { + // Validate the normalized label before proceeding + if normalized_label.is_empty() { return Ok(None); } - let normalized_label = convert_to_homograph_safe_chars(label); - // Query for domain with this label let query = DocumentQuery { data_contract: dpns_contract, @@ -499,6 +516,40 @@ mod tests { assert_eq!(convert_to_homograph_safe_chars("test123"), "test123"); } + #[test] + fn test_normalize_dpns_label_strips_dash_suffix_case_insensitively() { + // Bare label and full name normalize to the same value, regardless + // of the case of the .dash suffix. This is the contract that + // `is_dpns_name_available` and `resolve_dpns_name` share so that + // queries against `normalizedLabel` agree. + let expected = "a11ce"; + assert_eq!(normalize_dpns_label("alice"), expected); + assert_eq!(normalize_dpns_label("alice.dash"), expected); + assert_eq!(normalize_dpns_label("alice.DASH"), expected); + assert_eq!(normalize_dpns_label("Alice.DaSh"), expected); + assert_eq!(normalize_dpns_label("ALICE.DASH"), expected); + + // Non-.dash suffixes are not stripped (they are treated as part of + // the label and normalized whole). + assert_eq!(normalize_dpns_label("alice.eth"), "a11ce.eth"); + + // Empty / suffix-only inputs normalize to an empty label. + assert_eq!(normalize_dpns_label(""), ""); + assert_eq!(normalize_dpns_label(".dash"), ""); + assert_eq!(normalize_dpns_label(".DASH"), ""); + } + + #[test] + fn test_extract_dpns_label() { + assert_eq!(extract_dpns_label("alice.dash"), "alice"); + assert_eq!(extract_dpns_label("alice.DASH"), "alice"); + assert_eq!(extract_dpns_label("alice.DaSh"), "alice"); + assert_eq!(extract_dpns_label("Alice.DASH"), "Alice"); + assert_eq!(extract_dpns_label("alice"), "alice"); + assert_eq!(extract_dpns_label("alice.eth"), "alice.eth"); + assert_eq!(extract_dpns_label(".dash"), ""); + } + #[test] fn test_is_valid_username() { // Valid usernames From 23d8943c38d8cb01a46fc1c38d3f492e94d37f14 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 12:38:29 +0200 Subject: [PATCH 04/22] fix(rs-platform-wallet): defer change-address advance until after revalidation (CMT-007) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit `send_to_addresses` advanced the change-address derivation index before the post-build revalidation early-return introduced by PR #3585. When revalidation detected a UTXO conflict and bailed out, the change index was still bumped — the derived-but-unused address widened the gap-limit window on every retry. Switch the first call to `next_change_address(Some(&xpub), false)` (peek without persisting), and only commit the advance with `add_to_state = true` after revalidation passes. The peek is idempotent: `next_unused` is deterministic on the locked state, so the commit call returns the same address. The mutable account reborrow is reacquired after `select_inputs` ends its borrow on `info.core_wallet.accounts`. Scope: limited to the new revalidation early-return path; pre-existing build/select/sign error paths still advance early but are out of scope for this PR. Ref: https://github.com/dashpay/platform/pull/3585#discussion_r3194660629 Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 32 ++++++++++++++++++- 1 file changed, 31 insertions(+), 1 deletion(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 47193fcd34d..2c984a4c8d5 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -106,8 +106,12 @@ impl CoreWallet { )) })?; + // Peek at the next change address without advancing the derivation + // index. We commit the advance only after post-build revalidation + // succeeds, so a revalidation failure does not burn an index and + // widen the gap-limit window on retry. let change_addr = change_account - .next_change_address(Some(&xpub), true) + .next_change_address(Some(&xpub), false) .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; builder = builder.set_change_address(change_addr); @@ -149,6 +153,32 @@ impl CoreWallet { )); } + // Revalidation passed; now commit the change-address advance so + // the next send picks up the next index. Re-borrow the managed + // account because `select_inputs` above borrowed + // `info.core_wallet.accounts` and ended the earlier reborrow. + let change_account = match account_type { + StandardAccountType::BIP44Account => info + .core_wallet + .accounts + .standard_bip44_accounts + .get_mut(&account_index), + StandardAccountType::BIP32Account => info + .core_wallet + .accounts + .standard_bip32_accounts + .get_mut(&account_index), + } + .ok_or_else(|| { + PlatformWalletError::TransactionBuild(format!( + "{:?} managed account {} not found", + account_type, account_index + )) + })?; + change_account + .next_change_address(Some(&xpub), true) + .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; + tx }; From a3a5d9653c17b304ed55c72ad3d8015630fd277a Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 12:40:08 +0200 Subject: [PATCH 05/22] fix(rs-platform-wallet): typed ConcurrentSpendConflict variant for retryable UTXO race (CMT-008) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The post-build revalidation early-return surfaced as `PlatformWalletError::TransactionBuild("Transaction builder selected an unavailable UTXO. Please retry.")`. FFI/UI/retry-loop callers could only tell this apart from genuine builder failures by string-matching the message — brittle across refactors and incompatible with localisation. Add a dedicated unit variant `PlatformWalletError::ConcurrentSpendConflict` and use it at the early-return site instead of `TransactionBuild(...)`. `TransactionBuild` is left for true builder-failure cases. No callers were string-matching the old "Please retry" wording, so no caller updates were needed. Ref: https://github.com/dashpay/platform/pull/3585#discussion_r3194660635 Co-Authored-By: Claude Opus 4.7 (1M context) --- packages/rs-platform-wallet/src/error.rs | 3 +++ packages/rs-platform-wallet/src/wallet/core/broadcast.rs | 4 +--- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/packages/rs-platform-wallet/src/error.rs b/packages/rs-platform-wallet/src/error.rs index 006e9b01331..ed724b1f161 100644 --- a/packages/rs-platform-wallet/src/error.rs +++ b/packages/rs-platform-wallet/src/error.rs @@ -60,6 +60,9 @@ pub enum PlatformWalletError { #[error("Transaction building failed: {0}")] TransactionBuild(String), + #[error("Transaction builder selected an unavailable UTXO (concurrent spend); retry")] + ConcurrentSpendConflict, + #[error("Asset lock proof waiting failed: {0}")] AssetLockProofWait(String), diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 2c984a4c8d5..a7649971461 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -148,9 +148,7 @@ impl CoreWallet { let spendable_outpoints: BTreeSet = spendable.iter().map(|utxo| utxo.outpoint).collect(); if !selected.is_subset(&spendable_outpoints) { - return Err(PlatformWalletError::TransactionBuild( - "Transaction builder selected an unavailable UTXO. Please retry.".to_string(), - )); + return Err(PlatformWalletError::ConcurrentSpendConflict); } // Revalidation passed; now commit the change-address advance so From 41c9493632e57cfde87246bccb81288c4b4b31cc Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 13:31:35 +0200 Subject: [PATCH 06/22] fix(rs-sdk): skip DPNS contract fetch when label is empty (CMT-001) resolve_dpns_name was fetching the DPNS contract before checking the normalized-label guard, performing a wasted RPC round-trip on empty / .dash inputs. Mirror is_dpns_name_available's order: empty-label guard first, contract fetch second. Thread: PRRT_kwDOGUlHz85_7TFE Co-Authored-By: Claude Opus 4.7 (1M context) --- packages/rs-sdk/src/platform/dpns_usernames/mod.rs | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs index 3f00fc0fa45..7a6f56959c2 100644 --- a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs +++ b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs @@ -453,15 +453,18 @@ impl Sdk { use drive::query::WhereClause; use drive::query::WhereOperator; - let dpns_contract = self.fetch_dpns_contract().await?; - let normalized_label = normalize_dpns_label(name); - // Validate the normalized label before proceeding + // An empty normalized label (e.g. `""`, `".dash"`, `".DASH"`) cannot + // resolve to a registered identity. Skip the contract fetch and + // return early so the API mirrors `is_dpns_name_available` and + // doesn't perform a wasted RPC round-trip on malformed input. if normalized_label.is_empty() { return Ok(None); } + let dpns_contract = self.fetch_dpns_contract().await?; + // Query for domain with this label let query = DocumentQuery { data_contract: dpns_contract, From 2c7e22a072b70daa0aefb35162c6dffc333ea629 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 13:32:11 +0200 Subject: [PATCH 07/22] docs(rs-platform-wallet): rewrite revalidation comment to match builder invariant (CMT-007, CMT-002) The comment framed the subset check as race-prevention against concurrent spends, but the path is only reachable on builder regression. Rewrite to describe the builder-invariant guarantee accurately and label the runtime check as defense-in-depth. Keep the runtime check intact (per project convention against debug_assert!). Also document the CMT-002 INTENTIONAL stance: keep the typed ConcurrentSpendConflict variant for forward compatibility with future cross-process concurrent-spend surfacing, even though today's code path is only reachable on builder regression. Threads: PRRT_kwDOGUlHz85_6_co (CMT-007), PRRT_kwDOGUlHz85_6_cf (CMT-002) Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 20 ++++++++++++++----- 1 file changed, 15 insertions(+), 5 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index a7649971461..873c6023c6a 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -138,16 +138,26 @@ impl CoreWallet { .build() .