mango-v4/programs/mango-v4/src/instructions/token_withdraw.rs

238 lines
8.8 KiB
Rust

use crate::accounts_zerocopy::*;
use crate::error::*;
use crate::health::*;
use crate::state::*;
use crate::util::clock_now;
use anchor_lang::prelude::*;
use anchor_spl::associated_token;
use anchor_spl::token;
use fixed::types::I80F48;
use crate::accounts_ix::*;
use crate::logs::{
emit_stack, LoanOriginationFeeInstruction, TokenBalanceLog, WithdrawLoanLog, WithdrawLog,
};
const DELEGATE_WITHDRAW_MAX: i64 = 100_000; // $0.1
pub fn token_withdraw(ctx: Context<TokenWithdraw>, amount: u64, allow_borrow: bool) -> Result<()> {
require_msg!(amount > 0, "withdraw amount must be positive");
let group = ctx.accounts.group.load()?;
let token_index = ctx.accounts.bank.load()?.token_index;
let (now_ts, now_slot) = clock_now();
// Create the account's position for that token index
let mut account = ctx.accounts.account.load_full_mut()?;
let (_, raw_token_index, _) = account.ensure_token_position(token_index)?;
// Health check _after_ the token position is guaranteed to exist
let pre_health_opt = if !account.fixed.is_in_health_region() {
let retriever = new_fixed_order_account_retriever_with_optional_banks(
ctx.remaining_accounts,
&account.borrow(),
now_slot,
)?;
let health_cache = new_health_cache_skipping_missing_banks_and_bad_oracles(
&account.borrow(),
&retriever,
now_ts,
)
.context("pre-withdraw health cache")?;
let pre_init_health = account.check_health_pre(&health_cache)?;
Some((health_cache, pre_init_health))
} else {
None
};
let mut bank = ctx.accounts.bank.load_mut()?;
let position = account.token_position_mut_by_raw_index(raw_token_index);
let native_position = position.native(&bank);
// Handle amount special case for withdrawing everything
let amount = if amount == u64::MAX && !allow_borrow {
if !native_position.is_negative() {
// TODO: This rounding may mean that if we deposit and immediately withdraw
// we can't withdraw the full amount!
native_position.floor().to_num::<u64>()
} else {
return Ok(());
}
} else {
amount
};
let is_borrow = amount > native_position;
require!(allow_borrow || !is_borrow, MangoError::SomeError);
if bank.are_borrows_reduce_only() {
require!(!is_borrow, MangoError::TokenInReduceOnlyMode);
}
let amount_i80f48 = I80F48::from(amount);
// Get the oracle price, even if stale or unconfident: We want to allow users
// to withdraw deposits (while staying healthy otherwise) if the oracle is bad.
let oracle_ref = &AccountInfoRef::borrow(ctx.accounts.oracle.as_ref())?;
let unsafe_oracle_state = oracle_state_unchecked(
&OracleAccountInfos::from_reader(oracle_ref),
bank.mint_decimals,
)?;
// Update the bank and position
let withdraw_result = bank.withdraw_with_fee(
position,
amount_i80f48,
Clock::get()?.unix_timestamp.try_into().unwrap(),
)?;
let native_position_after = position.native(&bank);
// Avoid getting in trouble because of the mutable bank account borrow later
drop(bank);
let bank = ctx.accounts.bank.load()?;
// Provide a readable error message in case the vault doesn't have enough tokens
if ctx.accounts.vault.amount < amount {
return err!(MangoError::InsufficentBankVaultFunds).with_context(|| {
format!(
"bank vault does not have enough tokens, need {} but have {}",
amount, ctx.accounts.vault.amount
)
});
}
// Transfer the actual tokens
let group_seeds = group_seeds!(group);
token::transfer(
ctx.accounts.transfer_ctx().with_signer(&[group_seeds]),
amount,
)?;
emit_stack(TokenBalanceLog {
mango_group: ctx.accounts.group.key(),
mango_account: ctx.accounts.account.key(),
token_index,
indexed_position: position.indexed_position.to_bits(),
deposit_index: bank.deposit_index.to_bits(),
borrow_index: bank.borrow_index.to_bits(),
});
// Update the net deposits - adjust by price so different tokens are on the same basis (in USD terms)
