@@ -347,6 +349,7 @@ listed in the descriptions of the relevant settings.
...
@@ -347,6 +349,7 @@ listed in the descriptions of the relevant settings.
| `mirror_max_capacity` | integer | no | **(PREMIUM)** Maximum number of mirrors that can be synchronizing at the same time. |
| `mirror_max_capacity` | integer | no | **(PREMIUM)** Maximum number of mirrors that can be synchronizing at the same time. |
| `mirror_max_delay` | integer | no | **(PREMIUM)** Maximum time (in minutes) between updates that a mirror can have when scheduled to synchronize. |
| `mirror_max_delay` | integer | no | **(PREMIUM)** Maximum time (in minutes) between updates that a mirror can have when scheduled to synchronize. |
| `npm_package_requests_forwarding` | boolean | no | **(PREMIUM)** Use npmjs.org as a default remote repository when the package is not found in the GitLab Package Registry for npm. |
| `npm_package_requests_forwarding` | boolean | no | **(PREMIUM)** Use npmjs.org as a default remote repository when the package is not found in the GitLab Package Registry for npm. |
| `pypi_package_requests_forwarding` | boolean | no | **(PREMIUM)** Use pypi.org as a default remote repository when the package is not found in the GitLab Package Registry for PyPI. |
| `outbound_local_requests_whitelist` | array of strings | no | Define a list of trusted domains or IP addresses to which local requests are allowed when local requests for hooks and services are disabled.
| `outbound_local_requests_whitelist` | array of strings | no | Define a list of trusted domains or IP addresses to which local requests are allowed when local requests for hooks and services are disabled.
| `pages_domain_verification_enabled` | boolean | no | Require users to prove ownership of custom domains. Domain verification is an essential security measure for public GitLab sites. Users are required to demonstrate they control a domain before it is enabled. |
| `pages_domain_verification_enabled` | boolean | no | Require users to prove ownership of custom domains. Domain verification is an essential security measure for public GitLab sites. Users are required to demonstrate they control a domain before it is enabled. |
| `password_authentication_enabled_for_git` | boolean | no | Enable authentication for Git over HTTP(S) via a GitLab account password. Default is `true`. |
| `password_authentication_enabled_for_git` | boolean | no | Enable authentication for Git over HTTP(S) via a GitLab account password. Default is `true`. |
Forward npm package requests to the npm Registry if the packages are not found in the GitLab Package Registry
=_('Forward %{package_type} package requests to the %{registry_type} Registry if the packages are not found in the GitLab Package Registry')%{package_type: 'npm',registry_type: 'npm'}
=_('Forward %{package_type} package requests to the %{registry_type} Registry if the packages are not found in the GitLab Package Registry')%{package_type: 'PyPI',registry_type: 'PyPI'}
optional:prevent_merge_requests_author_approval,type: Grape::API::Boolean,desc: 'Disable Merge request author ability to approve request.'
optional:prevent_merge_requests_author_approval,type: Grape::API::Boolean,desc: 'Disable Merge request author ability to approve request.'
optional:prevent_merge_requests_committers_approval,type: Grape::API::Boolean,desc: 'Disable Merge request committer ability to approve request.'
optional:prevent_merge_requests_committers_approval,type: Grape::API::Boolean,desc: 'Disable Merge request committer ability to approve request.'
optional:npm_package_requests_forwarding,type: Grape::API::Boolean,desc: 'NPM package requests are forwarded to npmjs.org if not found on GitLab.'
optional:npm_package_requests_forwarding,type: Grape::API::Boolean,desc: 'NPM package requests are forwarded to npmjs.org if not found on GitLab.'
optional:pypi_package_requests_forwarding,type: Grape::API::Boolean,desc: 'PyPI package requests are forwarded to pypi.org if not found on GitLab.'
optional:group_owners_can_manage_default_branch_protection,type: Grape::API::Boolean,desc: 'Allow owners to manage default branch protection in groups'
optional:group_owners_can_manage_default_branch_protection,type: Grape::API::Boolean,desc: 'Allow owners to manage default branch protection in groups'
optional:maintenance_mode,type: Grape::API::Boolean,desc: 'When instance is in maintenance mode, non-admin users can sign in with read-only access and make read-only API requests'
optional:maintenance_mode,type: Grape::API::Boolean,desc: 'When instance is in maintenance mode, non-admin users can sign in with read-only access and make read-only API requests'
optional:maintenance_mode_message,type: String,desc: 'Message displayed when instance is in maintenance mode'
optional:maintenance_mode_message,type: String,desc: 'Message displayed when instance is in maintenance mode'