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; - // Sanity-check that the builder only selected outpoints from - // the same height-aware spendable set we handed to input - // selection. We deliberately do NOT mark the inputs as spent here - // — that happens after a successful broadcast (see #3466 review). - // A failed broadcast must not leave UTXOs falsely marked spent. + // `select_inputs` is the only source of UTXOs for this builder, + // so `tx.input` outpoints must be a subset of the height-aware + // `spendable` set by the builder's contract. The check below is + // a defense-in-depth runtime guard for builder regressions; + // under normal operation this branch is unreachable. Inputs are + // not marked spent here either way — that happens after a + // successful broadcast (see #3466 review): a failed broadcast + // must not leave UTXOs falsely marked spent. let selected: BTreeSet = tx.input.iter().map(|txin| txin.previous_output).collect(); let spendable_outpoints: BTreeSet = spendable.iter().map(|utxo| utxo.outpoint).collect(); if !selected.is_subset(&spendable_outpoints) { + // INTENTIONAL(CMT-002): The `ConcurrentSpendConflict` variant + // is named and framed as user-retryable for forward + // compatibility. The current code path is only reachable on + // a builder-internal regression, but the typed variant is + // preserved so future work that surfaces real concurrent-spend + // conflicts (e.g. from cross-process wallets) can route + // through the same handler without an API churn. return Err(PlatformWalletError::ConcurrentSpendConflict); } From 97d153201c21edc632ea0d9daca4517aaa633305 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 13:32:31 +0200 Subject: [PATCH 08/22] fix(rs-platform-wallet): structured event for post-broadcast !is_relevant own-built tx (CMT-004, CMT-005) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The wallet-missing branch and the !is_relevant branch were both swallowed into a single tracing::warn! call, indistinguishable from each other in production telemetry. Emit a structured tracing::error event for the own-built !is_relevant path with txid + wallet_id fields so operators can alert on internal invariant violations independent of free-form message text. Also document the CMT-005 INTENTIONAL stance: the wallet-missing branch stays as a single structured log line — converting to Err would lie to callers (broadcast already succeeded), and a metric promotion is gated on monitoring infrastructure that doesn't yet exist. Threads: PRRT_kwDOGUlHz85_7TFY (CMT-004), PRRT_kwDOGUlHz85_7TFh (CMT-005) Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 24 +++++++++++++++++-- 1 file changed, 22 insertions(+), 2 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 873c6023c6a..9da16918f9a 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -241,12 +241,32 @@ impl CoreWallet { .check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) .await; if !check_result.is_relevant { - tracing::warn!( + // CMT-004: The wallet just built and signed this + // transaction from its own spendable inputs, so a + // `!is_relevant` post-broadcast check is an + // internal-invariant violation, not a transient. Emit a + // structured `error!` event with stable field names so + // operators can alert on it independent of the message + // text. We still return `Ok(tx)`: broadcast already + // succeeded, and rolling back here would mislead the + // caller into thinking the network rejected the tx. + tracing::error!( + target: "platform_wallet::broadcast", + event = "post_broadcast_unrelated_to_own_wallet", txid = %tx.txid(), - "broadcast transaction was not relevant during post-broadcast wallet registration" + wallet_id = %hex::encode(self.wallet_id), + "Internal invariant violation: own-built broadcast not recognized by post-broadcast check" ); } } else { + // INTENTIONAL(CMT-005): The wallet-missing branch indicates + // the wallet entry was removed from the manager between the + // lock drop and re-acquisition. Broadcast already succeeded, + // so converting to `Err` would be wrong (caller would think + // the tx failed). Observability via a single structured log + // line is acceptable for current operator workflows — + // promote to a metric only when monitoring infrastructure is + // in place to consume one. tracing::warn!( wallet_id = %hex::encode(self.wallet_id), txid = %tx.txid(), From 79843e325fed222c8623b96a08e1d40f30608c1b Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 13:32:46 +0200 Subject: [PATCH 09/22] test(rs-platform-wallet): broadcast ordering + rollback contract (CMT-003) Add two #[cfg(test)] tests for the broadcast.rs central correctness claim: - broadcast_failure_keeps_inputs_spendable: mock broadcaster returns Err, assert the error propagates from broadcast_transaction so callers short-circuit before any spendable-set mutation runs. - broadcast_success_marks_inputs_unavailable: mock broadcaster returns Ok(txid), assert broadcast_transaction passes the txid through unchanged so the post-broadcast Mempool registration block in send_to_addresses can run on a confirmed-success signal. Closes the same regression class flagged on the original #3466. Thread: PRRT_kwDOGUlHz85_7TFR Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 161 ++++++++++++++++++ 1 file changed, 161 insertions(+) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 9da16918f9a..138e7bcee64 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -278,3 +278,164 @@ impl CoreWallet { Ok(tx) } } + +#[cfg(test)] +mod tests { + //! Broadcast ordering / rollback contract tests (CMT-003). + //! + //! The PR's central correctness claim is: + //! + //! * a failed `broadcast_transaction` must propagate `Err` so callers + //! short-circuit before any spendable-set mutation, and + //! * a successful `broadcast_transaction` must hand the txid back so + //! the caller can register the tx as a mempool spend. + //! + //! `CoreWallet::send_to_addresses` enforces this with a single `?` on + //! the `broadcast_transaction` call before the post-broadcast + //! `check_core_transaction(.., Mempool, ..)` block runs. Anything that + //! breaks the wrapper's pass-through behaviour silently moves the + //! "register as spent" block above the broadcast line and reintroduces + //! the regression flagged on #3466. These tests pin that pass-through + //! contract. + use std::sync::atomic::{AtomicUsize, Ordering}; + use std::sync::Arc; + + use async_trait::async_trait; + use dashcore::consensus::deserialize; + use dashcore::{Transaction, Txid}; + use tokio::sync::RwLock; + + use crate::broadcaster::TransactionBroadcaster; + use crate::wallet::core::balance::WalletBalance; + use crate::wallet::core::CoreWallet; + use crate::PlatformWalletError; + use key_wallet::Network; + use key_wallet_manager::WalletManager; + + /// Mock broadcaster that records every call and returns a configured + /// canned outcome. Generic over the configured outcome so tests can + /// drive both the success and failure branches without importing a + /// real network broadcaster. + struct MockBroadcaster { + outcome: BroadcastOutcome, + calls: AtomicUsize, + } + + enum BroadcastOutcome { + Ok(Txid), + Err(String), + } + + impl MockBroadcaster { + fn new(outcome: BroadcastOutcome) -> Self { + Self { + outcome, + calls: AtomicUsize::new(0), + } + } + + fn call_count(&self) -> usize { + self.calls.load(Ordering::SeqCst) + } + } + + #[async_trait] + impl TransactionBroadcaster for MockBroadcaster { + async fn broadcast(&self, _transaction: &Transaction) -> Result { + self.calls.fetch_add(1, Ordering::SeqCst); + match &self.outcome { + BroadcastOutcome::Ok(txid) => Ok(*txid), + BroadcastOutcome::Err(msg) => { + Err(PlatformWalletError::TransactionBroadcast(msg.clone())) + } + } + } + } + + /// Coinbase-style transaction good enough to round-trip through + /// `broadcast_transaction`'s pass-through. The shape doesn't matter + /// for these tests — only the broadcaster's Err/Ok branch does. + fn dummy_transaction() -> Transaction { + // Minimal serialized regtest coinbase tx (1 input, 1 output, 0 value). + // Hex was generated from a `Transaction { version: 1, lock_time: 0, + // input: vec![TxIn::default()], output: vec![TxOut { value: 0, + // script_pubkey: ScriptBuf::new() }], special_transaction_payload: None }` + // round-trip; embedded here so the test stays free of fixture I/O. + let bytes = hex::decode( + "010000000100000000000000000000000000000000000000000000000000000000000000\ + 00ffffffff00ffffffff0100000000000000000000000000", + ) + .expect("valid hex"); + deserialize(&bytes).expect("deserializable tx") + } + + fn make_core_wallet(broadcaster: Arc) -> CoreWallet { + let sdk = Arc::new( + dash_sdk::SdkBuilder::new_mock() + .build() + .expect("mock sdk build"), + ); + let wallet_manager = Arc::new(RwLock::new(WalletManager::new(Network::Testnet))); + CoreWallet::new( + sdk, + wallet_manager, + [0u8; 32], + broadcaster, + Arc::new(WalletBalance::new()), + ) + } + + /// Broadcast failure: `broadcast_transaction` propagates the + /// underlying `Err`, so callers (notably `send_to_addresses`) bail out + /// via `?` *before* the post-broadcast `check_core_transaction` block + /// can mark any input as spent. This is the rollback half of the + /// #3466 contract: a network rejection must leave UTXOs spendable. + #[tokio::test] + async fn broadcast_failure_keeps_inputs_spendable() { + let broadcaster = Arc::new(MockBroadcaster::new(BroadcastOutcome::Err( + "simulated network rejection".to_string(), + ))); + let wallet = make_core_wallet(Arc::clone(&broadcaster)); + let tx = dummy_transaction(); + + let result = wallet.broadcast_transaction(&tx).await; + + assert!( + matches!(result, Err(PlatformWalletError::TransactionBroadcast(_))), + "expected broadcast Err to propagate, got {:?}", + result + ); + assert_eq!( + broadcaster.call_count(), + 1, + "broadcaster must be called exactly once on a failed broadcast" + ); + } + + /// Broadcast success: `broadcast_transaction` hands the txid back + /// untouched. `send_to_addresses` then re-acquires the wallet lock + /// and registers the tx as a mempool spend; that registration is + /// gated on this Ok return. If the wrapper ever swallows or remaps + /// the txid, the spent-input tracking on the success path silently + /// breaks. + #[tokio::test] + async fn broadcast_success_marks_inputs_unavailable() { + let expected_txid = dummy_transaction().txid(); + let broadcaster = Arc::new(MockBroadcaster::new(BroadcastOutcome::Ok(expected_txid))); + let wallet = make_core_wallet(Arc::clone(&broadcaster)); + let tx = dummy_transaction(); + + let result = wallet.broadcast_transaction(&tx).await; + + assert_eq!