=s_('AccessTokens|Your feed token is used to authenticate you when your RSS reader loads a personalized RSS feed or when your calendar application loads a personalized calendar, and is included in those feed URLs.')
%p
=s_('AccessTokens|It cannot be used to access any other data.')
-reset_link=link_tos_('AccessTokens|reset it'),[:reset,:feed_token,:profile],method: :put,data: {confirm: s_('AccessTokens|Are you sure? Any RSS or calendar URLs currently in use will stop working.')}
-reset_message=s_('AccessTokens|Keep this token secret. Anyone who gets ahold of it can read activity and issue RSS feeds or your calendar feed as if they were you. You should %{link_reset_it} if that ever happens.')%{link_reset_it: reset_link}
=reset_message.html_safe
-unlessGitlab::CurrentSettings.disable_feed_token
%hr
.row.gl-mt-3
.col-lg-4.profile-settings-sidebar
%h4.gl-mt-0
=s_('AccessTokens|Feed token')
%p
=s_('AccessTokens|Your feed token is used to authenticate you when your RSS reader loads a personalized RSS feed or when your calendar application loads a personalized calendar, and is included in those feed URLs.')
%p
=s_('AccessTokens|It cannot be used to access any other data.')
-reset_link=link_tos_('AccessTokens|reset it'),[:reset,:feed_token,:profile],method: :put,data: {confirm: s_('AccessTokens|Are you sure? Any RSS or calendar URLs currently in use will stop working.')}
-reset_message=s_('AccessTokens|Keep this token secret. Anyone who gets ahold of it can read activity and issue RSS feeds or your calendar feed as if they were you. You should %{link_reset_it} if that ever happens.')%{link_reset_it: reset_link}
@@ -233,6 +233,7 @@ listed in the descriptions of the relevant settings.
| `default_snippet_visibility` | string | no | What visibility level new snippets receive. Can take `private`, `internal` and `public` as a parameter. Default is `private`. |
| `deletion_adjourned_period` | integer | no | **(PREMIUM ONLY)** The number of days to wait before deleting a project or group that is marked for deletion. Value must be between 0 and 90.
| `diff_max_patch_bytes` | integer | no | Maximum diff patch size (Bytes). |
| `disable_feed_token` | boolean | no | Disable display of RSS/Atom and calendar feed tokens ([introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/231493) in GitLab 13.7) |
| `disabled_oauth_sign_in_sources` | array of strings | no | Disabled OAuth sign-in sources. |
| `dns_rebinding_protection_enabled` | boolean | no | Enforce DNS rebinding attack protection. |
| `domain_denylist_enabled` | boolean | no | (**If enabled, requires:**`domain_denylist`) Allows blocking sign-ups from emails from specific domains. |
optional:default_project_visibility,type: String,values: Gitlab::VisibilityLevel.string_values,desc: 'The default project visibility'
optional:default_projects_limit,type: Integer,desc: 'The maximum number of personal projects'
optional:default_snippet_visibility,type: String,values: Gitlab::VisibilityLevel.string_values,desc: 'The default snippet visibility'
optional:disable_feed_token,type: Boolean,desc: 'Disable display of RSS/Atom and Calendar `feed_tokens`'
optional:disabled_oauth_sign_in_sources,type: Array[String],coerce_with: Validations::Types::CommaSeparatedToArray.coerce,desc: 'Disable certain OAuth sign-in sources'
optional:domain_denylist_enabled,type: Boolean,desc: 'Enable domain denylist for sign ups'
optional:domain_denylist,type: Array[String],coerce_with: Validations::Types::CommaSeparatedToArray.coerce,desc: 'Users with e-mail addresses that match these domain(s) will NOT be able to sign-up. Wildcards allowed. Use separate lines for multiple entries. Ex: domain.com, *.domain.com'