2026-03-17 18:08:53 +01:00
|
|
|
use std::num::NonZeroU128;
|
|
|
|
|
|
2026-04-08 17:48:13 -03:00
|
|
|
use amm_core::{
|
2026-03-31 20:45:57 -03:00
|
|
|
assert_supported_fee_tier, compute_liquidity_token_pda_seed, compute_vault_pda_seed,
|
|
|
|
|
PoolDefinition, MINIMUM_LIQUIDITY,
|
2026-04-08 17:48:13 -03:00
|
|
|
};
|
2026-03-17 18:08:53 +01:00
|
|
|
use nssa_core::{
|
|
|
|
|
account::{AccountWithMetadata, Data},
|
|
|
|
|
program::{AccountPostState, ChainedCall},
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
#[expect(clippy::too_many_arguments, reason = "TODO: Fix later")]
|
|
|
|
|
pub fn remove_liquidity(
|
|
|
|
|
pool: AccountWithMetadata,
|
|
|
|
|
vault_a: AccountWithMetadata,
|
|
|
|
|
vault_b: AccountWithMetadata,
|
|
|
|
|
pool_definition_lp: AccountWithMetadata,
|
|
|
|
|
user_holding_a: AccountWithMetadata,
|
|
|
|
|
user_holding_b: AccountWithMetadata,
|
|
|
|
|
user_holding_lp: AccountWithMetadata,
|
|
|
|
|
remove_liquidity_amount: NonZeroU128,
|
|
|
|
|
min_amount_to_remove_token_a: u128,
|
|
|
|
|
min_amount_to_remove_token_b: u128,
|
|
|
|
|
) -> (Vec<AccountPostState>, Vec<ChainedCall>) {
|
|
|
|
|
let remove_liquidity_amount: u128 = remove_liquidity_amount.into();
|
|
|
|
|
|
|
|
|
|
// 1. Fetch Pool state
|
|
|
|
|
let pool_def_data = PoolDefinition::try_from(&pool.account.data)
|
|
|
|
|
.expect("Remove liquidity: AMM Program expects a valid Pool Definition Account");
|
2026-03-31 20:45:57 -03:00
|
|
|
assert_supported_fee_tier(pool_def_data.fees);
|
2026-03-17 18:08:53 +01:00
|
|
|
|
2026-04-10 15:43:13 -03:00
|
|
|
assert!(
|
|
|
|
|
pool_def_data.liquidity_pool_supply >= MINIMUM_LIQUIDITY,
|
|
|
|
|
"Pool liquidity supply is below minimum liquidity"
|
|
|
|
|
);
|
2026-03-17 18:08:53 +01:00
|
|
|
assert_eq!(
|
|
|
|
|
pool_def_data.liquidity_pool_id, pool_definition_lp.account_id,
|
|
|
|
|
"LP definition mismatch"
|
|
|
|
|
);
|
|
|
|
|
assert_eq!(
|
|
|
|
|
vault_a.account_id, pool_def_data.vault_a_id,
|
|
|
|
|
"Vault A was not provided"
|
|
|
|
|
);
|
|
|
|
|
assert_eq!(
|
|
|
|
|
vault_b.account_id, pool_def_data.vault_b_id,
|
|
|
|
|
"Vault B was not provided"
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
// Vault addresses do not need to be checked with PDA
|
|
|
|
|
// calculation for setting authorization since stored
|
|
|
|
|
// in the Pool Definition.