( + result.expect("broadcast Ok"), + expected_txid, + "broadcast_transaction must pass the broadcaster's Txid through unchanged" + ); + assert_eq!( + broadcaster.call_count(), + 1, + "broadcaster must be called exactly once on a successful broadcast" + ); + } +} From 391768cefdc1d2509464ba4dc76dd15fea273cfd Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 14:46:18 +0200 Subject: [PATCH 10/22] docs(rs-platform-wallet): tighten and deduplicate inline comments on PR #3585 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The recent CMT-001/003/004/005/007/002 fixes added overlapping commentary across broadcast.rs and dpns_usernames/mod.rs — INTENTIONAL annotations, rewritten revalidation comment, structured-event surrounds, test docstrings. Trim redundancy while preserving the INTENTIONAL marker pattern, structured tracing fields, and all CMT-NNN cross-references. Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 94 +++++-------------- .../rs-sdk/src/platform/dpns_usernames/mod.rs | 6 +- 2 files changed, 27 insertions(+), 73 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 138e7bcee64..c05c55e8ac0 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -138,26 +138,19 @@ impl CoreWallet { .build() .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; - // `select_inputs` is the only source of UTXOs for this builder, - // so `tx.input` outpoints must be a subset of the height-aware - // `spendable` set by the builder's contract. The check below is - // a defense-in-depth runtime guard for builder regressions; - // under normal operation this branch is unreachable. Inputs are - // not marked spent here either way — that happens after a - // successful broadcast (see #3466 review): a failed broadcast - // must not leave UTXOs falsely marked spent. + // Defense-in-depth: by builder contract `tx.input` outpoints are + // a subset of the height-aware `spendable` set we passed to + // `select_inputs`, so this branch is unreachable in normal + // operation. Marking inputs spent is deferred to after broadcast + // (see #3466) regardless. let selected: BTreeSet = tx.input.iter().map(|txin| txin.previous_output).collect(); let spendable_outpoints: BTreeSet = spendable.iter().map(|utxo| utxo.outpoint).collect(); if !selected.is_subset(&spendable_outpoints) { - // INTENTIONAL(CMT-002): The `ConcurrentSpendConflict` variant - // is named and framed as user-retryable for forward - // compatibility. The current code path is only reachable on - // a builder-internal regression, but the typed variant is - // preserved so future work that surfaces real concurrent-spend - // conflicts (e.g. from cross-process wallets) can route - // through the same handler without an API churn. + // INTENTIONAL(CMT-002): typed variant kept user-retryable for + // forward compatibility with cross-process concurrent-spend + // surfacing — even though today only builder regression hits. return Err(PlatformWalletError::ConcurrentSpendConflict); } @@ -241,15 +234,10 @@ impl CoreWallet { .check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) .await; if !check_result.is_relevant { - // CMT-004: The wallet just built and signed this - // transaction from its own spendable inputs, so a - // `!is_relevant` post-broadcast check is an - // internal-invariant violation, not a transient. Emit a - // structured `error!` event with stable field names so - // operators can alert on it independent of the message - // text. We still return `Ok(tx)`: broadcast already - // succeeded, and rolling back here would mislead the - // caller into thinking the network rejected the tx. + // CMT-004: own-built tx unrecognised by our own checker + // is an internal-invariant violation, not a transient. + // Structured `error!` with stable fields so operators can + // alert independent of message text. tracing::error!( target: "platform_wallet::broadcast", event = "post_broadcast_unrelated_to_own_wallet", @@ -259,14 +247,8 @@ impl CoreWallet { ); } } else { - // INTENTIONAL(CMT-005): The wallet-missing branch indicates - // the wallet entry was removed from the manager between the - // lock drop and re-acquisition. Broadcast already succeeded, - // so converting to `Err` would be wrong (caller would think - // the tx failed). Observability via a single structured log - // line is acceptable for current operator workflows — - // promote to a metric only when monitoring infrastructure is - // in place to consume one. + // INTENTIONAL(CMT-005): log-only is sufficient until metrics + // infrastructure exists; see broadcast-first rationale above. tracing::warn!( wallet_id = %hex::encode(self.wallet_id), txid = %tx.txid(), @@ -283,20 +265,10 @@ impl CoreWallet { mod tests { //! Broadcast ordering / rollback contract tests (CMT-003). //! - //! The PR's central correctness claim is: - //! - //! * a failed `broadcast_transaction` must propagate `Err` so callers - //! short-circuit before any spendable-set mutation, and - //! * a successful `broadcast_transaction` must hand the txid back so - //! the caller can register the tx as a mempool spend. - //! - //! `CoreWallet::send_to_addresses` enforces this with a single `?` on - //! the `broadcast_transaction` call before the post-broadcast - //! `check_core_transaction(.., Mempool, ..)` block runs. Anything that - //! breaks the wrapper's pass-through behaviour silently moves the - //! "register as spent" block above the broadcast line and reintroduces - //! the regression flagged on #3466. These tests pin that pass-through - //! contract. + //! Pin `broadcast_transaction`'s pass-through behaviour: `Err` propagates + //! so `send_to_addresses` short-circuits before any spendable-set + //! mutation, and `Ok(txid)` is forwarded unchanged so the post-broadcast + //! mempool registration runs on a confirmed-success signal. See #3466. use std::sync::atomic::{AtomicUsize, Ordering}; use std::sync::Arc; @@ -312,10 +284,7 @@ mod tests { use key_wallet::Network; use key_wallet_manager::WalletManager; - /// Mock broadcaster that records every call and returns a configured - /// canned outcome. Generic over the configured outcome so tests can - /// drive both the success and failure branches without importing a - /// real network broadcaster. + /// Records every call and returns a canned outcome. struct MockBroadcaster { outcome: BroadcastOutcome, calls: AtomicUsize, @@ -352,15 +321,9 @@ mod tests { } } - /// Coinbase-style transaction good enough to round-trip through - /// `broadcast_transaction`'s pass-through. The shape doesn't matter - /// for these tests — only the broadcaster's Err/Ok branch does. + /// Minimal serialized tx (1 input, 1 output, 0 value) — only the + /// broadcaster's Err/Ok branch matters here, not the shape. fn dummy_transaction() -> Transaction { - // Minimal serialized regtest coinbase tx (1 input, 1 output, 0 value). - // Hex was generated from a `Transaction { version: 1, lock_time: 0, - // input: vec![TxIn::default()], output: vec![TxOut { value: 0, - // script_pubkey: ScriptBuf::new() }], special_transaction_payload: None }` - // round-trip; embedded here so the test stays free of fixture I/O. let bytes = hex::decode( "010000000100000000000000000000000000000000000000000000000000000000000000\ 00ffffffff00ffffffff0100000000000000000000000000", @@ -385,11 +348,8 @@ mod tests { ) } - /// Broadcast failure: `broadcast_transaction` propagates the - /// underlying `Err`, so callers (notably `send_to_addresses`) bail out - /// via `?` *before* the post-broadcast `check_core_transaction` block - /// can mark any input as spent. This is the rollback half of the - /// #3466 contract: a network rejection must leave UTXOs spendable. + /// Rollback half of the #3466 contract: a broadcast `Err` propagates so + /// callers `?`-out before any spendable-set mutation. #[tokio::test] async fn broadcast_failure_keeps_inputs_spendable() { let broadcaster = Arc::new(MockBroadcaster::new(BroadcastOutcome::Err( @@ -412,12 +372,8 @@ mod tests { ); } - /// Broadcast success: `broadcast_transaction` hands the txid back - /// untouched. `send_to_addresses` then re-acquires the wallet lock - /// and registers the tx as a mempool spend; that registration is - /// gated on this Ok return. If the wrapper ever swallows or remaps - /// the txid, the spent-input tracking on the success path silently - /// breaks. + /// Success half of the #3466 contract: the broadcaster's `Txid` is + /// passed through unchanged so the mempool-registration block fires. #[tokio::test] async fn broadcast_success_marks_inputs_unavailable() { let expected_txid = dummy_transaction().txid(); diff --git a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs index 7a6f56959c2..c3468db0d0c 100644 --- a/packages/rs-sdk/src/platform/dpns_usernames/mod.rs +++ b/packages/rs-sdk/src/platform/dpns_usernames/mod.rs @@ -455,10 +455,8 @@ impl Sdk { let normalized_label = normalize_dpns_label(name); - // An empty normalized label (e.g. `""`, `".dash"`, `".DASH"`) cannot - // resolve to a registered identity. Skip the contract fetch and - // return early so the API mirrors `is_dpns_name_available` and - // doesn't perform a wasted RPC round-trip on malformed input. + // Empty normalized label (e.g. `""`, `".dash"`) can't resolve to an + // identity; bail before the contract fetch. Mirrors `is_dpns_name_available`. if normalized_label.is_empty() { return Ok(None); } From 43e3f9d1cbcec5e424eaf5cfc72fcdc2a668e068 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 15:17:32 +0200 Subject: [PATCH 11/22] fix(rs-platform-wallet): defer change-address commit past broadcast (CMT-001) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit next_change_address(.., true) ran inside the write-lock block before the fallible broadcast_transaction call, so a broadcast failure left the derivation index advanced — burning a gap-limit address with no on-chain record. Move the commit past the broadcast ? so the index only advances on broadcast success. Reapplies CMT-007's intent properly — the earlier fix (23d8943c38) used the peek-then-commit shape but the commit was still before broadcast. Thread: PRRT_kwDOGUlHz85_9Neu Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 62 ++++++++++--------- 1 file changed, 34 insertions(+), 28 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index c05c55e8ac0..bad9d1f3bc7 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -46,7 +46,7 @@ impl CoreWallet { )); } - let tx = { + let (tx, xpub) = { let mut wm = self.wallet_manager.write().await; let (wallet, info) = wm.get_wallet_and_info_mut(&self.wallet_id).ok_or_else(|| { crate::error::PlatformWalletError::WalletNotFound( @@ -154,33 +154,7 @@ impl CoreWallet { return Err(PlatformWalletError::ConcurrentSpendConflict); } - // Revalidation passed; now commit the change-address advance so - // the next send picks up the next index. Re-borrow the managed - // account because `select_inputs` above borrowed - // `info.core_wallet.accounts` and ended the earlier reborrow. - let change_account = match account_type { - StandardAccountType::BIP44Account => info - .core_wallet - .accounts - .standard_bip44_accounts - .get_mut(&account_index), - StandardAccountType::BIP32Account => info - .core_wallet - .accounts - .standard_bip32_accounts - .get_mut(&account_index), - } - .ok_or_else(|| { - PlatformWalletError::TransactionBuild(format!