GLAM Protocol StagingStaging
update_priced_protocol
Internal integration-only update path for publishing priced protocol records into GLAM state.
Handler narrative
- Load the GLAM state or program account required by the instruction and verify the signer.
- Apply the requested state, policy, pricing, or system action after enforcing owner/delegate checks.
- Only accessible by integration programs
Required conditions
- The submitted accounts must match the declared account list, signer requirements, writable requirements, fixed program addresses, and account relationships shown below.
- The GLAM state account is the source of truth for owner, enabled integrations, delegate permissions, policies, assets, borrowable assets, timelock settings, mint linkage, and pricing records.
- Owner-level actions must be signed by the state owner unless the instruction is explicitly an integration callback, mint-authority callback, delegate action, or emergency access update.
- Configuration changes must pass owner or authorized-manager checks and, when the state or mint timelock is active, must follow the propose/apply timing model instead of taking effect immediately.
Accounts
| Account | Role | Description |
|---|---|---|
| glam_state | writable | State account owned by the GLAM Protocol program; it records vault configuration, policies, and pricing records. |
| integration_authority | signer | Program-derived authority used by an integration during CPI into an external protocol. |
Arguments
| Argument | Type | Notes |
|---|---|---|
| priced_protocol | PricedProtocol | Priced-protocol valuation record that an authorized integration publishes into GLAM state. Fields: rent: u64; amount: i128; decimals: u8; last_updated_slot: u64; integration_program: pubkey; protocol_bitflag: u16; positions: vec<pubkey> |
Policy & permissions
- No external integration enablement is required beyond the program-level functionality involved in this instruction.
- Only the owner is expected. Delegates do not receive this capability by being added; it must be granted explicitly if supported.
Cross-instruction constraints
- No additional cross-instruction constraint is documented beyond account initialization, authority checks, and policy validation.