From 208eae61303ed9ee9211e5fc4905d789138a6bbb Mon Sep 17 00:00:00 2001 From: Anton Patsev Date: Sat, 24 Feb 2024 14:19:23 +0600 Subject: [PATCH] Add missing commas --- CODE_OF_CONDUCT.md | 2 +- engine_docs/README.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md index 8b818055..d3b6c48c 100644 --- a/CODE_OF_CONDUCT.md +++ b/CODE_OF_CONDUCT.md @@ -106,7 +106,7 @@ Violating these terms may lead to a permanent ban. ### 4. Permanent Ban **Community Impact**: Demonstrating a pattern of violation of community -standards, including sustained inappropriate behavior, harassment of an +standards, including sustained inappropriate behavior, harassment of an individual, or aggression toward or disparagement of classes of individuals. **Consequence**: A permanent ban from any sort of public interaction within diff --git a/engine_docs/README.md b/engine_docs/README.md index e797d9d1..dd04486d 100644 --- a/engine_docs/README.md +++ b/engine_docs/README.md @@ -91,7 +91,7 @@ pkg install ddosify ### Windows exe from the [releases page](https://github.com/ddosify/ddosify/releases/latest) -- Download *.zip file for your architecture. For example download ddosify version vx.x.x with amd64 architecture: ddosify_x.x.x.zip_windows_amd64 +- Download *.zip file for your architecture. For example, download ddosify version vx.x.x with amd64 architecture: ddosify_x.x.x.zip_windows_amd64 - Unzip `ddosify_x.x.x_windows_amd64.zip` - Open Powershell or CMD (Command Prompt) and change directory to unzipped folder: `ddosify_x.x.x_windows_amd64` - Run ddosify: @@ -144,7 +144,7 @@ This section aims to show you how to use Ddosify without deep dive into its deta 4. ### Scenario based load test ddosify -config config_examples/config.json - Ddosify first sends *HTTP/2 POST* request to *https://test_site1.com/endpoint_1* using basic auth credentials *test_user:12345* over proxy *http://proxy_host.com:proxy_port* and with a timeout of *3* seconds. Once the response is received, HTTPS GET request will be sent to *https://test_site1.com/endpoint_2* along with the payload included in *config_examples/payload.txt* file with a timeout of 2 seconds. This flow will be repeated *20* times in *5* seconds and response will be written to *stdout*. + Ddosify first sends *HTTP/2 POST* request to *https://test_site1.com/endpoint_1* using basic auth credentials *test_user:12345* over proxy *http://proxy_host.com:proxy_port* and with a timeout of *3* seconds. Once the response is received, HTTPS GET request will be sent to *https://test_site1.com/endpoint_2* along with the payload included in *config_examples/payload.txt* file with a timeout of 2 seconds. This flow will be repeated *20* times in *5* seconds and response will be written to *stdout*. 5. ### Load test with Dynamic Variables (Parameterization)