Skip to content

Commit 56d6e07

Browse files
author
DEXREQ Automation
committed
1 parent c952ee5 commit 56d6e07

File tree

3 files changed

+24
-24
lines changed

3 files changed

+24
-24
lines changed

bmc-waas/src/main/java/com/oracle/bmc/waas/model/CreateCustomProtectionRuleDetails.java

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -125,8 +125,8 @@ public Builder description(String description) {
125125
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
126126
* {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
127127
*
128-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to
129-
* match the }Cookie header value during the second input analysis phase.
128+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
129+
* to match the }Cookie header value during the second input analysis phase.
130130
*
131131
* <p>For more information about custom protection rules, see [Custom Protection
132132
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -165,8 +165,8 @@ public Builder description(String description) {
165165
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
166166
* {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
167167
*
168-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to
169-
* match the }Cookie header value during the second input analysis phase.
168+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
169+
* to match the }Cookie header value during the second input analysis phase.
170170
*
171171
* <p>For more information about custom protection rules, see [Custom Protection
172172
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -356,8 +356,8 @@ public String getDescription() {
356356
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
357357
* \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
358358
*
359-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to match
360-
* the }Cookie header value during the second input analysis phase.
359+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
360+
* match the }Cookie header value during the second input analysis phase.
361361
*
362362
* <p>For more information about custom protection rules, see [Custom Protection
363363
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -395,8 +395,8 @@ public String getDescription() {
395395
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
396396
* \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
397397
*
398-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to match
399-
* the }Cookie header value during the second input analysis phase.
398+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
399+
* match the }Cookie header value during the second input analysis phase.
400400
*
401401
* <p>For more information about custom protection rules, see [Custom Protection
402402
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).

bmc-waas/src/main/java/com/oracle/bmc/waas/model/CustomProtectionRule.java

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -169,8 +169,8 @@ public Builder modSecurityRuleIds(java.util.List<String> modSecurityRuleIds) {
169169
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
170170
* {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
171171
*
172-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to
173-
* match the }Cookie header value during the second input analysis phase.
172+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
173+
* to match the }Cookie header value during the second input analysis phase.
174174
*
175175
* <p>For more information about custom protection rules, see [Custom Protection
176176
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -209,8 +209,8 @@ public Builder modSecurityRuleIds(java.util.List<String> modSecurityRuleIds) {
209209
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
210210
* {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
211211
*
212-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to
213-
* match the }Cookie header value during the second input analysis phase.
212+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
213+
* to match the }Cookie header value during the second input analysis phase.
214214
*
215215
* <p>For more information about custom protection rules, see [Custom Protection
216216
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -480,8 +480,8 @@ public java.util.List<String> getModSecurityRuleIds() {
480480
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
481481
* \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
482482
*
483-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to match
484-
* the }Cookie header value during the second input analysis phase.
483+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
484+
* match the }Cookie header value during the second input analysis phase.
485485
*
486486
* <p>For more information about custom protection rules, see [Custom Protection
487487
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -519,8 +519,8 @@ public java.util.List<String> getModSecurityRuleIds() {
519519
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
520520
* \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
521521
*
522-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to match
523-
* the }Cookie header value during the second input analysis phase.
522+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
523+
* match the }Cookie header value during the second input analysis phase.
524524
*
525525
* <p>For more information about custom protection rules, see [Custom Protection
526526
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).

bmc-waas/src/main/java/com/oracle/bmc/waas/model/UpdateCustomProtectionRuleDetails.java

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -101,8 +101,8 @@ public Builder description(String description) {
101101
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
102102
* {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
103103
*
104-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to
105-
* match the }Cookie header value during the second input analysis phase.
104+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
105+
* to match the }Cookie header value during the second input analysis phase.
106106
*
107107
* <p>For more information about custom protection rules, see [Custom Protection
108108
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -141,8 +141,8 @@ public Builder description(String description) {
141141
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
142142
* {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
143143
*
144-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to
145-
* match the }Cookie header value during the second input analysis phase.
144+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
145+
* to match the }Cookie header value during the second input analysis phase.
146146
*
147147
* <p>For more information about custom protection rules, see [Custom Protection
148148
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -311,8 +311,8 @@ public String getDescription() {
311311
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
312312
* \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
313313
*
314-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to match
315-
* the }Cookie header value during the second input analysis phase.
314+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
315+
* match the }Cookie header value during the second input analysis phase.
316316
*
317317
* <p>For more information about custom protection rules, see [Custom Protection
318318
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -350,8 +350,8 @@ public String getDescription() {
350350
* part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
351351
* \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
352352
*
353-
* <p><p>The example contains two }SecRules{@code each having distinct regex expression to match
354-
* the }Cookie header value during the second input analysis phase.
353+
* <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
354+
* match the }Cookie header value during the second input analysis phase.
355355
*
356356
* <p>For more information about custom protection rules, see [Custom Protection
357357
* Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).

0 commit comments

Comments
 (0)