-
Klaus Aehlig authored
It can be controlled by the same set of tags that can be used to control harep. Moreover, describe the information it exposes via HTTP. Signed-off-by: Klaus Aehlig <aehlig@google.com> Reviewed-by: Petr Pudlak <pudlak@google.com>
fed8ce90