Extend an Existing Pool Type Using Hooks
This section is for developers looking to extend an existing pool type with custom hooks. If you are looking to create a custom AMM with a novel invariant, start here.
Hooks introduce a new framework for extending the functionality of existing pool types at key points throughout their lifecycle. By enabling actions during pool operations and facilitating dynamic swap fee computation, hooks offer unprecedented control over pool behavior. This innovative concept empowers developers to craft tailored pool behaviors, catering to specific use cases and enhancing operations with greater flexibility and control.
Info
Before you start with this walkthrough, consider reading through the technical section on hooks and take a look at the Hooks API.
Creating a Dynamic Swap Fee Hook Contract
A hooks contract should inherit the BaseHooks.sol abstract contract, which provides a minimal implementation for a hooks contract. At a high level this contract includes:
- Base implementation: A complete implementation of the IHooks.sol interface, with each implemented function returning false.
- Configuration: A virtual function
getHookFlags
that must be implemented by your hooks contract, defining which hooks your contract supports.
Below, we present a naive implementation of a swap-fee discount hook contract giving any veBAL holder a reduced swap fee. Hooks should also inherit from VaultGuard
, which stores a reference to the Vault and provides the onlyVault
modifier. This is required for onRegister
and hook overrides, to ensure they cannot be called except by the Vault.
contract VeBALFeeDiscountHook is BaseHooks, VaultGuard {
// Only pools from a specific factory are able to register and use this hook.
address private immutable _allowedFactory;
// Only trusted routers are allowed to call this hook, because the hook relies on the `getSender` implementation
// implementation to work properly.
address private immutable _trustedRouter;
// The gauge token received from staking the 80/20 BAL/WETH pool token.
IERC20 private immutable _veBAL;
/**
* @notice A new `VeBALFeeDiscountHookExample` contract has been registered successfully.
* @dev If the registration fails the call will revert, so there will be no event.
* @param hooksContract This contract
* @param factory The factory (must be the allowed factory, or the call will revert)
* @param pool The pool on which the hook was registered
*/
event VeBALFeeDiscountHookExampleRegistered(
address indexed hooksContract,
address indexed factory,
address indexed pool
);
constructor(IVault vault, address allowedFactory, address veBAL, address trustedRouter) VaultGuard(vault) {
_allowedFactory = allowedFactory;
_trustedRouter = trustedRouter;
_veBAL = IERC20(veBAL);
}
/// @inheritdoc IHooks
function getHookFlags() public pure override returns (IHooks.HookFlags memory hookFlags) {
hookFlags.shouldCallComputeDynamicSwapFee = true;
}
/// @inheritdoc IHooks
function onRegister(
address factory,
address pool,
TokenConfig[] memory,
LiquidityManagement calldata
) public override onlyVault returns (bool) {
// This hook implements a restrictive approach, where we check if the factory is an allowed factory and if
// the pool was created by the allowed factory. Since we only use onComputeDynamicSwapFeePercentage, this
// might be an overkill in real applications because the pool math doesn't play a role in the discount
// calculation.
emit VeBALFeeDiscountHookExampleRegistered(address(this), factory, pool);
return factory == _allowedFactory && IBasePoolFactory(factory).isPoolFromFactory(pool);
}
/// @inheritdoc IHooks
function onComputeDynamicSwapFeePercentage(
PoolSwapParams calldata params,
address pool,
uint256 staticSwapFeePercentage
) public view override onlyVault returns (bool, uint256) {
// If the router is not trusted, does not apply the veBAL discount because getSender() may be manipulated by a
// malicious router.
if (params.router != _trustedRouter) {
return (true, staticSwapFeePercentage);
}
address user = IRouterCommon(params.router).getSender();
// If user has veBAL, apply a 50% discount to the current fee (divides fees by 2)
if (_veBAL.balanceOf(user) > 0) {
return (true, staticSwapFeePercentage / 2);
}
return (true, staticSwapFeePercentage);
}
}
Setting Hook Configuration
function getHookFlags() external pure override returns (IHooks.HookFlags memory hookFlags) {
// all flags default to false
hookFlags.shouldCallComputeDynamicSwapFee = true;
}
The getHookFlags
function returns a HookFlags
struct, which indicates which hooks are implemented by the contract. When a pool is registered, the Vault calls this function to store the configuration. In this example, the shouldCallComputeDynamicSwapFee
flag is set to true, indicating that the contract is configured to calculate the dynamic swap fee.
Hook Registration
function onRegister(
address factory,
address pool,
TokenConfig[] memory,
LiquidityManagement calldata
) external view override returns (bool) {
emit VeBALFeeDiscountHookExampleRegistered(address(this), factory, pool);
return factory == _allowedFactory && IBasePoolFactory(factory).isPoolFromFactory(pool);
}
The onRegister
function enables developers to implement custom validation logic to ensure the registration is valid. When a new pool is registered, a hook address can be provided to "link" the pool and the hook. At this stage, the onRegister
function is invoked by the Vault, and it must return true for the registration to be successful. If the validation fails, the function should return false, preventing the registration from being completed.
In this example we validate that the factory
param forwarded from the Vault matches the allowedFactory
set during the hook deployment, and that the pool was deployed by that factory. If successful, it emits an event for tracking by off-chain processes.
Implementing the Swap Fee Logic
function onComputeDynamicSwapFeePercentage(
PoolSwapParams calldata params,
address pool,
uint256 staticSwapFeePercentage
) external view override returns (bool, uint256) {
// If the router is not trusted, does not apply the veBAL discount because getSender() may be manipulated by a
// malicious router.
if (params.router != _trustedRouter) {
return (true, staticSwapFeePercentage);
}
address user = IRouterCommon(params.router).getSender();
// If user has veBAL, apply a 50% discount to the current fee (divides fees by 2)
if (_veBAL.balanceOf(user) > 0) {
return (true, staticSwapFeePercentage / 2);
}
return (true, staticSwapFeePercentage);
}
Now we can implement the logic in the onComputeDynamicSwapFeePercentage
function, which the Vault calls to retrieve the swap fee value. In our example, any veBal holder enjoys a 50% swap fee discount, instead of the default static swap fee. However, there are some nuances to consider in this implementation.
To obtain the user's veBAL balance, we need the sender's address, which we can retrieve by calling getSender()
on the router. This relies on the router returning the correct address, so it's crucial to ensure the router is "trusted" (any contract can act as a Router). In our example we passed a trusted _router
address, which is saved during the hook deployment.