|
|
|
|
|
let mut running_vault_a = vault_a.clone();
|
|
|
|
|
let mut running_vault_b = vault_b.clone();
|
|
|
|
|
running_vault_a.is_authorized = true;
|
|
|
|
|
running_vault_b.is_authorized = true;
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
min_amount_to_remove_token_a != 0,
|
|
|
|
|
"Minimum withdraw amount must be nonzero"
|
|
|
|
|
);
|
|
|
|
|
assert!(
|
|
|
|
|
min_amount_to_remove_token_b != 0,
|
|
|
|
|
"Minimum withdraw amount must be nonzero"
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
// 2. Compute withdrawal amounts
|
|
|
|
|
let user_holding_lp_data = token_core::TokenHolding::try_from(&user_holding_lp.account.data)
|
|
|
|
|
.expect("Remove liquidity: AMM Program expects a valid Token Account for liquidity token");
|
|
|
|
|
let token_core::TokenHolding::Fungible {
|
|
|
|
|
definition_id: _,
|
|
|
|
|
balance: user_lp_balance,
|
|
|
|
|
} = user_holding_lp_data
|
|
|
|
|
else {
|
|
|
|
|
panic!(
|
|
|
|
|
"Remove liquidity: AMM Program expects a valid Fungible Token Holding Account for liquidity token"
|
|
|
|
|
);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
assert!(
|
|
|
|
|
user_lp_balance <= pool_def_data.liquidity_pool_supply,
|
|
|
|
|
"Invalid liquidity account provided"
|
|
|
|
|
);
|
|
|
|
|
assert_eq!(
|
|
|
|
|
user_holding_lp_data.definition_id(),
|
|
|
|
|
pool_def_data.liquidity_pool_id,
|
|
|
|
|
"Invalid liquidity account provided"
|
|
|
|
|
);
|
2026-04-08 17:48:13 -03:00
|
|
|
// Honest flows should never reach the permanent lock through a valid remove instruction, but
|
|
|
|
|
// we still reject legacy or corrupted states that are already at the locked floor.
|
|
|
|
|
assert!(
|
|
|
|
|
pool_def_data.liquidity_pool_supply > MINIMUM_LIQUIDITY,
|
|
|
|
|
"Pool only contains locked liquidity"
|
|
|
|
|
);
|
|
|
|
|
let unlocked_liquidity = pool_def_data.liquidity_pool_supply - MINIMUM_LIQUIDITY;
|
|
|
|
|
// The remove instruction never sees the LP lock account directly, so we must still refuse any
|
|
|
|
|
// request that would burn through the permanent floor even if ownership is already corrupted.
|
|
|
|
|
assert!(
|
|
|
|
|
remove_liquidity_amount <= unlocked_liquidity,
|
|
|
|
|
"Cannot remove locked minimum liquidity"
|
|
|
|
|
);
|
2026-03-17 18:08:53 +01:00
|
|
|
|
2026-04-07 10:38:14 +02:00
|
|
|
let withdraw_amount_a = pool_def_data
|
|
|
|
|
.reserve_a
|
|
|
|
|
.checked_mul(remove_liquidity_amount)
|
|
|
|
|
.expect("reserve_a * remove_liquidity_amount overflows u128")
|
|
|
|
|
/ pool_def_data.liquidity_pool_supply;
|
|
|
|
|
let withdraw_amount_b = pool_def_data
|
|
|
|
|
.reserve_b
|
|
|
|
|
.checked_mul(remove_liquidity_amount)
|
|
|
|
|
.expect("reserve_b * remove_liquidity_amount overflows u128")
|
|
|
|
|
/ pool_def_data.liquidity_pool_supply;
|
2026-03-17 18:08:53 +01:00
|
|
|
|
|
|
|
|
// 3. Validate and slippage check
|
|
|
|
|
assert!(
|
|
|
|
|
withdraw_amount_a >= min_amount_to_remove_token_a,
|
|
|
|
|
"Insufficient minimal withdraw amount (Token A) provided for liquidity amount"
|
|
|
|
|
);
|
|
|
|
|
assert!(
|
|
|
|
|
withdraw_amount_b >= min_amount_to_remove_token_b,
|
|
|
|
|
"Insufficient minimal withdraw amount (Token B) provided for liquidity amount"