let amount_usd = (amount_i80f48 * unsafe_oracle_state.price).to_num::<i64>();
account.fixed.net_deposits -= amount_usd;
// Delegates have heavy restrictions on withdraws. #1
if account.fixed.is_delegate(ctx.accounts.owner.key()) {
// Delegates can only withdrawing into the actual owner's ATA
let owner_ata = associated_token::get_associated_token_address(
&account.fixed.owner,
&ctx.accounts.vault.mint,
);
require_keys_eq!(
ctx.accounts.token_account.key(),
owner_ata,
MangoError::DelegateWithdrawOnlyToOwnerAta
);
require_keys_eq!(
ctx.accounts.token_account.owner,
account.fixed.owner,
MangoError::DelegateWithdrawOnlyToOwnerAta
);
// Delegates must close the token position
require!(
!withdraw_result.position_is_active,
MangoError::DelegateWithdrawMustClosePosition
);
// Delegates can't withdraw too much
require_gte!(
DELEGATE_WITHDRAW_MAX,
amount_usd,
MangoError::DelegateWithdrawSmall
);
}
//
// Health check
//
if let Some((mut health_cache, pre_init_health_lower_bound)) = pre_health_opt {
if health_cache.has_token_info(token_index) {
// This is the normal case: the health cache knows about the token, we can
// compute the health for the new state by adjusting its balance
health_cache.adjust_token_balance(&bank, native_position_after - native_position)?;
account.check_health_post(&health_cache, pre_init_health_lower_bound)?;
} else {
// The health cache does not know about the token! It has a bad oracle or wasn't
// provided in the health accounts. Borrows are out of the question!
require!(!is_borrow, MangoError::BorrowsRequireHealthAccountBank);
// Since the health cache isn't aware of the bank we changed, the health
// estimation is the same.
let post_init_health_lower_bound = pre_init_health_lower_bound;
// If health without the token is positive, then full health is positive and
// withdrawing all of the token would still keep it positive.
// However, if health without it is negative then full health could be negative
// and could be made worse by withdrawals.
//
// We don't know the true pre_init_health: So require that our lower bound on
// post health is strictly good enough.
account.check_health_post_checks_strict(post_init_health_lower_bound)?;
}
}
//
// Deactivate the position only after the health check because the user passed in
// remaining_accounts for all banks/oracles, including the account that will now be
// deactivated.
//
if !withdraw_result.position_is_active {
account.deactivate_token_position_and_log(raw_token_index, ctx.accounts.account.key());
}
emit_stack(WithdrawLog {
mango_group: ctx.accounts.group.key(),
mango_account: ctx.accounts.account.key(),
signer: ctx.accounts.owner.key(),
token_index,
quantity: amount,
price: unsafe_oracle_state.price.to_bits(),
});
if withdraw_result.loan_origination_fee.is_positive() {
emit_stack(WithdrawLoanLog {
mango_group: ctx.accounts.group.key(),
mango_account: ctx.accounts.account.key(),
token_index,
loan_amount: withdraw_result.loan_amount.to_bits(),
loan_origination_fee: withdraw_result.loan_origination_fee.to_bits(),
instruction: LoanOriginationFeeInstruction::TokenWithdraw,
price: Some(unsafe_oracle_state.price.to_bits()),
});
}
// Enforce min vault to deposits ratio and net borrow limits
if is_borrow {
bank.enforce_max_utilization_on_borrow()?;
// When borrowing the price has be trustworthy, so we can do a reasonable
// net borrow check.
let slot_opt = Some(Clock::get()?.slot);
unsafe_oracle_state
.check_confidence_and_maybe_staleness(&bank.oracle_config, slot_opt)
.with_context(|| {
oracle_log_context(
bank.name(),
&unsafe_oracle_state,
&bank.oracle_config,
slot_opt,
)
})?;
bank.check_net_borrows(unsafe_oracle_state.price)?;
} else {
bank.enforce_borrows_lte_deposits()?;
}
Ok(())
}