Because of a bug, FIPS Linux packages for GitLab 17.6 and earlier did not use the system Libgcrypt, but the same Libgcrypt bundled with regular Linux packages.
This issue is fixed for all FIPS Linux packages for GitLab 17.7, except for AmazonLinux 2. The Libgcrypt version of AmazonLinux 2 is not compatible with the GPGME and GnuPG versions shipped with the FIPS Linux packages.
FIPS Linux packages for AmazonLinux 2 will continue to use the same Libgcrypt bundled with the regular Linux packages, otherwise we would have to downgrade GPGME and GnuPG.
Omnibus improvements (self-managed only):
Omnibus Package
Previously, when using the For now, you can change to the new implementation by enabling the Multiple breaking changes are intended to differentiate the behavior of the To prevent future compatibility issues, you should review your use of these keywords.Setting
environment.action: access
and prepare
resets the auto_stop_in
timer: Deployment Management
action: prepare
, action: verify
, and action: access
jobs together with the auto_stop_in
setting, the timer was not reset. Starting in 18.0, action: prepare
and action: access
will reset the timer, while action: verify
leaves it untouched.
prevent_blocking_non_deployment_jobs
feature flag.
environment.action: prepare | verify | access
values. The environment.action: access
keyword will remain the closest to its current behavior, except for the timer reset.
Learn more about these proposed changes in the following issues:
This release adds full support for Kubernetes version 1.31, released in August 2024. If you deploy your apps to Kubernetes, you can now upgrade your connected clusters to the most recent version and take advantage of all its features.
For more information, see our Kubernetes support policy and other supported Kubernetes versions.
Kubernetes 1.31 support:
Deployment Management
To use the dashboard for Kubernetes, you need to select an agent for Kubernetes connection from the environment settings, and optionally configure a namespace and a Flux resource to track the reconciliation status. In GitLab 17.6, we added support for selecting an agent with a CI/CD configuration. However, configuring the namespace and the Flux resource still required you to use the UI or make an API call. In 17.7, you can fully configure the dashboard using the CI/CD syntax with the Set namespace and Flux resource path from CI/CD job:
Environment Management
, Deployment Management
environment.kubernetes.namespace
and environment.kubernetes.flux_resource_path
attributes.
This experimental feature is another step in helping users prioritize vulnerabilities identified during Dependency Scanning or Container Scanning. Users may include this CI/CD component in their The component queries the GitLab GraphQL API to retrieve vulnerability data and prioritizes as follows:
Only detected and confirmed vulnerabilities are shown. Currently, the component relies on EPSS and KEV data to help prioritize vulnerabilities. EPSS and KEV data are only found on CVEs, which are collected through dependency and container scanning. To learn more, please refer to the Vulnerability Prioritizer.
As always, we welcome your feedback. Please add any questions or comments to the feedback issue.
SCA Vulnerability Prioritizer
.gitlab-ci.yml
file, which will generate a prioritization report for vulnerabilities found in the project. The report will print to the pipeline output.
The new method of user contribution and membership mapping is now available when you migrate between GitLab instances by direct transfer. This feature offers flexibility and control for both users managing the import process and users receiving contribution reassignments. With the new method, you can:
When you reassign a contribution to a user on the destination instance, the user can accept or reject the reassignment.
For more information, see streamline migrations with user contribution and membership mapping. To leave feedback, add a comment to issue 502565.
New user contribution and membership mapping available in direct transfer:
Importers
Plan
In previous versions of GitLab, emoji support was limited to an older Unicode standard, which meant some newer emojis were unavailable.
GitLab 17.7 introduces support for Unicode 15.1, bringing the latest emoji additions. This includes exciting new options like the t-rex 🦖, lime 🍋🟩, and phoenix 🐦🔥, allowing you to express yourself with the most up-to-date symbols.
Additionally, this update enhances emoji diversity, ensuring greater representation across cultures, languages,Unicode 15.1 emoji support 🦖🍋🟩🐦🔥:
Markdown
and identities, helping everyone feel included when communicating on the platform.
In this version, we're introducing the ability to set a default text editor for a more personalized editing experience. With this change, you can now choose between the rich text editor, the plain text editor, or opt for no default, allowing flexibility in how you create and edit content.
This update ensures smoother workflows by aligning the editor interface with individual preferences or team standards. With this enhancement, GitLab continues to prioritize customization and usability for all users.
Set your preferred text editor as default:
Text Editors
We've introduced the new Planner role to give you tailored access to Agile planning tools like epics, roadmaps, and Kanban boards without over-provisioning permissions. This change helps you collaborate more effectively while keeping your workflows secure and aligned with the principle of least privilege.
New Planner user role:
Portfolio Management
Software supply chain security
Previously, token expiration email notifications were only sent seven days before expiry. Now, these notifications are also sent 30 and 60 days before expiry. The increased frequency and date range of notifications makes users more aware of tokens that may be expiring soon.
Extended token expiration notifications:
System Access
When creating a personal, project, group, or impersonation access token, you can now optionally enter a description of that token. This helps provide extra context about the token, such as where and how is it used.
New description field for access tokens:
System Access
You can now use the UI to rotate personal, project, and group access tokens. Previously, you had to use the API to do this.
Thank you shangsuru for your contribution!
Rotate personal, project, and group access tokens in the UI:
System Access