Skip to content

Commit 232ef58

Browse files
committed
Align signed request id examples
1 parent 9ed479e commit 232ef58

16 files changed

Lines changed: 83 additions & 82 deletions

mintlify/openapi.yaml

Lines changed: 20 additions & 20 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

mintlify/snippets/global-accounts/authentication.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -588,7 +588,7 @@ Requires an active session on an *existing* credential on the same account. The
588588
{
589589
"type": "EMAIL_OTP",
590590
"payloadToSign": "{\"requestId\":\"7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21\",\"type\":\"EMAIL_OTP\",\"accountId\":\"EmbeddedWallet:019542f5-b3e7-1d02-0000-000000000002\",\"expiresAt\":\"2026-04-08T15:35:00Z\"}",
591-
"requestId": "7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21",
591+
"requestId": "Request:7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21",
592592
"expiresAt": "2026-04-08T15:35:00Z"
593593
}
594594
```
@@ -604,7 +604,7 @@ Requires an active session on an *existing* credential on the same account. The
604604
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
605605
-H "Content-Type: application/json" \
606606
-H "Grid-Wallet-Signature: MEUCIQDx7k2N0aK4p8f3vR9J6yT5wL1mB0sXnG2hQ4vJ8zYkCgIgZ4rP9dT7eWfU3oM6KjR1qSpNvBwL0tXyA2iG8fH5dE=" \
607-
-H "Request-Id: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
607+
-H "Request-Id: Request:7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
608608
-d '{
609609
"type": "EMAIL_OTP",
610610
"accountId": "EmbeddedWallet:019542f5-b3e7-1d02-0000-000000000002",
@@ -640,7 +640,7 @@ A credential is revoked by signing with a session from **a different credential
640640
{
641641
"type": "PASSKEY",
642642
"payloadToSign": "Y2hhbGxlbmdlLXBheWxvYWQtdG8tc2lnbg==",
643-
"requestId": "9f7a2c10-5e88-4fb1-bd0e-1c3a8e7b2d45",
643+
"requestId": "Request:9f7a2c10-5e88-4fb1-bd0e-1c3a8e7b2d45",
644644
"expiresAt": "2026-04-08T15:35:00Z"
645645
}
646646
```
@@ -653,7 +653,7 @@ A credential is revoked by signing with a session from **a different credential
653653
curl -X DELETE "$GRID_BASE_URL/auth/credentials/AuthMethod:019542f5-b3e7-1d02-0000-000000000001" \
654654
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
655655
-H "Grid-Wallet-Signature: MEUCIQDx7k2N0aK4p8f3vR9J6yT5wL1mB0sXnG2hQ4vJ8zYkCgIgZ4rP9dT7eWfU3oM6KjR1qSpNvBwL0tXyA2iG8fH5dE=" \
656-
-H "Request-Id: 9f7a2c10-5e88-4fb1-bd0e-1c3a8e7b2d45"
656+
-H "Request-Id: Request:9f7a2c10-5e88-4fb1-bd0e-1c3a8e7b2d45"
657657
```
658658

659659
**Response:** `204 No Content`. All active sessions issued by the revoked credential are also revoked.

mintlify/snippets/global-accounts/exporting-wallet.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ sequenceDiagram
3737
```json
3838
{
3939
"payloadToSign": "Y2hhbGxlbmdlLXBheWxvYWQtdG8tc2lnbg==",
40-
"requestId": "c3f8a614-47e2-4a19-9f5d-2b0a91d47e08",
40+
"requestId": "Request:c3f8a614-47e2-4a19-9f5d-2b0a91d47e08",
4141
"expiresAt": "2026-04-19T12:10:00Z"
4242
}
4343
```
@@ -51,7 +51,7 @@ sequenceDiagram
5151
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
5252
-H "Content-Type: application/json" \
5353
-H "Grid-Wallet-Signature: MEUCIQDx7k2N0aK4p8f3vR9J6yT5wL1mB0sXnG2hQ4vJ8zYkCgIgZ4rP9dT7eWfU3oM6KjR1qSpNvBwL0tXyA2iG8fH5dE=" \
54-
-H "Request-Id: c3f8a614-47e2-4a19-9f5d-2b0a91d47e08" \
54+
-H "Request-Id: Request:c3f8a614-47e2-4a19-9f5d-2b0a91d47e08" \
5555
-d '{
5656
"clientPublicKey": "04f45f2a22c908b9ce09a7150e514afd24627c401c38a4afc164e1ea783adaaa31d4245acfb88c2ebd42b47628d63ecabf345484f0a9f665b63c54c897d5578be2"
5757
}'

mintlify/snippets/global-accounts/managing-sessions.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Session revocation uses the same <a href="authentication#the-signed-retry-patter
5353
{
5454
"type": "PASSKEY",
5555
"payloadToSign": "Y2hhbGxlbmdlLXBheWxvYWQtdG8tc2lnbg==",
56-
"requestId": "2b1e5a08-9c44-4e91-ae7f-6d0b3f8c1e22",
56+
"requestId": "Request:2b1e5a08-9c44-4e91-ae7f-6d0b3f8c1e22",
5757
"expiresAt": "2026-04-19T12:10:00Z"
5858
}
5959
```
@@ -66,7 +66,7 @@ Session revocation uses the same <a href="authentication#the-signed-retry-patter
6666
curl -X DELETE "$GRID_BASE_URL/auth/sessions/Session:019542f5-b3e7-1d02-0000-000000000003" \
6767
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
6868
-H "Grid-Wallet-Signature: MEUCIQDx7k2N0aK4p8f3vR9J6yT5wL1mB0sXnG2hQ4vJ8zYkCgIgZ4rP9dT7eWfU3oM6KjR1qSpNvBwL0tXyA2iG8fH5dE=" \
69-
-H "Request-Id: 2b1e5a08-9c44-4e91-ae7f-6d0b3f8c1e22"
69+
-H "Request-Id: Request:2b1e5a08-9c44-4e91-ae7f-6d0b3f8c1e22"
7070
```
7171

7272
**Response:** `204 No Content`.

mintlify/snippets/global-accounts/walkthrough.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ The customer has an outstanding quote with a `payloadToSign`. Now we need a sess
262262
"createdAt": "2026-04-19T12:00:01Z",
263263
"updatedAt": "2026-04-19T12:05:00Z",
264264
"challenge": "VjZ6o8KfE9V3q3LkR2nH5eZ6dM8yA1xW",
265-
"requestId": "7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21",
265+
"requestId": "Request:7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21",
266266
"expiresAt": "2026-04-19T12:10:00Z"
267267
}
268268
```
@@ -295,7 +295,7 @@ The customer has an outstanding quote with a `payloadToSign`. Now we need a sess
295295
curl -X POST "$GRID_BASE_URL/auth/credentials/AuthMethod:019542f5-b3e7-1d02-0000-000000000001/verify" \
296296
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
297297
-H "Content-Type: application/json" \
298-
-H "Request-Id: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
298+
-H "Request-Id: Request:7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
299299
-d '{
300300
"type": "PASSKEY",
301301
"assertion": {