( - "{:?} managed account {} not found", - account_type, account_index - )) - })?; - change_account - .next_change_address(Some(&xpub), true) - .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; - - tx + (tx, xpub) }; // Broadcast first; if the network rejects we leave wallet state @@ -230,6 +204,38 @@ impl CoreWallet { { let mut wm = self.wallet_manager.write().await; if let Some((wallet, info)) = wm.get_wallet_mut_and_info_mut(&self.wallet_id) { + // Broadcast succeeded — commit the change-address advance now + // so a future send picks up a fresh index. Doing this before + // the broadcast would burn a derivation index on a network + // rejection, widening the gap-limit window on retry. + let change_account = match account_type { + StandardAccountType::BIP44Account => info + .core_wallet + .accounts + .standard_bip44_accounts + .get_mut(&account_index), + StandardAccountType::BIP32Account => info + .core_wallet + .accounts + .standard_bip32_accounts + .get_mut(&account_index), + }; + if let Some(change_account) = change_account { + if let Err(e) = change_account.next_change_address(Some(&xpub), true) { + // Broadcast already succeeded; surface as a warning + // rather than an error so the caller still sees the + // tx hash. A later sync reconciles the index. + tracing::warn!( + target: "platform_wallet::broadcast", + event = "post_broadcast_change_index_advance_failed", + txid = %tx.txid(), + wallet_id = %hex::encode(self.wallet_id), + error = %e, + "failed to advance change-address index after successful broadcast" + ); + } + } + let check_result = info .check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) .await; From 5d4a61bf0cdaa31b4c57ef48d207e87f7fe927cd Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 6 May 2026 15:19:40 +0200 Subject: [PATCH 12/22] test(rs-platform-wallet): rename broadcast pass-through tests to match scope (CMT-002) The tests drive CoreWallet::broadcast_transaction directly with a MockBroadcaster, pinning Err/Ok pass-through. The previous names and docstring framed them as #3466 send_to_addresses rollback regression pins, which they aren't (they don't drive send_to_addresses). Rename to describe what they actually pin. Thread: PRRT_kwDOGUlHz85_9Nej Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index bad9d1f3bc7..76f00764382 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -269,12 +269,12 @@ impl CoreWallet { #[cfg(test)] mod tests { - //! Broadcast ordering / rollback contract tests (CMT-003). + //! `broadcast_transaction` pass-through contract. //! - //! Pin `broadcast_transaction`'s pass-through behaviour: `Err` propagates - //! so `send_to_addresses` short-circuits before any spendable-set - //! mutation, and `Ok(txid)` is forwarded unchanged so the post-broadcast - //! mempool registration runs on a confirmed-success signal. See #3466. + //! Pins that the wrapper does not transform `Err` or modify the success + //! result — the `Txid` returned by the broadcaster is forwarded unchanged. + //! The higher-level `send_to_addresses` rollback contract (#3466) is not + //! covered here; pinning it would require live wallet fixtures. use std::sync::atomic::{AtomicUsize, Ordering}; use std::sync::Arc; @@ -354,10 +354,10 @@ mod tests { ) } - /// Rollback half of the #3466 contract: a broadcast `Err` propagates so - /// callers `?`-out before any spendable-set mutation. + /// `broadcast_transaction` forwards a broadcaster `Err` to the caller + /// without transformation. #[tokio::test] - async fn broadcast_failure_keeps_inputs_spendable() { + async fn broadcast_transaction_passes_through_err_unchanged() { let broadcaster = Arc::new(MockBroadcaster::new(BroadcastOutcome::Err( "simulated network rejection".to_string(), ))); @@ -378,10 +378,10 @@ mod tests { ); } - /// Success half of the #3466 contract: the broadcaster's `Txid` is - /// passed through unchanged so the mempool-registration block fires. + /// `broadcast_transaction` forwards the broadcaster's `Txid` to the + /// caller without transformation. #[tokio::test] - async fn broadcast_success_marks_inputs_unavailable() { + async fn broadcast_transaction_passes_through_ok_unchanged() { let expected_txid = dummy_transaction().txid(); let broadcaster = Arc::new(MockBroadcaster::new(BroadcastOutcome::Ok(expected_txid))); let wallet = make_core_wallet(Arc::clone(&broadcaster)); From 4dd55d2f42fcd337cdbf0bfb41b92815c3334f39 Mon Sep 17 00:00:00 2001 From: lklimek <842586+lklimek@users.noreply.github.com> Date: Fri, 8 May 2026 14:59:17 +0200 Subject: [PATCH 13/22] fix: close same-UTXO concurrent-selection race in send_to_addresses (#3622) Co-authored-by: Claude Opus 4.7 (1M context) --- packages/rs-platform-wallet/src/error.rs | 6 + .../src/wallet/core/broadcast.rs | 424 +++++++++++++++--- .../rs-platform-wallet/src/wallet/core/mod.rs | 1 + .../src/wallet/core/reservations.rs | 139 ++++++ .../src/wallet/core/wallet.rs | 7 + 5 files changed, 516 insertions(+), 61 deletions(-) create mode 100644 packages/rs-platform-wallet/src/wallet/core/reservations.rs diff --git a/packages/rs-platform-wallet/src/error.rs b/packages/rs-platform-wallet/src/error.rs index ed724b1f161..ce505753b9b 100644 --- a/packages/rs-platform-wallet/src/error.rs +++ b/packages/rs-platform-wallet/src/error.rs @@ -63,6 +63,12 @@ pub enum PlatformWalletError { #[error("Transaction builder selected an unavailable UTXO (concurrent spend); retry")] ConcurrentSpendConflict, + #[error( + "no spendable inputs available for {context} \ + (other in-flight transactions reserved the wallet's UTXOs; retry once they confirm)" + )] + NoSpendableInputs { context: String }, + #[error("Asset lock proof waiting failed: {0}")] AssetLockProofWait(String), diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 732e398eb59..636427244d2 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -29,9 +29,11 @@ impl CoreWallet { /// Build, sign, and broadcast a payment to the given addresses. /// - /// Uses key-wallet's [`TransactionBuilder`] for UTXO selection, fee - /// estimation, and signing. Change is sent to the next internal address - /// of the specified account. + /// Uses key-wallet's [`TransactionBuilder`] for UTXO selection, fee estimation, and signing. + /// Change is sent to the next internal address of the specified account. Concurrent calls on + /// the same wallet handle are race-safe via the reservation set in [`super::reservations`]: + /// the second caller short-circuits with [`PlatformWalletError::NoSpendableInputs`] before + /// touching the network if all UTXOs are reserved by an in-flight broadcast. pub async fn send_to_addresses( &self, account_type: StandardAccountType, @@ -47,7 +49,7 @@ impl CoreWallet { )); } - let (tx, xpub) = { + let (tx, xpub, _reservation) = { let mut wm = self.wallet_manager.write().await; let (wallet, info) = wm.get_wallet_and_info_mut(&self.wallet_id).ok_or_else(|| { crate::error::PlatformWalletError::WalletNotFound( @@ -76,12 +78,26 @@ impl CoreWallet { )) })?; + // Snapshot spendable UTXOs minus any in-flight reservations from + // a concurrent `send_to_addresses` on this handle. Single lock + // acquisition for the whole filter pass. + let reserved = self.reservations.snapshot(); let spendable: Vec<_> = account .spendable_utxos(current_height) .into_iter() + .filter(|utxo| !reserved.contains(&utxo.outpoint)) .cloned() .collect(); + if spendable.is_empty() { + return Err(PlatformWalletError::NoSpendableInputs { + context: format!( + "{:?} account {} (all UTXOs reserved by in-flight transactions)", + account_type, account_index + ), + }); + } + let xpub = wallet_accounts .get(&account_index) .map(|a| a.account_xpub) @@ -141,17 +157,29 @@ impl CoreWallet { None }, ) - .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; + .map_err(|e| { + // Map coin-selection failures to `NoSpendableInputs`. String-match pinned by + // `builder_error_text_contract_for_no_inputs`. + // TODO(typed-wrapper): drop once upstream exposes `SelectionError` typed. + let msg = e.to_string(); + if msg.contains("Insufficient funds") || msg.contains("No UTXOs available") { + PlatformWalletError::NoSpendableInputs { + context: format!( + "{:?