GLAM MintProduction
burn_tokens
Burns GLAM mint/share tokens as part of redemption or manager-controlled token lifecycle.
Handler narrative
- Load the GLAM state or program account required by the instruction and verify the signer.
- Apply mint lifecycle, token-account, ACL, or policy changes after verifying the required authority.
Required conditions
- The submitted accounts must match the declared account list, signer requirements, writable requirements, fixed program addresses, and account relationships shown below.
- The GLAM state account is the source of truth for owner, enabled integrations, delegate permissions, policies, assets, borrowable assets, timelock settings, mint linkage, and pricing records.
- Mint actions must satisfy the linked GLAM state, Token-2022 mint configuration, mint policy, and any request queue or escrow state involved in the flow.
Accounts
| Account | Role | Description |
|---|---|---|
| glam_state | read-only | State account owned by the GLAM Protocol program; it records vault configuration, policies, and pricing records. |
| glam_signer | signer, writable | Calling authority. It must be the owner or a delegate with the explicit permission required by this instruction. |
| glam_mint | writable | Token-2022 mint associated with the GLAM mint or tokenized vault. |
| from_token_account | writable | Token account read or written by the instruction. |
| from | read-only | Token account read or written by the instruction. |
| token_2022_program | read-only | Standard Solana program account required by the instruction. |
Arguments
| Argument | Type | Notes |
|---|---|---|
| amount | u64 | Amount of GLAM share or mint tokens to burn, in the mint's smallest unit. |
Policy & permissions
- No external integration enablement is required beyond the program-level functionality involved in this instruction.
- Caller must be the owner or a delegate with the explicit protocol permission required by this instruction.
Cross-instruction constraints
- No additional cross-instruction constraint is documented beyond account initialization, authority checks, and policy validation.