mintlify/snippets/sandbox-global-account-magic.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Pass `000000` as the body `otp` on `POST /auth/credentials/{id}/verify` when the
1010
curl -X POST https://api.lightspark.com/grid/2025-10-13/auth/credentials/AuthMethod:abc123/verify \
1111
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
1212
-H "Content-Type: application/json" \
13-
-H "Request-Id: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
13+
-H "Request-Id: Request:7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
1414
-d '{
1515
"type": "EMAIL_OTP",
1616
"otp": "000000",
@@ -39,7 +39,7 @@ curl -X POST https://api.lightspark.com/grid/2025-10-13/auth/credentials/AuthMet
3939
curl -X POST https://api.lightspark.com/grid/2025-10-13/auth/credentials/AuthMethod:abc123/verify \
4040
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
4141
-H "Content-Type: application/json" \
42-
-H "Request-Id: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
42+
-H "Request-Id: Request:7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
4343
-d '{
4444
"type": "PASSKEY",
4545
"assertion": {
@@ -61,7 +61,7 @@ Pass `sandbox-valid-oidc-token` as the body `oidcToken` on both `POST /auth/cred
6161
curl -X POST https://api.lightspark.com/grid/2025-10-13/auth/credentials/AuthMethod:abc123/verify \
6262
-u "$GRID_CLIENT_ID:$GRID_CLIENT_SECRET" \
6363
-H "Content-Type: application/json" \
64-
-H "Request-Id: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
64+
-H "Request-Id: Request:7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21" \
6565
-d '{
6666
"type": "OAUTH",
6767
"oidcToken": "sandbox-valid-oidc-token",

0 commit comments

Comments
 (0)