GLAMIDL Reference

stake_move

Performs native stake-program action `stake_move` for a GLAM vault.

Handler narrative

  1. Load the GLAM state or program account required by the instruction and verify the signer.
  2. Validate native staking permission, then apply the requested stake-account action through the Solana stake program.

Required conditions

  • The submitted accounts must match the declared account list, signer requirements, writable requirements, fixed program addresses, and account relationships shown below.
  • The GLAM state account is the source of truth for owner, enabled integrations, delegate permissions, policies, assets, borrowable assets, timelock settings, mint linkage, and pricing records.
  • The vault account must be the PDA controlled by the core protocol program and derived conceptually from the state account; instructions use it as the vault authority for SOL, token accounts, and external positions.
  • Owner-level actions must be signed by the state owner unless the instruction is explicitly an integration callback, mint-authority callback, delegate action, or emergency access update.

Accounts

AccountRoleDescription
glam_statewritableState account owned by the GLAM Protocol program; it records vault configuration, policies, and pricing records.
glam_vaultwritableVault account controlled by the GLAM Protocol program; conceptually derived from the state account and used as the vault authority.
glam_signersigner, writableCalling authority. It must be the owner or a delegate with the explicit permission required by this instruction.
cpi_programread-onlyExternal program invoked by this instruction.
source_stakewritableInstruction-specific account supplied by the caller or SDK.
destination_stakewritableInstruction-specific account supplied by the caller or SDK.

Arguments

ArgumentTypeNotes
move_stakebool
lamportsu64

Policy & permissions

  • Enable native Stake Program access on GLAM Protocol staging builds. Protocol bitflag: 0b00000010; review status should be checked before production use.
  • Delegate permission: Stake Program Stake/Unstake depending account movement.

Cross-instruction constraints

  • No additional cross-instruction constraint is documented beyond account initialization, authority checks, and policy validation.