} account {} ({})", + account_type, account_index, msg + ), + } + } else { + PlatformWalletError::TransactionBuild(msg) + } + })?; let tx = builder .build() .map_err(|e| PlatformWalletError::TransactionBuild(e.to_string()))?; - // Defense-in-depth: by builder contract `tx.input` outpoints are - // a subset of the height-aware `spendable` set we passed to - // `select_inputs`, so this branch is unreachable in normal - // operation. Marking inputs spent is deferred to after broadcast - // (see #3466) regardless. + // Defense-in-depth: unreachable under normal builder contract but guards against + // a future regression where `select_inputs` picks an outpoint outside `spendable`. let selected: BTreeSet = tx.input.iter().map(|txin| txin.previous_output).collect(); let spendable_outpoints: BTreeSet = @@ -163,60 +191,27 @@ impl CoreWallet { return Err(PlatformWalletError::ConcurrentSpendConflict); } - (tx, xpub) + // Reserve before releasing the lock so the next caller sees these outpoints + // filtered out. Guard held until `check_core_transaction` marks them spent + // (success) or the error unwinds (failure → outpoints released for retry). + let reservation = self.reservations.reserve(selected.into_iter().collect()); + + (tx, xpub, reservation) }; - // Broadcast first; if the network rejects we leave wallet state - // untouched so the caller can retry without manual sync repair. - // This is intentional even if the remote accepted the transaction - // but the broadcast path returned an error: in that ambiguous case - // later attempts may reuse the same inputs locally, but the network - // rejects the duplicate spend instead of us marking UTXOs spent for - // a transaction that might not have propagated. + // Broadcast first — on error we leave wallet state untouched so the caller can retry. + // If the network accepted but the call errored (ambiguous outcome), a retry will be + // rejected as a duplicate spend rather than us marking UTXOs spent prematurely. self.broadcast_transaction(&tx).await?; - // Now that the tx is in flight, register it as a mempool transaction - // so subsequent callers see the inputs as spent and don't reselect - // them. The trade-off is that two callers racing between the lock - // drop above and the broadcast can both pick the same UTXOs; the - // network resolves that race exactly as it does on `v3.1-dev` - // today, but neither caller corrupts local state on a transient - // broadcast failure. - // - // Broadcast-first semantics: by the time we get here the network has - // already accepted the transaction, so the two warning paths below - // intentionally do NOT convert into a post-success `Err`. They - // simply mean local wallet state did not get updated to reflect the - // mempool spend / change output. Recovery in both cases: - // - // * The next `send_to_addresses` from the same handle may reselect - // the same UTXOs because they still look spendable locally. That - // follow-up transaction will be rejected by the network as a - // duplicate spend (the broadcaster surfaces that as an error to - // the caller), so funds are never double-spent on-chain. - // * Once mempool/block sync catches up, the wallet will see the - // original transaction and reconcile its UTXO set, after which - // subsequent sends pick up the correct change outputs. - // - // The two cases differ in what they imply: - // - // * `!check_result.is_relevant` is the expected transient: the - // wallet just hasn't ingested the tx yet (or some derivation - // path/script is unrecognised), and a later sync will fix it. - // * The `else` branch (wallet missing in the manager) is NOT a - // normal transient — the broadcast succeeded against a - // `CoreWallet` handle whose underlying wallet entry is gone - // from the manager. That is a broken/inconsistent local handle - // and the warning exists so operators can spot it; future - // sends through the same handle will keep failing the lookup - // above and surface a clean `WalletNotFound` error. + // Mark inputs spent under the write lock, transitioning them from "reserved" to "spent" + // before the reservation guard drops — no observable gap for concurrent callers. + // Warning paths below do NOT return Err: the network already accepted the tx. { let mut wm = self.wallet_manager.write().await; if let Some((wallet, info)) = wm.get_wallet_mut_and_info_mut(&self.wallet_id) { - // Broadcast succeeded — commit the change-address advance now - // so a future send picks up a fresh index. Doing this before - // the broadcast would burn a derivation index on a network - // rejection, widening the gap-limit window on retry. + // Commit the change-address advance post-broadcast; doing it before would burn + // a derivation index on network rejection, widening the gap-limit window. let change_account = match account_type { StandardAccountType::BIP44Account => info .core_wallet @@ -249,10 +244,8 @@ impl CoreWallet { .check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) .await; if !check_result.is_relevant { - // CMT-004: own-built tx unrecognised by our own checker - // is an internal-invariant violation, not a transient. - // Structured `error!` with stable fields so operators can - // alert independent of message text. + // CMT-004: own-built tx unrecognised by our checker — internal invariant + // violation, not a transient. Stable event field for operator alerting. tracing::error!( target: "platform_wallet::broadcast", event = "post_broadcast_unrelated_to_own_wallet", @@ -272,6 +265,10 @@ impl CoreWallet { } } + // Explicit drop: inputs are already marked spent above; no gap between + // "reservation released" and "spent visible" to concurrent callers. + drop(_reservation); + Ok(tx) } } @@ -409,4 +406,309 @@ mod tests { "broadcaster must be called exactly once on a successful broadcast" ); } + + // Race-closing tests: same-UTXO concurrent `send_to_addresses`. + // B must short-circuit with `NoSpendableInputs` before the network — a `TransactionBroadcast` + // failure from B would mean the bug is still open. + + use std::collections::BTreeMap; + + use dashcore::hashes::Hash; + use dashcore::{Address as DashAddress, OutPoint, TxOut}; + use key_wallet::wallet::initialization::WalletAccountCreationOptions; + use key_wallet::wallet::Wallet; + use key_wallet::Utxo; + use tokio::sync::Notify; + + use crate::wallet::platform_wallet::PlatformWalletInfo; + use key_wallet::wallet::managed_wallet_info::ManagedWalletInfo; + + /// Mock broadcaster that gates the broadcast on an external `Notify`. + /// `entered` fires the moment `broadcast()` is awaited — by then the + /// caller has reserved its outpoints and dropped the wallet write lock. + struct GatedBroadcaster { + gate: Arc, + entered: Arc, + calls: AtomicUsize, + succeed: bool, + } + + #[async_trait] + impl TransactionBroadcaster for GatedBroadcaster { + async fn broadcast(&self, transaction: &Transaction) -> Result { + self.calls.fetch_add(1, Ordering::SeqCst); + self.entered.notify_one(); + self.gate.notified().await; + if self.succeed { + Ok(transaction.txid()) + } else { + Err(PlatformWalletError::TransactionBroadcast( + "mock failure".to_string(), + )) + } + } + } + + /// Always-failing mock broadcaster — used to assert that a failed + /// broadcast releases the reservation so a retry can pick up the + /// same UTXO. + struct FailingBroadcaster; + + #[async_trait] + impl TransactionBroadcaster for FailingBroadcaster { + async fn broadcast(&self, _transaction: &Transaction) -> Result { + Err(PlatformWalletError::TransactionBroadcast( + "always fails".to_string(), + )) + } + } + + /// Build a single-wallet `WalletManager` containing one BIP-44 + /// account (index 0) funded with one large UTXO at the account's + /// first receive address. Returns the wallet manager handle, the + /// wallet id, and a recipient address (a separate derived address + /// in the same account — funding/sending to the same address is + /// not the property under test). + fn build_funded_wallet_manager( + utxo_value: u64, + ) -> ( + Arc>>, + crate::wallet::platform_wallet::WalletId, + DashAddress, + ) { + let wallet = Wallet::new_random(Network::Testnet, WalletAccountCreationOptions::Default) + .expect("test wallet"); + + let xpub = wallet + .accounts + .standard_bip44_accounts + .get(&0) + .expect("bip44 account 0") + .account_xpub; + let mut wallet_info = ManagedWalletInfo::from_wallet(&wallet, 0); + + // Height must be well past UTXO height: `select_coins_with_size` enforces + // `min_confirmations >= 1`, which requires synced_height > utxo_height. + use key_wallet::wallet::managed_wallet_info::wallet_info_interface::WalletInfoInterface as _; + wallet_info.update_synced_height(100); + + let funding_address = wallet_info + .accounts + .standard_bip44_accounts + .get_mut(&0) + .expect("managed bip44 account 0") + .next_receive_address(Some(&xpub), true) + .expect("derive receive address"); + + let outpoint = OutPoint::new(Txid::from_byte_array([7u8; 32]), 0); + let mut utxo = Utxo::new( + outpoint, + TxOut { + value: utxo_value, + script_pubkey: funding_address.script_pubkey(), + }, + funding_address, + 1, + false, + ); + utxo.is_confirmed = true; + wallet_info + .accounts + .standard_bip44_accounts + .get_mut(&0) + .expect("managed bip44 account 0") + .utxos + .insert(outpoint, utxo); + + let info = PlatformWalletInfo { + core_wallet: wallet_info, + balance: Arc::new(WalletBalance::new()), + identity_manager: crate::wallet::identity::IdentityManager::new(), + tracked_asset_locks: BTreeMap::new(), + }; + + let mut wm: WalletManager = WalletManager::new(Network::Testnet); + let wallet_id = wm.insert_wallet(wallet, info).expect("insert"); + + // Recipient — use the second receive address as a stable target. + let recipient = { + let info = wm.get_wallet_info_mut(&wallet_id).expect("info"); + info.core_wallet + .accounts + .standard_bip44_accounts + .get_mut(&0) + .expect("acc") + .next_receive_address(Some(&xpub), true) + .expect("derive recipient") + }; + + (Arc::new(RwLock::new(wm)), wallet_id, recipient) + } + + fn make_core_wallet_for_manager( + wm: Arc>>, + wallet_id: crate::wallet::platform_wallet::WalletId, + broadcaster: Arc, + ) -> CoreWallet { + let sdk = Arc::new(dash_sdk::SdkBuilder::new_mock().build().expect("mock sdk")); + CoreWallet::new( + sdk, + wm, + wallet_id, + broadcaster, + Arc::new(WalletBalance::new()), + ) + } + + /// Two concurrent `send_to_addresses` calls on one wallet with one UTXO must yield exactly + /// one broadcast. The loser must get [`PlatformWalletError::NoSpendableInputs`] — never + /// `TransactionBroadcast` (that would mean it reached the network, which is the bug closed). + #[tokio::test] + async fn concurrent_same_utxo_sends_resolve_via_reservation_set() { + use key_wallet::account::account_type::StandardAccountType; + + let (wm, wallet_id, recipient) = build_funded_wallet_manager(2_000_000); + let gate = Arc::new(Notify::new()); + let entered = Arc::new(Notify::new()); + let broadcaster = Arc::new(GatedBroadcaster { + gate: Arc::clone(&gate), + entered: Arc::clone(&entered), + calls: AtomicUsize::new(0), + succeed: true, + }); + let core = make_core_wallet_for_manager( + wm, + wallet_id, + Arc::clone(&broadcaster) as Arc, + ); + + let send_value = 100_000; + let outputs_a = vec![(recipient.clone(), send_value)]; + let outputs_b = vec![(recipient.clone(), send_value)]; + + // Spawn caller A. It will reserve the only spendable outpoint + // under the wallet write lock, drop the lock, and block on the + // broadcast `Notify`. + let core_a = core.clone(); + let a_handle = tokio::spawn(async move { + core_a + .send_to_addresses(StandardAccountType::BIP44Account, 0, outputs_a) + .await + }); + + // Deterministic handshake: wait until A has reached the broadcast gate. + // By that point A has reserved the outpoint and dropped the wallet write lock. + entered.notified().await; + + // Caller B starts now. The wallet's only UTXO is reserved by A, + // so B's spendable snapshot is empty → `NoSpendableInputs`. + let b_result = core + .send_to_addresses(StandardAccountType::BIP44Account, 0, outputs_b) + .await; + + match &b_result { + Err(PlatformWalletError::NoSpendableInputs { context }) => { + assert!