GLAMIDL Reference

update_priced_protocol

Internal integration-only update path for publishing priced protocol records into GLAM state.

Handler narrative

  1. Load the GLAM state or program account required by the instruction and verify the signer.
  2. Apply the requested state, policy, pricing, or system action after enforcing owner/delegate checks.
  3. Only accessible by integration programs

Required conditions

  • The submitted accounts must match the declared account list, signer requirements, writable requirements, fixed program addresses, and account relationships shown below.
  • The GLAM state account is the source of truth for owner, enabled integrations, delegate permissions, policies, assets, borrowable assets, timelock settings, mint linkage, and pricing records.
  • Owner-level actions must be signed by the state owner unless the instruction is explicitly an integration callback, mint-authority callback, delegate action, or emergency access update.
  • Configuration changes must pass owner or authorized-manager checks and, when the state or mint timelock is active, must follow the propose/apply timing model instead of taking effect immediately.

Accounts

AccountRoleDescription
glam_statewritableState account owned by the GLAM Protocol program; it records vault configuration, policies, and pricing records.
integration_authoritysignerProgram-derived authority used by an integration during CPI into an external protocol.

Arguments

ArgumentTypeNotes
priced_protocolPricedProtocolPriced-protocol valuation record that an authorized integration publishes into GLAM state. Fields: rent: u64; amount: i128; decimals: u8; last_updated_slot: u64; integration_program: pubkey; protocol_bitflag: u16; positions: vec<pubkey>

Policy & permissions

  • No external integration enablement is required beyond the program-level functionality involved in this instruction.
  • Only the owner is expected. Delegates do not receive this capability by being added; it must be granted explicitly if supported.

Cross-instruction constraints

  • No additional cross-instruction constraint is documented beyond account initialization, authority checks, and policy validation.