From 9ea38c3185479d168aea47f3e0dfc308815fb254 Mon Sep 17 00:00:00 2001 From: jvoisin Date: Thu, 21 Dec 2017 18:21:36 +0100 Subject: Fix a typo in the documentation --- doc/source/config.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'doc/source') diff --git a/doc/source/config.rst b/doc/source/config.rst index 5e323db..e42cb99 100644 --- a/doc/source/config.rst +++ b/doc/source/config.rst @@ -27,7 +27,7 @@ Some rules apply in a specific ``function`` (context) on a specific ``variable`` evaluate your threat model and write your configuration file accordingly. Most of the features can be used in ``simulation`` mode by appending the -``.simulation()`` option to them (eg. ``sp.readonly_exec.simulation()enable();``) to see +``.simulation()`` option to them (eg. ``sp.readonly_exec.simulation().enable();``) to see whether or not they could break your website. The simulation mode won't block the request, but will write a warning in the log. -- cgit v1.3