( + context.contains("reserved") + || context.contains("Insufficient") + || context.contains("No UTXOs"), + "B's NoSpendableInputs context should mention reservation \ + or insufficient/no-utxos; got: {context}" + ); + } + other => panic!( + "B must short-circuit with NoSpendableInputs (the race-loser \ + must not reach the broadcaster); got: {other:?}" + ), + } + + // Now release A's broadcast. + gate.notify_one(); + + let a_result = a_handle.await.expect("a task panicked"); + assert!( + a_result.is_ok(), + "A must succeed once its broadcast gate fires; got: {a_result:?}" + ); + + // Pin "loser never reached the network" directly: only A invoked the broadcaster. + assert_eq!( + broadcaster.calls.load(Ordering::SeqCst), + 1, + "broadcaster must be called exactly once across both concurrent senders" + ); + } + + /// On broadcast failure, the reservation must be released so the + /// caller can retry. This is the regression-tripwire for the + /// reservation guard's Drop semantics. + #[tokio::test] + async fn broadcast_failure_releases_reservation_for_retry() { + use key_wallet::account::account_type::StandardAccountType; + + let (wm, wallet_id, recipient) = build_funded_wallet_manager(2_000_000); + let broadcaster: Arc = Arc::new(FailingBroadcaster); + let core = make_core_wallet_for_manager(wm, wallet_id, broadcaster); + + let outputs = vec![(recipient.clone(), 100_000)]; + + // First call fails at the broadcast step → guard drops → + // reservation released. The change-address index is also rolled + // back by virtue of #3585's peek-then-commit pattern. + let first = core + .send_to_addresses(StandardAccountType::BIP44Account, 0, outputs.clone()) + .await; + assert!( + matches!(first, Err(PlatformWalletError::TransactionBroadcast(_))), + "first call must surface broadcast failure; got: {first:?}" + ); + + // Reservation released: the second call must reach the broadcaster (same UTXO visible), + // not short-circuit with `NoSpendableInputs` (which would indicate a leaked reservation). + let second = core + .send_to_addresses(StandardAccountType::BIP44Account, 0, outputs) + .await; + match second { + Err(PlatformWalletError::TransactionBroadcast(_)) => { + // Expected — reservation released, coin selection + // succeeded, broadcaster rejected as designed. + } + Err(PlatformWalletError::NoSpendableInputs { .. }) => { + panic!( + "reservation leaked after broadcast failure — second \ + call should have selected the released UTXO" + ); + } + other => panic!("unexpected second call result: {other:?}"), + } + } + + /// Pins the upstream error text the production string-match in + /// `send_to_addresses` depends on. If `key-wallet` ever rephrases + /// "Insufficient funds" / "No UTXOs available", this test breaks + /// loudly so the matcher can be updated (or, ideally, replaced + /// with a typed `SelectionError` once upstream exposes it). + #[test] + fn builder_error_text_contract_for_no_inputs() { + use key_wallet::wallet::managed_wallet_info::coin_selection::SelectionStrategy; + use key_wallet::wallet::managed_wallet_info::transaction_builder::TransactionBuilder; + + let (_, _, recipient) = build_funded_wallet_manager(2_000_000); + + let result = TransactionBuilder::new() + .add_output(&recipient, 100_000) + .expect("add_output") + .select_inputs(&[], SelectionStrategy::LargestFirst, 100, |_| None); + + let err = match result { + Ok(_) => panic!("empty UTXO slice must fail coin selection"), + Err(e) => e, + }; + let msg = err.to_string(); + assert!( + msg.contains("Insufficient funds") || msg.contains("No UTXOs available"), + "production string-match in send_to_addresses depends on these tokens; \ + got: {msg}" + ); + } } diff --git a/packages/rs-platform-wallet/src/wallet/core/mod.rs b/packages/rs-platform-wallet/src/wallet/core/mod.rs index 106a4108c22..e068dfacb4d 100644 --- a/packages/rs-platform-wallet/src/wallet/core/mod.rs +++ b/packages/rs-platform-wallet/src/wallet/core/mod.rs @@ -1,6 +1,7 @@ pub mod balance; pub mod balance_handler; mod broadcast; +mod reservations; pub mod wallet; pub use balance::WalletBalance; diff --git a/packages/rs-platform-wallet/src/wallet/core/reservations.rs b/packages/rs-platform-wallet/src/wallet/core/reservations.rs new file mode 100644 index 00000000000..070c60e96a3 --- /dev/null +++ b/packages/rs-platform-wallet/src/wallet/core/reservations.rs @@ -0,0 +1,139 @@ +//! Per-wallet outpoint reservation set for [`CoreWallet::send_to_addresses`](super::broadcast). +//! +//! Closes the same-UTXO concurrent-selection race: the first caller reserves its selected +//! outpoints under the write lock; subsequent callers filter them out and short-circuit with +//! [`PlatformWalletError::NoSpendableInputs`](crate::PlatformWalletError) before hitting the +//! network. Reservations are released by an RAII guard on success, error, or panic. + +use std::collections::HashSet; +use std::sync::{Arc, Mutex}; + +use dashcore::OutPoint; + +/// Per-wallet set of outpoints that have been selected for an in-flight +/// broadcast but not yet marked spent in `ManagedWalletInfo`. +/// +/// Cheaply cloneable: holds an `Arc>` internally. All clones share +/// the same set. +#[derive(Debug, Default, Clone)] +pub(crate) struct OutpointReservations { + inner: Arc>>, +} + +impl OutpointReservations { + pub(crate) fn new() -> Self { + Self::default() + } + + /// Test whether `outpoint` is currently reserved. + #[cfg(test)] + pub(crate) fn contains(&self, outpoint: &OutPoint) -> bool { + let guard = self + .inner + .lock() + .unwrap_or_else(|poisoned| poisoned.into_inner()); + guard.contains(outpoint) + } + + /// Clone the current reservation set under a single lock acquisition. + /// + /// Callers filter spendable UTXOs against the returned snapshot to + /// avoid one mutex lock per candidate outpoint. + pub(crate) fn snapshot(&self) -> HashSet { + let guard = self + .inner + .lock() + .unwrap_or_else(|poisoned| poisoned.into_inner()); + guard.clone() + } + + /// Reserve `outpoints`, returning an RAII guard that releases them on + /// drop. The guard must be held until the broadcast outcome is + /// reconciled into wallet state (success → `check_core_transaction` + /// has run; failure → caller has propagated the error). + pub(crate) fn reserve(&self, outpoints: Vec) -> OutpointReservationGuard { + { + let mut guard = self + .inner + .lock() + .unwrap_or_else(|poisoned| poisoned.into_inner()); + for op in &outpoints { + guard.insert(*op); + } + } + OutpointReservationGuard { + reservations: Arc::clone(&self.inner), + outpoints, + } + } +} + +/// RAII guard releasing reservations on drop. +/// +/// Drop is infallible and panic-safe — the underlying `Mutex` is recovered +/// from poisoning so a panicking caller still releases its outpoints. +#[must_use = "dropping the guard immediately releases the reservation"] +pub(crate) struct OutpointReservationGuard { + reservations: Arc>>, + outpoints: Vec, +} + +impl Drop for OutpointReservationGuard { + fn drop(&mut self) { + let mut guard = self + .reservations + .lock() + .unwrap_or_else(|poisoned| poisoned.into_inner()); + for op in &self.outpoints { + guard.remove(op); + } + } +} + +#[cfg(test)] +mod tests { + use super::*; + use dashcore::hashes::Hash; + use dashcore::Txid; + + fn op(n: u32) -> OutPoint { + OutPoint::new(Txid::all_zeros(), n) + } + + #[test] + fn reserve_then_drop_releases() { + let res = OutpointReservations::new(); + let a = op(1); + { + let _g = res.reserve(vec![a]); + assert!(res.contains(&a)); + } + assert!(!res.contains(&a)); + } + + #[test] + fn second_reservation_is_disjoint() { + let res = OutpointReservations::new(); + let a = op(1); + let b = op(2); + let _g1 = res.reserve(vec![a]); + let _g2 = res.reserve(vec![b]); + assert!(res.contains(&a)); + assert!(res.contains(&b)); + } + + #[test] + fn poisoned_mutex_still_releases() { + let res = OutpointReservations::new(); + let a = op(7); + let res_clone = res.clone(); + let _ = std::thread::spawn(move || { + let _g = res_clone.reserve(vec![a]); + panic!("intentional"); + }) + .join(); + // Guard dropped during unwind — outpoint must be released even + // though the mutex was poisoned. + assert!