@@ -169,8 +169,8 @@ public Builder modSecurityRuleIds(java.util.List<String> modSecurityRuleIds) {
169169 * part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
170170 * {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
171171 *
172- * <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
173- * to match the }Cookie header value during the second input analysis phase.
172+ * <p><p><p><p> The example contains two }SecRules{@code each having distinct regex
173+ * expression to match the }Cookie header value during the second input analysis phase.
174174 *
175175 * <p>For more information about custom protection rules, see [Custom Protection
176176 * Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -209,8 +209,8 @@ public Builder modSecurityRuleIds(java.util.List<String> modSecurityRuleIds) {
209209 * part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id:
210210 * {{id_2}}, \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
211211 *
212- * <p><p><p>The example contains two }SecRules{@code each having distinct regex expression
213- * to match the }Cookie header value during the second input analysis phase.
212+ * <p><p><p><p> The example contains two }SecRules{@code each having distinct regex
213+ * expression to match the }Cookie header value during the second input analysis phase.
214214 *
215215 * <p>For more information about custom protection rules, see [Custom Protection
216216 * Rules](https://docs.cloud.oracle.com/Content/WAF/Tasks/customprotectionrules.htm).
@@ -480,7 +480,7 @@ public java.util.List<String> getModSecurityRuleIds() {
480480 * part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
481481 * \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
482482 *
483- * <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
483+ * <p><p><p><p> The example contains two }SecRules{@code each having distinct regex expression to
484484 * match the }Cookie header value during the second input analysis phase.
485485 *
486486 * <p>For more information about custom protection rules, see [Custom Protection
@@ -519,7 +519,7 @@ public java.util.List<String> getModSecurityRuleIds() {
519519 * part 2/2" \\ "phase:2, \\ msg:'Detects chained SQL injection attempts 2/2.', \\ id: {{id_2}},
520520 * \\ ctl:ruleEngine={{mode}}, \\ deny" }{@code <p>
521521 *
522- * <p><p><p>The example contains two }SecRules{@code each having distinct regex expression to
522+ * <p><p><p><p> The example contains two }SecRules{@code each having distinct regex expression to
523523 * match the }Cookie header value during the second input analysis phase.
524524 *
525525 * <p>For more information about custom protection rules, see [Custom Protection
0 commit comments