Skip to content

Fix: Remove unnecessary $ sign from filter parameter in API URLs for all affected versions (Product IS issue #27138)#5986

Open
wso2-engineering-bot wants to merge 1 commit intomasterfrom
fixing-product-is-issue-27138-1773812696
Open

Fix: Remove unnecessary $ sign from filter parameter in API URLs for all affected versions (Product IS issue #27138)#5986
wso2-engineering-bot wants to merge 1 commit intomasterfrom
fixing-product-is-issue-27138-1773812696

Conversation

@wso2-engineering-bot
Copy link

@wso2-engineering-bot wso2-engineering-bot commented Mar 18, 2026

This PR was automatically generated by Claude AI.

  • Fixes Unnecessary $ sign in the example URLs product-is#27138
  • Type: Documentation Bug
  • Summary: Removed unnecessary $ sign before filter parameter in API example URLs. The incorrect syntax ?$filter= has been corrected to ?filter= throughout the documentation.
  • Affected Versions: 6.0.0, 6.1.0, 7.0.0, 7.1.0, 7.2.0, next
  • Verification: mkdocs build passed successfully

Changes made:

  • Fixed search context URL examples in the "Retrieve Tenant Resources Based on Search Parameters" documentation
  • Corrected 5 instances per version (30 total across all versions):
    • Search context URL definition
    • Super tenant reference example
    • Tenant reference example
    • Sample GET request
    • Sample CURL command

Summary by CodeRabbit

Release Notes

  • Documentation
    • Updated API endpoint examples across all Identity Server versions to use simplified query parameter syntax for search operations. Query examples now display ?filter= instead of ?$filter= for improved clarity and consistency.

…all affected versions (product-is#27138)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.


wso2-engineering-bot seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account.
You have signed the CLA already but the status is still pending? Let us recheck it.

@coderabbitai
Copy link
Contributor

coderabbitai bot commented Mar 18, 2026

Walkthrough

Documentation across six versions of the API retrieve-tenant-resources guide was updated to remove the incorrect dollar-sign prefix from the filter query parameter in example URLs. URLs previously shown as ?$filter=... are corrected to ?filter=... throughout endpoint examples and code samples.

Changes

Cohort / File(s) Summary
API Documentation Updates
en/identity-server/6.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md, en/identity-server/6.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md, en/identity-server/7.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md, en/identity-server/7.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md, en/identity-server/7.2.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md, en/identity-server/next/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md
Removed incorrect $ prefix from filter query parameter in example URLs and curl commands, changing ?$filter={search-query} to ?filter={search-query} across super tenant and tenant endpoint examples. Documentation-only changes with no functional impact.

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~2 minutes

Poem

🐰 The dollar sign had to go away,
In filter queries, it caused dismay,
Now examples shine, clean and bright,
Six docs corrected, all looking right! ✨

🚥 Pre-merge checks | ✅ 5
✅ Passed checks (5 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and specifically summarizes the main change: removing the unnecessary $ sign from the filter parameter in API URLs across multiple versions, directly addressing the linked issue.
Description check ✅ Passed The PR description includes purpose, issue reference, affected versions, test verification, and a detailed summary of changes, though it deviates from the template format.
Linked Issues check ✅ Passed The code changes directly address issue #27138 by replacing all $filter= occurrences with filter= across the specified documentation versions (6.0.0, 6.1.0, 7.0.0, 7.1.0, 7.2.0, and next).
Out of Scope Changes check ✅ Passed All changes are scoped to fixing the filter parameter syntax in API documentation examples; no unrelated modifications are present.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch fixing-product-is-issue-27138-1773812696
📝 Coding Plan
  • Generate coding plan for human review comments

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 6

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In
`@en/identity-server/6.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`:
- Line 231: The curl example in the docs uses real-looking credentials ("--user
admin:admin"); replace them with a non-sensitive placeholder (e.g., "--user
<username>:<password>" or similar) in the example line containing the GET
request (the curl invocation showing /api/identity/config-mgt/v1.0/search) so no
secrets appear in the documentation and it conforms to the fenced-code-block
placeholder guideline.

In
`@en/identity-server/6.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`:
- Line 231: The curl example currently contains real-looking credentials
"admin:admin" in the command shown (the curl line with --user admin:admin);
update that example to use a neutral placeholder such as --user
<USERNAME>:<PASSWORD> or --user {USERNAME}:{PASSWORD} and ensure the snippet is
in a fenced code block with the appropriate language tag (e.g., bash) instead of
embedding credentials directly so no secret-like values appear in the docs.

