Previously, when you imported groups or projects, you could not see when placeholder users were created.Timestamps of when placeholder users were created:
Importers
With this release, we've added timestamps so you can track the progress of your migration and troubleshoot any issues as they occur.
You can now efficiently manage your To-Do List with our improved bulk editing feature. Select multiple to-do items and mark them as done or snooze them in one go, giving you more control over your tasks and helping you stay organized with less effort.
Bulk edit to-do items:
Notifications
You can now snooze notifications in your To-Do List, allowing you to temporarily hide items and focus on what's most important right now. Whether you need an hour to concentrate or want to revisit a task tomorrow, you'll have fine-grained control over when notifications reappear, helping you manage your workflow more effectively.
Snooze to-do items:
Notifications
With this release, user contribution mapping now supports bulk reassignment by using a CSV file. This method eliminates tedious manual reassignment through the UI.Request reassignment by using a CSV file:
Importers
If you have a large user base with many placeholder users, group members with the Owner role can:
To further streamline large-scale migrations, API support for CSV-based reassignment is now also available.
We're excited to announce significant improvements to the project overview in Your Work, designed to streamline how you discover and access your projects. This update introduces a more intuitive tab-based navigation system that better reflects how users interact with their projects.
Further, if you have the appropriate permissions, you can now edit or delete a project directly from the Your Work projects overview. We value your feedback on this update! Join the discussion in epic 16662 to share your experience with the new navigation system.
New navigation experience for projects in Your Work:
Groups & Projects
These changes reflect our commitment to creating a more efficient and user-friendly GitLab experience. The new layout helps you focus on the projects that matter most to your work, reducing the time spent navigating between different project categories.
We've improved the project creation permission settings to make them more clear, intuitive, and aligned with our security principles. The improved settings include:
These changes make it easier to understand and configure which roles can create projects within your groups, helping administrators enforce appropriate access controls more confidently.
Thank you @yasuk for this community contribution!
Improved project creation permission settings:
Groups & Projects
Plan
You can now authenticate to private GitLab Pages sites programmatically using access tokens, making it easier to automate interactions with your Pages content. Previously, accessing restricted Pages sites required interactive authentication through the GitLab UI.
This powerful enhancement increases productivity while maintaining security, giving developers more flexibility in how they interact with and distribute private Pages content.
Authenticate to private Pages with an access token:
Pages
Tracking and understanding work in progress across GitLab previously required navigating multiple locations, reducing team efficiency and consuming valuable time.
This release introduces GitLab Query Language (GLQL) views Beta so you can create dynamic, real-time work tracking directly in your existing workflows.
GLQL views embed live data queries in Markdown code blocks throughout Wiki pages, epic descriptions, issue comments, and merge requests.
Previously available as an experiment, GLQL views now enter beta with support for sophisticated filtering using logical expressions and operators across key fields, including assignee, author, label, and milestone. You can customize your view's presentation as tables or lists, control which fields appear, and set result limits to create focused, actionable insights for your team.
Teams can now maintain context while accessing the information they need, creating shared understanding, and improving collaboration — all without leaving their current workflow.
We welcome your feedback on GLQL views as we continue to enhance this feature.
GitLab Query Language views Beta:
Wiki
, Team Planning
GitLab Flavored Markdown has been enhanced with several powerful improvements:
Improved math and image handling:
Enhanced editor experience:
Better content organization:
These improvements make GitLab Flavored Markdown more powerful for teams creating and maintaining documentation while offering greater flexibility in how content is presented and organized.
Enhanced markdown experience:
Markdown
+s
to URLs).
+
to URLs).
include
syntax.
Issues now share a common framework with epics and tasks, featuring real-time updates and workflow improvements:
New issues look now in beta:
Team Planning
/set_parent
, /remove_parent
, /add_child
, and /remove_child
.
You can now streamline your workflow and maintain consistency across your projects with description templates for work items (epics, tasks, objectives, and key results).
This powerful addition allows you to create standardized templates, saving you time and ensuring all crucial information is included every time you create a new work item.
Description templates for epics, issues, tasks, objectives and key results:
Portfolio Management
Create
When browsing the history of a repository, there might be commits that aren't relevant to otherwise meaningful changes in the project. This can happen during:
When you look through the history of a project with Ignore specific revisions in Git blame:
Source Code Management
blame
, these kinds of commits make it difficult to understand the changes that occurred. Git supports identifying these commits with a .git-blame-ignore-revs
file in your project. GitLab now allows you to toggle the blame view to show or hide these specific revisions in the "Blame preferences" dropdown list, making it easier to understand the history of your project.
Verify
We’re also releasing GitLab Runner 17.10 today! GitLab Runner is the highly-scalable build agent that runs your CI/CD jobs and sends the results back to a GitLab instance. GitLab Runner works in conjunction with GitLab CI/CD, the open-source continuous integration service included with GitLab.
The list of all changes is in the GitLab Runner CHANGELOG.
GitLab Runner 17.10:
GitLab Runner Core
What's new:
Bug Fixes:
gitlab-runner-helper
image fails due to invalid volume specification for the `/opt/step-runner' path
git submodule update --remote
in GitLab CI/CD returns an error
Package
The GitLab Dependency Proxy for container images now supports authentication with Docker Hub, helping you avoid pipeline failures due to rate limits and giving you access to private images.
Starting April 1, 2025, Docker Hub will enforce stricter pull limits (10 pulls per IP address) for unauthenticated users. Without authentication, your pipelines might fail once these limits are reached.
With this release, you can configure Docker Hub authentication through the GraphQL API using your Docker Hub credentials, personal access token, or organization access tokens. Support for UI configuration will be available in GitLab 17.11.
Docker Hub authentication for the dependency proxy:
Container Registry
Software supply chain security
Previously, access token expiry notification emails were only sent to direct members of the group and project in which the token was expiring. Now, these notifications are also sent to inherited group and project members, if the setting is enabled. This wider distribution makes it easier to manage the token before expiry.
Wider distribution for token expiration notifications:
System Access
GitLab administrators can now use a unified API to identify and revoke tokens. Previously, administrators had to use endpoints related to the specific type of token. This API allows revocation regardless of the type. For a list of supported token types, see the Token information API.
Thank you Nicholas Wittstruck and the team from Siemens for your contribution!
Identify and revoke tokens with token information API (self-managed only):
System Access
When using GitLab as an OpenID Connect (OIDC) provider, you can now configure the duration of ID tokens with the Thank you Henry Sachs for your contribution!
Configurable token duration with GitLab OIDC provider (self-managed only):
System Access
id_token_expiration
attribute. Previously, ID tokens had a fixed expiration time of 120 seconds.
You can now trigger webhook events 60 and 30 days before a project or group access token expires. Previously, these webhook events only triggered 7 days before expiry. This is an optional setting that matches the existing email notification schedule for expiring tokens.
Extended webhook triggers for expiring tokens:
System Access