Skip to content

Commit 6d00021

Browse files
Merge pull request #5804 from HasiniSama/revert-default-keyword
Replace usage of default filters with explicit version-based logic
2 parents e8bbd6a + d87c40a commit 6d00021

File tree

3 files changed

+37
-6
lines changed

3 files changed

+37
-6
lines changed

en/includes/guides/authentication/oidc/private-key-jwt-client-auth.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,13 @@ If you are implementing the authorization code flow, you have enabled **code** a
162162
<table>
163163
<tr>
164164
<th>
165-
<code>{{ organization_path_param | default('{organization_name}') }}</code>
165+
<code>
166+
{%- if product_name == "WSO2 Identity Server" and is_version > "7.1.0" -%}
167+
{{ organization_path_param }}
168+
{%- else -%}
169+
{{ organization_name }}
170+
{%- endif -%}
171+
</code>
166172
</th>
167173
<td>
168174
{% if product_name == "WSO2 Identity Server" and is_version > "7.1.0" %}Handle{% else %}Name{% endif %} of the organization that you are accessing.
@@ -210,7 +216,13 @@ Be sure to replace the following values in the request:
210216
211217
<table>
212218
<th>
213-
<code>{{ organization_path_param | default('{organization_name}') }}</code>
219+
<code>
220+
{%- if product_name == "WSO2 Identity Server" and is_version > "7.1.0" -%}
221+
{{ organization_path_param }}
222+
{%- else -%}
223+
{{ organization_name }}
224+
{%- endif -%}
225+
</code>
214226
</th>
215227
<td>
216228
{% if product_name == "WSO2 Identity Server" and is_version > "7.1.0" %}Handle{% else %}Name{% endif %} of the organization that you are accessing.

en/includes/guides/organization-management/manage-b2b-administration.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,11 @@ You may facilitate this using the [application management API]({{base_path}}/api
4444
{{ product_name }} Console can also function as an administration portal for your B2B application which is accessible through the following URL:
4545

4646
```
47-
https://{{ console_hostname }}/t/{{ root_organization_path_param | default('<root_organization_name>') }}/o/<organization id>/{{ console_app_path }}
47+
{% if product_name == "WSO2 Identity Server" and is_version > "7.1.0" %}
48+
https://{{ console_hostname }}/t/{{ root_organization_path_param }}/o/<organization id>/{{ console_app_path }}
49+
{% else %}
50+
https://{{ console_hostname }}/t/{{ root_organization_name }}/o/<organization id>/{{ console_app_path }}
51+
{% endif %}
4852
```
4953

5054
However, the following limitations apply.

en/includes/guides/organization-management/onboard-users.md

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,12 @@ In order to invite users from the parent organization, get to know the usernames
4848

4949
If a user of the organization with {{ product_name }} Console access needs to invite a user from the parent organization, follow the steps below.
5050

51-
1. Login to your organization using the link `https://{{console_host_name}}/t/{{ root_organization_path_param | default('{root_organization_name}') }}/o/{organization-id}{{console_path}}`.
51+
1. Login to your organization using the link
52+
{%- if product_name == "WSO2 Identity Server" and is_version > "7.1.0" -%}
53+
`https://{{ console_host_name }}/t/{{ root_organization_path_param }}/o/{organization-id}{{ console_path }}`.
54+
{%- else -%}
55+
`https://{{ console_host_name }}/t/{{ root_organization_name }}/o/{organization-id}{{ console_path }}`.
56+
{%- endif -%}
5257
2. Go to **User Management > Users** and click **Add user**. From there, select **Invite Parent User**.
5358
3. Enter the usernames of the user that you want to invite to the organization. You can enter multiple usernames by pressing enter after each username input.
5459
4. Select the groups that you want to assign to the invited users.
@@ -115,7 +120,12 @@ property can be set to false in Parent Organization's User Invitation API. The f
115120
used to obtain the confirmation code without sending email notifications.
116121

117122
``` bash
118-
curl --location --request POST 'https://{{ host_name }}/t/{{ organization_path_param | default(organization_name) }}/o/api/server/v1/guests/invite' \
123+
curl --location --request POST \
124+
{%- if product_name == "WSO2 Identity Server" and is_version > "7.1.0" -%}
125+
'https://{{ host_name }}/t/{{ organization_path_param }}/o/api/server/v1/guests/invite' \
126+
{%- else -%}
127+
'https://{{ host_name }}/t/{{ organization_name }}/o/api/server/v1/guests/invite' \
128+
{%- endif -%}
119129
--header 'Authorization: Bearer <access-token-obtained-for-the-organization>' \
120130
--header 'Content-Type: application/json' \
121131
--data '{
@@ -163,7 +173,12 @@ Sample Response will contain the confirmation code as follows.
163173
If you are sending the invitation email through an external service, include this confirmation code, which need to be accepted through following invitation accepting API. If your applications wants to proceed parent user invitation flow without any email sending, applications can invoke the following API call as the next step.
164174
165175
``` bash
166-
curl --location --request POST 'https://{{ host_name }}/t/{{ organization_path_param | default(organization_name) }}/o/api/server/v1/guests/invitation/accept' \
176+
curl --location --request POST \
177+
{%- if product_name == "WSO2 Identity Server" and is_version > "7.1.0" -%}
178+
'https://{{ host_name }}/t/{{ organization_path_param }}/o/api/server/v1/guests/invitation/accept' \
179+
{%- else -%}
180+
'https://{{ host_name }}/t/{{ organization_name }}/o/api/server/v1/guests/invitation/accept' \
181+
{%- endif -%}
167182
--header 'Authorization: Bearer <access-token-obtained-for-the-organization>' \
168183
--header 'Content-Type: application/json' \
169184
--data '{

0 commit comments

Comments
 (0)