Index: tools/metrics/histograms/histograms.xml |
diff --git a/tools/metrics/histograms/histograms.xml b/tools/metrics/histograms/histograms.xml |
index 244c41c92f71bc787d1bf97d0282fc80d3ce61c4..bed1cf4f1fae56aab00c61943bd8b63b5144d27d 100644 |
--- a/tools/metrics/histograms/histograms.xml |
+++ b/tools/metrics/histograms/histograms.xml |
@@ -18627,6 +18627,15 @@ Therefore, the affected-histogram name has to have at least one dot in it. |
</summary> |
</histogram> |
+<histogram name="Net.HttpHeaderParserEvent" enum="HttpHeaderParserEvent"> |
+ <owner>mmenke@chromium.org</owner> |
+ <summary> |
+ Records the frequency with which a number of hacky HTTP header parsing rules |
+ are invoked. This histogram should be removed after we have enough data to |
+ know if we can remove the hacks. |
+ </summary> |
+</histogram> |
+ |
<histogram name="net.HttpIdentSrcURL" units="requests"> |
<owner>tsepez@chromium.org</owner> |
<summary> |
@@ -52496,6 +52505,14 @@ Therefore, the affected-histogram name has to have at least one dot in it. |
<int value="15" label="Negotiate Secure Server"/> |
</enum> |
+<enum name="HttpHeaderParserEvent" type="int"> |
+ <int value="0" label="PARSER_INVOKED"/> |
+ <int value="1" label="HTTP_09_RESPONSE"/> |
+ <int value="2" label="ALLOWED_TRUNCATED_HEADERS"/> |
+ <int value="3" label="SKIPPED_WS_PREFIX"/> |
+ <int value="4" label="SKIPPED_NON_WS_PREFIX"/> |
+</enum> |
+ |
<enum name="HttpPipelineStatus" type="int"> |
<int value="0" label="Success"/> |
<int value="1" label="Redirected"/> |