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
// 4. Calculate LP to reduce cap by
|
2026-04-08 17:48:13 -03:00
|
|
|
let delta_lp: u128 = remove_liquidity_amount;
|
2026-03-17 18:08:53 +01:00
|
|
|
|
|
|
|
|
// 5. Update pool account
|
|
|
|
|
let mut pool_post = pool.account.clone();
|
|
|
|
|
let pool_post_definition = PoolDefinition {
|
2026-04-07 10:38:14 +02:00
|
|
|
liquidity_pool_supply: pool_def_data
|
|
|
|
|
.liquidity_pool_supply
|
|
|
|
|
.checked_sub(delta_lp)
|
|
|
|
|
.expect("liquidity_pool_supply - delta_lp underflows"),
|
|
|
|
|
reserve_a: pool_def_data
|
|
|
|
|
.reserve_a
|
|
|
|
|
.checked_sub(withdraw_amount_a)
|
|
|
|
|
.expect("reserve_a - withdraw_amount_a underflows"),
|
|
|
|
|
reserve_b: pool_def_data
|
|
|
|
|
.reserve_b
|
|
|
|
|
.checked_sub(withdraw_amount_b)
|
|
|
|
|
.expect("reserve_b - withdraw_amount_b underflows"),
|
2026-03-17 18:08:53 +01:00
|
|
|
..pool_def_data.clone()
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
pool_post.data = Data::from(&pool_post_definition);
|
|
|
|
|
|
|
|
|
|
let token_program_id = user_holding_a.account.program_owner;
|
|
|
|
|
|
|
|
|
|
// Chaincall for Token A withdraw
|
|
|
|
|
let call_token_a = ChainedCall::new(
|
|
|
|
|
token_program_id,
|
|
|
|
|
vec![running_vault_a, user_holding_a.clone()],
|
|
|
|
|
&token_core::Instruction::Transfer {
|
|
|
|
|
amount_to_transfer: withdraw_amount_a,
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
.with_pda_seeds(vec![compute_vault_pda_seed(
|
|
|
|
|
pool.account_id,
|
|
|
|
|
pool_def_data.definition_token_a_id,
|
|
|
|
|
)]);
|
|
|
|
|
// Chaincall for Token B withdraw
|
|
|
|
|
let call_token_b = ChainedCall::new(
|
|
|
|
|
token_program_id,
|
|
|
|
|
vec![running_vault_b, user_holding_b.clone()],
|
|
|
|
|
&token_core::Instruction::Transfer {
|
|
|
|
|
amount_to_transfer: withdraw_amount_b,
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
.with_pda_seeds(vec![compute_vault_pda_seed(
|
|
|
|
|
pool.account_id,
|
|
|
|
|
pool_def_data.definition_token_b_id,
|
|
|
|
|
)]);
|
|
|
|
|
// Chaincall for LP adjustment
|
|
|
|
|
let mut pool_definition_lp_auth = pool_definition_lp.clone();
|
|
|
|
|
pool_definition_lp_auth.is_authorized = true;
|
|
|
|
|
let call_token_lp = ChainedCall::new(
|
|
|
|
|
token_program_id,
|
|
|
|
|
vec![pool_definition_lp_auth, user_holding_lp.clone()],
|
|
|
|
|
&token_core::Instruction::Burn {
|
|
|
|
|
amount_to_burn: delta_lp,
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
.with_pda_seeds(vec![compute_liquidity_token_pda_seed(pool.account_id)]);
|
|
|
|
|
|
|
|
|
|
let chained_calls = vec![call_token_lp, call_token_b, call_token_a];
|
|
|
|
|
|
|
|
|
|
let post_states = vec![
|
|
|
|
|
AccountPostState::new(pool_post.clone()),
|
|
|
|
|
AccountPostState::new(vault_a.account.clone()),
|
|
|
|
|
AccountPostState::new(vault_b.account.clone()),
|
|
|
|
|
AccountPostState::new(pool_definition_lp.account.clone()),
|
|
|
|
|
AccountPostState::new(user_holding_a.account.clone()),
|
|
|
|
|
AccountPostState::new(user_holding_b.account.clone()),
|
|
|
|
|
AccountPostState::new(user_holding_lp.account.clone()),
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
(post_states, chained_calls)
|
|
|
|
|
}
|