Allowing developers access to Kubernetes clusters requires either developer cloud accounts or third-party authentication tools. This increases the complexity of cloud identity and access management. Now, you can grant developers access to Kubernetes clusters using only their GitLab identities and the agent for Kubernetes. Use traditional Kubernetes RBAC to manage authorizations within your cluster.
Together with the OIDC cloud authentication offering in GitLab pipelines, these features allow GitLab users to access cloud resources without dedicated cloud accounts without jeopardizing security and compliance.
In this first iteration of cluster access, you must manage your Kubernetes configuration manually. Epic 11455 proposes to simplify setup by extending the GitLab CLI with related commands.
Access clusters locally using your GitLab user identity:
Environment Management
, User Profile
If you need to trigger a downstream pipeline from a CI/CD pipeline job, you can use the Previously, when you ran separate pipelines for CI and CD and used the Support for
environment
keyword in downstream pipelines: Environment Management
, Deployment Management
trigger
keyword. To enhance your deployment management, you can now specify an environment with the environment
keyword when you use trigger
. For example, you might trigger a downstream pipeline for the main
branch on your /web-app
project with environment name dev
and a specified environment URL.
trigger
keyword to start the CD pipeline, specifying environment details was not possible. This made it hard to track deployments from your CI project. Adding support for environments simplifies deployment tracking across projects.
Omnibus improvements (self-managed only):
Omnibus Package
To provide as many opportunities for automation and integration with third-party systems as possible, we have added support for creating webhooks that trigger when a user adds or revokes an emoji reaction.
You could use the new webhook, for example, to send an email when users react to issues or merge requests with emoji.
Add webhooks for added or revoked emoji reactions:
Webhooks
GitLab can send messages to Slack workspace channels for certain GitLab events. With this release, you can now trigger Slack notifications for group mentions in public and private contexts in:
Trigger Slack notifications for group mentions:
Integrations
We recently turned a few hardcoded import limits into configurable application settings to allow self-managed In this release, we've added the timeout for decompressing archived files as a configurable application setting.
This limit was hardcoded at 210 seconds. On GitLab.com, and for self-managed installations by default, we've set this limit to 210 seconds. Both self-managed GitLab andExpand configurable import limits available in application settings (self-managed only):
Importers
GitLab administrators to adjust these limits according to their needs.
GitLab.com administrators can adjust this limit as needed.
Verify
In GitLab 15.9 we announced the deprecation of older versions of JSON web tokens in favor of Use Set
id_token
globally and eliminate configuration for individual jobs: Secrets Management
id_token
. Unfortunately, jobs had to be modified individually to accommodate this change. To enable a smooth transition to id_token
, beginning from GitLab 16.4, you can set id_tokens
as a global default value in .gitlab-ci.yml
. This feature automatically sets the id_token
configuration for every job. Jobs that use OpenID Connect (OIDC) authentication no longer require you to set up a separate id_token
.
id_token
and OIDC to authenticate with third party services. The required aud
sub-keyword is used to configure the aud
claim for the JWT.
Users with the Maintainer role for a group can now view details for group runners. Users with this role can view group runners to quickly determine which runners are available, or validate that automatically created runners were registered successfully to the group namespace.
Users with the Maintainer role can view runner details:
Runner Fleet
We're also releasing GitLab Runner 16.4 today! GitLab Runner is the lightweight, highly-scalable agent that runs your CI/CD jobs and sends the results back to a GitLab instance. GitLab Runner works in conjunction with GitLab CI/CD, the open-source continuous integration service included with GitLab.
The list of all changes is in the GitLab Runner CHANGELOG.
GitLab Runner 16.4:
GitLab Runner Core
What's new:
Bug Fixes:
gitlab-runner-helper
terminated during cache downloading
Secure
GitLab SAST includes many security analyzers that the GitLab Static Analysis team actively maintains, updates, and supports. We published the following updates during the 16.4 release milestone:
If you include the GitLab-managed SAST template ( For previous changes, see last month's updates.
SAST analyzer updates:
SAST
Security.Misc.IncludeMismatch
rule. See the CHANGELOG for further details.
SAST.gitlab-ci.yml
) and run GitLab 16.0 or higher, you automatically receive these updates.
To remain on a specific version of any analyzer and prevent automatic updates, you can pin its version.
Monitor
Service Desk is one of the most meaningful connections between your business and your customers. Now you can use your own custom email address to send and receive emails for Service Desk. This feature is in Beta. We encourage users to try Beta features andCustom email address for Service Desk:
Service Desk
With this change, it is much easier to maintain brand identity and instill customer confidence that they are communicating with the correct entity.
provide feedback in the feedback issue.
Govern
Group and project access tokens are frequently used for automation. It is important that administrators and group Owners are notified when one of these tokens is close to expiry, so interruptions are avoided. Administrators and group Owners now receive a notification email when a token is seven days or less away from expiry.
Notifications for expiring access tokens:
System Access
A user will get an email notification seven days before their group or project access expires. This only applies if there is an access expiration date set. Previously, there were no notifications when access expired. Advance notice means you can contact your GitLab administrator to ensure continuous access.
Email notification when access expires:
System Access