(!res.contains(&a)); + } +} diff --git a/packages/rs-platform-wallet/src/wallet/core/wallet.rs b/packages/rs-platform-wallet/src/wallet/core/wallet.rs index 5a29db29002..83a4a662a88 100644 --- a/packages/rs-platform-wallet/src/wallet/core/wallet.rs +++ b/packages/rs-platform-wallet/src/wallet/core/wallet.rs @@ -3,6 +3,7 @@ use std::sync::Arc; use super::balance::WalletBalance; +use super::reservations::OutpointReservations; use dashcore::Address as DashAddress; use tokio::sync::RwLock; @@ -31,6 +32,10 @@ pub struct CoreWallet { pub(crate) broadcaster: Arc, /// Lock-free balance for UI reads. balance: Arc, + /// Outpoints currently reserved by an in-flight `send_to_addresses` + /// call on this handle. Closes the same-UTXO concurrent-selection + /// race — see [`super::reservations`]. + pub(crate) reservations: OutpointReservations, } impl CoreWallet { @@ -47,6 +52,7 @@ impl CoreWallet { wallet_id, broadcaster, balance, + reservations: OutpointReservations::new(), } } @@ -244,6 +250,7 @@ impl Clone for CoreWallet { wallet_id: self.wallet_id, broadcaster: Arc::clone(&self.broadcaster), balance: Arc::clone(&self.balance), + reservations: self.reservations.clone(), } } } From 349b95b8c8499b7a07db506591d84848c58896bd Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Fri, 8 May 2026 15:10:23 +0200 Subject: [PATCH 14/22] feat(rs-platform-wallet): attach outpoint context to ConcurrentSpendConflict MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit `ConcurrentSpendConflict` was unit-only — if the defense-in-depth subset check ever fired, operators would have no diagnostic content. Carry the selected outpoints in the variant so the construction site (and downstream log lines) surface them automatically via `Display`. Strip the `INTENTIONAL(CMT-002)` review-thread tag from the same site — git history is the record for review provenance. Refs PR #3585 review (F-001, F-004). Co-Authored-By: Claude Opus 4.7 (1M context) --- packages/rs-platform-wallet/src/error.rs | 8 ++++++-- packages/rs-platform-wallet/src/wallet/core/broadcast.rs | 9 +++++---- 2 files changed, 11 insertions(+), 6 deletions(-) diff --git a/packages/rs-platform-wallet/src/error.rs b/packages/rs-platform-wallet/src/error.rs index ce505753b9b..99450c93d3a 100644 --- a/packages/rs-platform-wallet/src/error.rs +++ b/packages/rs-platform-wallet/src/error.rs @@ -1,3 +1,4 @@ +use dashcore::OutPoint; use dpp::identifier::Identifier; use key_wallet::Network; @@ -60,8 +61,11 @@ pub enum PlatformWalletError { #[error("Transaction building failed: {0}")] TransactionBuild(String), - #[error("Transaction builder selected an unavailable UTXO (concurrent spend); retry")] - ConcurrentSpendConflict, + #[error( + "Transaction builder selected an unavailable UTXO (concurrent spend); retry. \ + Selected outpoints: {selected:?}" + )] + ConcurrentSpendConflict { selected: Vec }, #[error( "no spendable inputs available for {context} \ diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 636427244d2..69373a8c76c 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -185,10 +185,11 @@ impl CoreWallet { let spendable_outpoints: BTreeSet = spendable.iter().map(|utxo| utxo.outpoint).collect(); if !selected.is_subset(&spendable_outpoints) { - // INTENTIONAL(CMT-002): typed variant kept user-retryable for - // forward compatibility with cross-process concurrent-spend - // surfacing — even though today only builder regression hits. - return Err(PlatformWalletError::ConcurrentSpendConflict); + // Typed retryable variant: forward-compatible with cross-process + // concurrent-spend surfacing; today only a builder regression hits it. + return Err(PlatformWalletError::ConcurrentSpendConflict { + selected: selected.into_iter().collect(), + }); } // Reserve before releasing the lock so the next caller sees these outpoints From 6239fda21f924562590f48f624cfcc6dd1731909 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Fri, 8 May 2026 15:10:38 +0200 Subject: [PATCH 15/22] chore(rs-platform-wallet): drop CMT-NNN review tombstones from broadcast.rs Strip the `CMT-004` review-thread prefix from the post-broadcast checker comment in `send_to_addresses`. The surrounding prose already documents the present-state semantics; the review-comment ID is git-history noise. Refs PR #3585 review (F-001). Co-Authored-By: Claude Opus 4.7 (1M context) --- packages/rs-platform-wallet/src/wallet/core/broadcast.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 69373a8c76c..f54ed2992b0 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -245,7 +245,7 @@ impl CoreWallet { .check_core_transaction(&tx, TransactionContext::Mempool, wallet, true, true) .await; if !check_result.is_relevant { - // CMT-004: own-built tx unrecognised by our checker — internal invariant + // Own-built tx unrecognised by our checker is an internal invariant // violation, not a transient. Stable event field for operator alerting. tracing::error!( target: "platform_wallet::broadcast", From 4d204cdaef79c490caaeb5cff0fa2259e3c2e71e Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Fri, 8 May 2026 15:10:51 +0200 Subject: [PATCH 16/22] fix(rs-platform-wallet): structured tracing fields on wallet-missing warn MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Align the post-broadcast wallet-missing `tracing::warn!` with its two sibling sites in `send_to_addresses` by adding `target: "platform_wallet::broadcast"` and `event = "post_broadcast_wallet_missing"`. Operators alerting on stable event names now catch all three post-broadcast observability paths without parsing free-text. Strip the `INTENTIONAL(CMT-005)` review-thread tag from the same site — the rewritten present-state comment already explains why log-only is sufficient on this path. Refs PR #3585 review (F-001, F-003). Co-Authored-By: Claude Opus 4.7 (1M context) --- packages/rs-platform-wallet/src/wallet/core/broadcast.rs | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index f54ed2992b0..7f4edfc04bd 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -256,9 +256,11 @@ impl CoreWallet { ); } } else { - // INTENTIONAL(CMT-005): log-only is sufficient until metrics - // infrastructure exists; see broadcast-first rationale above. + // Log-only: broadcast already succeeded; the wallet handle is stale and + // future sends will surface a clean `WalletNotFound` from the lookup above. tracing::warn!( + target: "platform_wallet::broadcast", + event = "post_broadcast_wallet_missing", wallet_id = %hex::encode(self.wallet_id), txid = %tx.txid(), "wallet missing during post-broadcast transaction registration" From 0bacd25279d87f777a80277e60f23ac2c6f05ff3 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Tue, 12 May 2026 13:21:13 +0200 Subject: [PATCH 17/22] chore: improve error type --- packages/rs-platform-wallet/src/error.rs | 13 +++++++------ .../src/wallet/core/broadcast.rs | 16 +++++++--------- 2 files changed, 14 insertions(+), 15 deletions(-) diff --git a/packages/rs-platform-wallet/src/error.rs b/packages/rs-platform-wallet/src/error.rs index 99450c93d3a..3944036f342 100644 --- a/packages/rs-platform-wallet/src/error.rs +++ b/packages/rs-platform-wallet/src/error.rs @@ -1,6 +1,6 @@ use dashcore::OutPoint; use dpp::identifier::Identifier; -use key_wallet::Network; +use key_wallet::{account::StandardAccountType, Network}; /// Errors that can occur in platform wallet operations #[derive(Debug, thiserror::Error)] @@ -67,11 +67,12 @@ pub enum PlatformWalletError { )] ConcurrentSpendConflict { selected: Vec }, - #[error( - "no spendable inputs available for {context} \ - (other in-flight transactions reserved the wallet's UTXOs; retry once they confirm)" - )] - NoSpendableInputs { context: String }, + #[error("no spendable inputs available on {account_type} account {account_index}: {context}")] + NoSpendableInputs { + account_type: StandardAccountType, + account_index: u32, + context: String, + }, #[error("Asset lock proof waiting failed: {0}")] AssetLockProofWait(String), diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index f9e8908f774..99944bb2dac 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -121,10 +121,9 @@ impl CoreWallet { if spendable.is_empty() { return Err(PlatformWalletError::NoSpendableInputs { - context: format!( - "{:?} account {} (all UTXOs reserved by in-flight transactions)", - account_type, account_index - ), + account_index, + account_type, + context: "all UTXOs used or reserved by in-flight transactions".to_string(), }); } @@ -157,10 +156,9 @@ impl CoreWallet { let msg = e.to_string(); if msg.contains("Insufficient funds") || msg.contains("No UTXOs available") { PlatformWalletError::NoSpendableInputs { - context: format!( - "{:?} account {} ({})", - account_type, account_index, msg - ), + account_type, + account_index, + context: msg, } } else { PlatformWalletError::TransactionBuild(msg) @@ -599,7 +597,7 @@ mod tests { .await; match &b_result { - Err(PlatformWalletError::NoSpendableInputs { context }) => { + Err(PlatformWalletError::NoSpendableInputs { context, .. }) => { assert!( context.contains("reserved") || context.contains("Insufficient") From 0188fa97f82fd357987d4ed9963788f1c04e0bb2 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Tue, 12 May 2026 14:09:05 +0200 Subject: [PATCH 18/22] chore: improve docs --- .../src/wallet/core/broadcast.rs | 43 +++++++++---------- 1 file changed, 20 insertions(+), 23 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 99944bb2dac..631ebc1dd14 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -150,8 +150,8 @@ impl CoreWallet { }) .await .map_err(|e| { - // Map coin-selection failures to `NoSpendableInputs`. String-match pinned by - // `builder_error_text_contract_for_no_inputs`. + // Map coin-selection failures to `NoSpendableInputs`. The string-match is + // brittle against upstream rephrasing and is currently unpinned by tests. // TODO(typed-wrapper): drop once upstream exposes `SelectionError` typed via BuilderError. let msg = e.to_string(); if msg.contains("Insufficient funds") || msg.contains("No UTXOs available") { @@ -265,12 +265,17 @@ impl CoreWallet { #[cfg(test)] mod tests { - //! `broadcast_transaction` pass-through contract. + //! Broadcast and `send_to_addresses` contracts. //! - //! Pins that the wrapper does not transform `Err` or modify the success - //! result — the `Txid` returned by the broadcaster is forwarded unchanged. - //! The higher-level `send_to_addresses` rollback contract (#3466) is not - //! covered here; pinning it would require live wallet fixtures. + //! Pins: + //! - `broadcast_transaction` forwards the broadcaster's `Ok`/`Err` unchanged. + //! - Concurrent `send_to_addresses` on the same wallet handle resolves via + //! the reservation set: the loser short-circuits with `NoSpendableInputs` + //! before reaching the broadcaster. + //! - A broadcast failure releases the reservation so a retry sees the same + //! UTXO as spendable again. + //! - An empty spendable snapshot (e.g. all UTXOs reserved) maps to + //! `NoSpendableInputs` via the early-exit guard. use std::sync::atomic::{AtomicUsize, Ordering}; use std::sync::Arc; @@ -673,10 +678,12 @@ mod tests { } } - /// Pins the upstream error text the production string-match in - /// `send_to_addresses` depends on. If `key-wallet` ever rephrases - /// its coin-selection errors, this test breaks loudly so the matcher - /// can be updated (or replaced with typed `SelectionError` matching). + /// Pins the early-exit guard: when the spendable snapshot is empty + /// (e.g. all UTXOs reserved by in-flight broadcasts), `send_to_addresses` + /// surfaces `NoSpendableInputs` without invoking the builder. + /// + /// Note: the upstream coin-selection string-match in `send_to_addresses` + /// is not exercised here — that path is currently unpinned. #[tokio::test] async fn builder_error_text_contract_for_no_inputs() { use key_wallet::account::account_type::StandardAccountType; @@ -685,20 +692,10 @@ mod tests { let broadcaster: Arc = Arc::new(FailingBroadcaster); let core = make_core_wallet_for_manager(wm, wallet_id, broadcaster); - // Drain the UTXO by marking it spent via a successful reservation then - // never releasing, simulating a zero-spendable wallet. We verify the - // production error-message contract by checking `send_to_addresses` - // surfaces `NoSpendableInputs` when the builder returns no-inputs. - // - // The simplest way: call `send_to_addresses` on a wallet whose only - // UTXO has been removed. We rebuild with zero UTXOs by using the - // `build_funded_wallet_manager(0)` path — but that fails UTXO height. - // Instead, verify directly that `NoSpendableInputs` is mapped when - // the spendable set is empty before building (the early-exit guard). let outputs = vec![(recipient.clone(), 100_000)]; - // Reserve the wallet's only outpoint externally to make the spendable - // set empty for the next caller. Use the reservation API directly. + // Reserve the wallet's only outpoint so the spendable snapshot is + // empty for the next caller, exercising the early-exit guard. let outpoint = OutPoint::new(Txid::from_byte_array([7u8; 32]), 0); let _guard = core.reservations.reserve(vec![outpoint]); From 9902cbd6da33641b55044b13d0722861e78633ca Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Tue, 12 May 2026 15:19:14 +0200 Subject: [PATCH 19/22] chore: fix build --- packages/rs-platform-wallet-ffi/tests/integration_tests.rs | 2 -- 1 file changed, 2 deletions(-) diff --git a/packages/rs-platform-wallet-ffi/tests/integration_tests.rs b/packages/rs-platform-wallet-ffi/tests/integration_tests.rs index 09adb69a20f..de826eddf43 100644 --- a/packages/rs-platform-wallet-ffi/tests/integration_tests.rs +++ b/packages/rs-platform-wallet-ffi/tests/integration_tests.rs @@ -50,7 +50,6 @@ fn test_wallet_from_mnemonic() { let result = platform_wallet_info_create_from_mnemonic( Network::Testnet.into(), mnemonic.as_ptr(), - std::ptr::null(), &mut handle, ); @@ -266,7 +265,6 @@ fn test_full_workflow() { let result = platform_wallet_info_create_from_mnemonic( Network::Testnet.into(), mnemonic.as_ptr(), - std::ptr::null(), &mut wallet_handle, ); assert_eq!(result.code, PlatformWalletFFIResultCode::Success); From 371e2c37426f2fbd778c3fbcc476f53b4bbadac3 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 13 May 2026 13:14:32 +0200 Subject: [PATCH 20/22] fix(rs-platform-wallet): restore defensive post-build UTXO revalidation MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit QA-001 (LOW) from Marvin's #3585 merge audit: #3585's `OutpointReservations` pre-build filter closes the in-process concurrent-caller race entirely, and the existing post-build `selected.is_subset(&spendable_outpoints)` check catches builder regressions. But that check re-uses the SAME `spendable` snapshot captured BEFORE `build_signed`, so a future mutator that touches UTXOs outside the wallet write lock (mempool listener, chain reorg subsystem, cross-process spend) would slip through. Restore the defense-in-depth pattern from the obsolete commit `603b444425`: after `build_signed` returns, re-call `managed_account.spendable_utxos` within the same lock-acquisition block and confirm every selected outpoint is still present in the fresh view. If not, surface `PlatformWalletError::ConcurrentSpendConflict` (the typed retryable variant #3585 introduced) carrying the missing outpoints — semantically correct post-build, distinct from the pre-build `NoSpendableInputs` failure. Today no code path mutates UTXOs without holding the wallet write lock we hold across build, so this is unreachable by construction. The reservations guard remains the primary in-process race defense; this is the cross- subsystem / future-proofing net. Without it, someone introducing a parallel UTXO mutator later would re-open the race silently. No unit test: injecting a UTXO disappearance between `build_signed` and the fresh re-fetch requires test-only plumbing inside the same lock-acquisition block (no clean seam to mock). The two #3585 concurrency tests (`concurrent_same_utxo_sends_resolve_via_reservation_set`, `broadcast_failure_releases_reservation_for_retry`) still pass — semantics of the reservation path are unchanged. Co-Authored-By: Claude Opus 4.7 (1M context) --- .../src/wallet/core/broadcast.rs | 30 +++++++++++++++---- 1 file changed, 25 insertions(+), 5 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 631ebc1dd14..7c10baac243 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -179,6 +179,26 @@ impl CoreWallet { }); } + // Defense-in-depth: re-snapshot spendable UTXOs after `build_signed` and confirm + // every selected outpoint is still present. Today every UTXO mutator goes through + // the wallet write lock that we hold across build, so this is unreachable — but + // a future mutator running outside the lock (mempool listener, chain reorg, etc.) + // would slip through the pre-build `spendable` snapshot above; this fresh re-fetch + // catches it before broadcast. The reservations guard remains the primary in-process + // race defense; this is the cross-process / cross-subsystem net. + let fresh_spendable_outpoints: BTreeSet = managed_account + .spendable_utxos(current_height) + .into_iter() + .map(|utxo| utxo.outpoint) + .collect(); + if !selected.is_subset(&fresh_spendable_outpoints) { + let missing: Vec = selected + .difference(&fresh_spendable_outpoints) + .copied() + .collect(); + return Err(PlatformWalletError::ConcurrentSpendConflict { selected: missing }); + } + // Reserve before releasing the lock so the next caller sees these outpoints // filtered out. Guard held until `check_core_transaction` marks them spent // (success) or the error unwinds (failure → outpoints released for retry). @@ -276,18 +296,18 @@ mod tests { //! UTXO as spendable again. //! - An empty spendable snapshot (e.g. all UTXOs reserved) maps to //! `NoSpendableInputs` via the early-exit guard. - use std::sync::atomic::{AtomicUsize, Ordering}; use std::sync::Arc; + use std::sync::atomic::{AtomicUsize, Ordering}; use async_trait::async_trait; use dashcore::consensus::deserialize; use dashcore::{Transaction, Txid}; use tokio::sync::RwLock; + use crate::PlatformWalletError; use crate::broadcaster::TransactionBroadcaster; - use crate::wallet::core::balance::WalletBalance; use crate::wallet::core::CoreWallet; - use crate::PlatformWalletError; + use crate::wallet::core::balance::WalletBalance; use key_wallet::Network; use key_wallet_manager::WalletManager; @@ -410,9 +430,9 @@ mod tests { use dashcore::hashes::Hash; use dashcore::{Address as DashAddress, OutPoint, TxOut}; - use key_wallet::wallet::initialization::WalletAccountCreationOptions; - use key_wallet::wallet::Wallet; use key_wallet::Utxo; + use key_wallet::wallet::Wallet; + use key_wallet::wallet::initialization::WalletAccountCreationOptions; use tokio::sync::Notify; use crate::wallet::platform_wallet::PlatformWalletInfo; From ff56c56979903f939003dc93962f4d99db537567 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 13 May 2026 12:24:45 +0200 Subject: [PATCH 21/22] chore(rs-platform-wallet-ffi): use Result::is_err in group_info tests Pre-existing `matches!(result, Err(_))` patterns trip `clippy::redundant_pattern_matching` under the workspace's `-D warnings` gate. Swap to `result.is_err()` so the clippy step stays green for the crates this PR touches. Co-Authored-By: Claude Opus 4.7 (1M context) --- packages/rs-platform-wallet-ffi/src/tokens/group_info.rs | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/packages/rs-platform-wallet-ffi/src/tokens/group_info.rs b/packages/rs-platform-wallet-ffi/src/tokens/group_info.rs index 78595b5050c..b5c75a01a09 100644 --- a/packages/rs-platform-wallet-ffi/src/tokens/group_info.rs +++ b/packages/rs-platform-wallet-ffi/src/tokens/group_info.rs @@ -94,7 +94,7 @@ mod tests { fn test_decode_other_signer_null_action_id() { unsafe { let result = decode_group_info(2, 0, std::ptr::null(), false); - assert!(matches!(result, Err(_)), "expected Err(NullPointer)"); + assert!(result.is_err(), "expected Err(NullPointer)"); } } @@ -120,7 +120,7 @@ mod tests { fn test_decode_invalid_kind() { unsafe { let result = decode_group_info(99, 0, std::ptr::null(), false); - assert!(matches!(result, Err(_)), "expected Err(InvalidParameter)"); + assert!(result.is_err(), "expected Err(InvalidParameter)"); } } } From 54665018962348027c601aa1af270907418aa765 Mon Sep 17 00:00:00 2001 From: Lukasz Klimek <842586+lklimek@users.noreply.github.com> Date: Wed, 13 May 2026 15:52:49 +0200 Subject: [PATCH 22/22] chore: fmt --- .../rs-platform-wallet/src/wallet/core/broadcast.rs | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs index 7c10baac243..5254d2d7318 100644 --- a/packages/rs-platform-wallet/src/wallet/core/broadcast.rs +++ b/packages/rs-platform-wallet/src/wallet/core/broadcast.rs @@ -296,18 +296,18 @@ mod tests { //! UTXO as spendable again. //! - An empty spendable snapshot (e.g. all UTXOs reserved) maps to //! `NoSpendableInputs` via the early-exit guard. - use std::sync::Arc; use std::sync::atomic::{AtomicUsize, Ordering}; + use std::sync::Arc; use async_trait::async_trait; use dashcore::consensus::deserialize; use dashcore::{Transaction, Txid}; use tokio::sync::RwLock; - use crate::PlatformWalletError; use crate::broadcaster::TransactionBroadcaster; - use crate::wallet::core::CoreWallet; use crate::wallet::core::balance::WalletBalance; + use crate::wallet::core::CoreWallet; + use crate::PlatformWalletError; use key_wallet::Network; use key_wallet_manager::WalletManager; @@ -430,9 +430,9 @@ mod tests { use dashcore::hashes::Hash; use dashcore::{Address as DashAddress, OutPoint, TxOut}; - use key_wallet::Utxo; - use key_wallet::wallet::Wallet; use key_wallet::wallet::initialization::WalletAccountCreationOptions; + use key_wallet::wallet::Wallet; + use key_wallet::Utxo; use tokio::sync::Notify; use crate::wallet::platform_wallet::PlatformWalletInfo;