In
`@en/identity-server/7.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`:
- Around line 230-231: The curl example contains hardcoded credentials (--user
admin:admin); replace that with placeholders (e.g., --user
<USERNAME>:<PASSWORD>) or remove the --user flag and document using an auth
placeholder, and wrap the command in a fenced code block tagged with bash;
update the line containing the curl command string (the GET
'https://localhost:9443/api/identity/config-mgt/v1.0/search?...' example) to use
the placeholder credentials and proper fenced block formatting.

In
`@en/identity-server/7.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`:
- Line 231: Replace the hardcoded credentials in the curl example (the curl -k
-v --user admin:admin GET
'https://localhost:9443/api/identity/config-mgt/v1.0/search?...' line) with a
placeholder like <username>:<password> and ensure the example is presented as a
fenced code block (bash) without real secrets; update the --user argument only
and keep the rest of the curl invocation unchanged.

In
`@en/identity-server/7.2.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`:
- Line 231: The curl example currently includes hardcoded credentials (`--user
admin:admin`) — update the curl snippet in the retrieve-tenant-resources example
to remove real credentials and use clear placeholders instead (e.g., `--user
<USERNAME>:<PASSWORD>` or `-u {username}:{password}`) so the command in the
source containing the curl invocation uses placeholders rather than
`admin:admin`; ensure the change is made in the curl line shown in the doc (the
curl -k -v ... GET 'https://localhost:9443/...search?...' snippet).

In
`@en/identity-server/next/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`:
- Line 231: Replace the hardcoded credentials in the curl example (the line
containing "curl -k -v --user admin:admin GET
'https://localhost:9443/api/identity/config-mgt/v1.0/search?...'") with
placeholder credentials such as "<username>:<password>" or environment-style
placeholders like "$USERNAME:$PASSWORD"; also ensure the snippet is in a proper
fenced code block with the language tag (bash) if applicable to follow the docs
guideline and avoid exposing secrets.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: aaa61dc1-6f5f-4e38-9b7f-45b9a5817c57

📥 Commits

Reviewing files that changed from the base of the PR and between 2beb062 and 81af279.

📒 Files selected for processing (6)
  • en/identity-server/6.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md
  • en/identity-server/6.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md
  • en/identity-server/7.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md
  • en/identity-server/7.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md
  • en/identity-server/7.2.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md
  • en/identity-server/next/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md

<div class="code panel pdl" style="border-width: 1px;">
<div class="codeContent panelContent pdl">
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?$filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Replace example basic-auth credentials with placeholders.

--user admin:admin should be changed to a non-sensitive placeholder value in documentation.

As per coding guidelines: "Use fenced code blocks with a language tag when known; keep code blocks focused and do not include secrets, tokens, passwords, or realistic keys."

🧰 Tools
🪛 Gitleaks (8.30.0)

[high] 231-231: Discovered a potential basic authorization token provided in a curl command, which could compromise the curl accessed resource.

(curl-auth-user)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/identity-server/6.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`
at line 231, The curl example in the docs uses real-looking credentials ("--user
admin:admin"); replace them with a non-sensitive placeholder (e.g., "--user
<username>:<password>" or similar) in the example line containing the GET
request (the curl invocation showing /api/identity/config-mgt/v1.0/search) so no
secrets appear in the documentation and it conforms to the fenced-code-block
placeholder guideline.

<div class="code panel pdl" style="border-width: 1px;">
<div class="codeContent panelContent pdl">
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?$filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Please sanitize curl credentials in docs.

Use placeholders instead of admin:admin to avoid publishing credential-like values.

As per coding guidelines: "Use fenced code blocks with a language tag when known; keep code blocks focused and do not include secrets, tokens, passwords, or realistic keys."

🧰 Tools
🪛 Gitleaks (8.30.0)

[high] 231-231: Discovered a potential basic authorization token provided in a curl command, which could compromise the curl accessed resource.

(curl-auth-user)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/identity-server/6.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`
at line 231, The curl example currently contains real-looking credentials
"admin:admin" in the command shown (the curl line with --user admin:admin);
update that example to use a neutral placeholder such as --user
<USERNAME>:<PASSWORD> or --user {USERNAME}:{PASSWORD} and ensure the snippet is
in a fenced code block with the appropriate language tag (e.g., bash) instead of
embedding credentials directly so no secret-like values appear in the docs.

Comment on lines +230 to 231
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
</div>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Replace hardcoded basic-auth credentials in curl example.

The sample command includes --user admin:admin, which is a realistic password pattern and should be replaced with placeholders.

🔧 Suggested documentation-safe update
-curl -k -v --user admin:admin GET 'https://localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29'
+curl -k -v --user <username>:<password> GET 'https://localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29'

As per coding guidelines: "Use fenced code blocks with a language tag when known; keep code blocks focused and do not include secrets, tokens, passwords, or realistic keys."

