Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.grantex.dev/llms.txt

Use this file to discover all available pages before exploring further.

Commerce V1 Developer Guide

This guide explains how developers should reason about the Grantex Commerce V1 contract. It is safe documentation only. It does not enable production Commerce V1, live payments, live Plural, or production discovery.

API And MCP Surface

Developers should use the OpenAPI contract in docs/api/grantex-commerce-v1.openapi.yaml plus the MCP tool surface exposed by the Commerce service. The current AgenticOrg integration uses these Grantex-only aliases:
AreaTool or API responsibility
Merchant profileFetch merchant policy and status metadata.
Catalog searchSearch grounded merchant products.
Catalog get itemRetrieve a specific product or variant.
Inventory checkConfirm availability before cart or checkout.
Cart createCreate a cart draft from grounded catalog IDs.
Consent requestAsk for the user permission required for checkout.
Consent exchangeExchange granted consent for a Commerce Passport when a granted consent fixture exists.
Payment intentCreate a provider-neutral payment intent with passport and policy checks.
Checkout createCreate a checkout handoff through Grantex.
Payment statusPoll Grantex payment status, not a provider directly.

Auth And Caller Model

Commerce callers are modeled as agents operating for a tenant, merchant, and user. A caller must be authenticated through an approved Grantex auth source in runtime configuration. Auth material is runtime-sensitive and must not be committed or printed. The important IDs are not equivalent:
IdentifierPurpose
Tenant IDOwns isolation and policy boundaries.
Merchant IDOwns catalog, provider configuration status, and merchant policy.
Agent IDIdentifies the delegated agent allowed to use commerce tools.
User/principalThe person whose consent controls checkout.
Commerce PassportScoped, usable runtime material created after approved consent or smoke fixture export.
Synthetic tenant, merchant, user, product, and variant IDs may appear in evidence when they are non-production fixtures. Usable passports, bearer tokens, idempotency key values, secrets, and provider credentials remain sensitive. During fixture-backed smoke runs, AgenticOrg may already have a checkout passport exported by the Grantex smoke runner. In that case, AgenticOrg evidence treats consent_exchange as skipped only when the blocker is exactly preexported_checkout_passport_without_granted_consent_fixture.

Payment Intent Shape

Payment intent calls must send only fields supported by the Grantex Commerce contract. Local fixture guardrail data, such as amount cap metadata used by AgenticOrg preflight checks, must not be forwarded to Grantex as arbitrary top-level request fields. Keep idempotency values out of docs and logs. Evidence may record that an idempotency mechanism was used, but never the value.

Webhooks And Replay

Grantex owns provider webhook ingestion, verification, replay controls, and reconciliation status. Current smoke evidence uses the mock-provider path only. Failed webhook replay is an operator-only capability and remains mock-provider only until the live provider contract and signature behavior are approved. Replay safety rules:
  • do not log raw provider payloads;
  • do not store or expose webhook secrets in documentation;
  • preserve original signature metadata only in protected runtime storage;
  • replay only through operator-approved controls;
  • treat live provider replay as blocked until provider/legal/ops gates pass.

Error Handling

Commerce clients should treat validation and policy failures as explicit outcomes, not retry storms. Important classes include:
ClassExpected handling
validation_failedFix request shape or unsupported field usage.
consent_not_grantedDo not proceed without granted consent or an approved checkout passport fixture.
consent_deniedStop the checkout path.
Amount-cap or policy breachFail safely before payment/provider work.
Disabled merchant or untrusted agentStop and surface an operator-safe blocker.

Sandbox And Mock Provider

Use mock-provider/internal sandbox flows for development. Production Commerce V1, live payments, and live Plural are disabled. Approved temporary Option A smoke uses isolated Cloud Run, Cloud SQL, Redis, smoke secrets, and mock provider resources that are deleted immediately after evidence capture. Developers should use:
  • docs/guides/commerce-v1-repeatable-option-a-smoke-workflow.md for the approval-gated smoke path;
  • docs/examples/commerce-option-a-smoke.runbook.json for runbook fields;
  • docs/reports/commerce-v1-option-a-smoke-evidence.md for scrubbed evidence;
  • docs/reports/commerce-v1-production-discovery-readiness.md for current production discovery posture.

Blocked Until Future Approval

  • Production Commerce V1 discovery enablement.
  • External pilot readiness claims.
  • Production checkout or live payment execution.
  • Live Plural or live provider credentials.
  • Direct provider calls from AgenticOrg commerce.
  • Public docs that imply AP2, UCP, ACP, Plural, payment-provider, or external pilot certification.