🧰 Tools
🪛 Gitleaks (8.30.0)

[high] 230-230: Discovered a potential basic authorization token provided in a curl command, which could compromise the curl accessed resource.

(curl-auth-user)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/identity-server/7.0.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`
around lines 230 - 231, The curl example contains hardcoded credentials (--user
admin:admin); replace that with placeholders (e.g., --user
<USERNAME>:<PASSWORD>) or remove the --user flag and document using an auth
placeholder, and wrap the command in a fenced code block tagged with bash;
update the line containing the curl command string (the GET
'https://localhost:9443/api/identity/config-mgt/v1.0/search?...' example) to use
the placeholder credentials and proper fenced block formatting.

<div class="code panel pdl" style="border-width: 1px;">
<div class="codeContent panelContent pdl">
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?$filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Use placeholders instead of admin:admin in curl examples.

This still looks like hardcoded credentials and should be generalized to <username>:<password>.

As per coding guidelines: "Use fenced code blocks with a language tag when known; keep code blocks focused and do not include secrets, tokens, passwords, or realistic keys."

🧰 Tools
🪛 Gitleaks (8.30.0)

[high] 231-231: Discovered a potential basic authorization token provided in a curl command, which could compromise the curl accessed resource.

(curl-auth-user)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/identity-server/7.1.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`
at line 231, Replace the hardcoded credentials in the curl example (the curl -k
-v --user admin:admin GET
'https://localhost:9443/api/identity/config-mgt/v1.0/search?...' line) with a
placeholder like <username>:<password> and ensure the example is presented as a
fenced code block (bash) without real secrets; update the --user argument only
and keep the rest of the curl invocation unchanged.

<div class="code panel pdl" style="border-width: 1px;">
<div class="codeContent panelContent pdl">
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?$filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Avoid hardcoded credentials in published curl snippets.

Please replace --user admin:admin with placeholders to prevent credential-like data in docs.

As per coding guidelines: "Use fenced code blocks with a language tag when known; keep code blocks focused and do not include secrets, tokens, passwords, or realistic keys."

🧰 Tools
🪛 Gitleaks (8.30.0)

[high] 231-231: Discovered a potential basic authorization token provided in a curl command, which could compromise the curl accessed resource.

(curl-auth-user)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/identity-server/7.2.0/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`
at line 231, The curl example currently includes hardcoded credentials (`--user
admin:admin`) — update the curl snippet in the retrieve-tenant-resources example
to remove real credentials and use clear placeholders instead (e.g., `--user
<USERNAME>:<PASSWORD>` or `-u {username}:{password}`) so the command in the
source containing the curl invocation uses placeholders rather than
`admin:admin`; ensure the change is made in the curl line shown in the doc (the
curl -k -v ... GET 'https://localhost:9443/...search?...' snippet).

<div class="code panel pdl" style="border-width: 1px;">
<div class="codeContent panelContent pdl">
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?$filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
<div class="sourceCode" id="cb4" data-syntaxhighlighter-params="brush: java; gutter: false; theme: Confluence" data-theme="Confluence" style="brush: java; gutter: false; theme: Confluence"><pre class="sourceCode java"><code class="sourceCode java"><a class="sourceLine" id="cb4-1" title="1">curl -k -v --user admin:admin GET &#39;https:<span class="co">//localhost:9443/api/identity/config-mgt/v1.0/search?filter=%28tenantDomain%20eq%20%27carbon.super%27%29&#39;</span></a></code></pre></div>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Update curl auth sample to placeholder credentials.

Avoid hardcoded admin:admin; use placeholder values in docs examples.

As per coding guidelines: "Use fenced code blocks with a language tag when known; keep code blocks focused and do not include secrets, tokens, passwords, or realistic keys."

🧰 Tools
🪛 Gitleaks (8.30.0)

[high] 231-231: Discovered a potential basic authorization token provided in a curl command, which could compromise the curl accessed resource.

(curl-auth-user)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/identity-server/next/docs/apis/retrieve-tenant-resources-based-on-search-parameters.md`
at line 231, Replace the hardcoded credentials in the curl example (the line
containing "curl -k -v --user admin:admin GET
'https://localhost:9443/api/identity/config-mgt/v1.0/search?...'") with
placeholder credentials such as "<username>:<password>" or environment-style
placeholders like "$USERNAME:$PASSWORD"; also ensure the snippet is in a proper
fenced code block with the language tag (bash) if applicable to follow the docs
guideline and avoid exposing secrets.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Unnecessary $ sign in the example URLs

2 participants