Scale and Deployments
Project events for group webhooks
In this release, we’ve added project events to group webhooks. Project events are triggered when:
- A project is created in a group.
- A project is deleted in a group.
These events are triggered for group webhooks only.
Available in: Premium, Ultimate
Offerings: GitLab.com
Filter GitLab Duo users by assigned seat
In previous versions of GitLab, the user list displayed on the GitLab Duo seat assignment page could not be filtered, making it difficult to see which users had previously been assigned a GitLab Duo seat. Now, you can filter your user list by Assigned seat = Yes or Assigned seat = No to see to see which users are currently assigned or not assigned a GitLab Duo seat, allowing for ease in adjusting seat allocations.
Available in: Premium, Ultimate
Offerings: GitLab.com
Add-ons: GitLab Duo Pro, GitLab Duo Enterprise
GitLab Duo seat assignment email update
All users on self-managed instances will receive an email when they are assigned a GitLab Duo seat.
Previously, those assigned a Duo Enterprise seat or those granted access by bulk assignment would not be notified. You wouldn’t know you were assigned a seat unless someone told you, or you noticed new functionality in the GitLab UI.
To disable this email, an administrator can disable the duo_seat_assignment_email_for_sm feature flag.
Available in: Premium, Ultimate
Add-ons: Duo Pro, Duo Enterprise
Unified DevOps and Security
Efficient risk prioritization with EPSS
In GitLab 17.6, we added support for the Exploit Prediction Scoring System (EPSS). EPSS gives each CVE a score between 0 and 1 indicating the probability of the CVE being exploited in the next 30 days. You can leverage EPSS to better prioritize scan results and to help evaluate the potential impact a vulnerability may have on your environment.
This data is available to composition analysis users through GraphQL.
Available in: Ultimate
Offerings: GitLab.com
Enable Secret Push Protection in your projects via API
It’s now easier to programatically enable secret push protection. We’ve updated the application settings REST API, allowing you to:
- Enable the feature in your self-managed instance so that it can be enabled on a per-project basis.
- Check whether the feature has been enabled on a project.
- Enable the feature for a specified project.
Available in: Ultimate
Offerings: GitLab.com
Secret Push Protection audit events for applied exclusions
Audit events are now logged when a secret push protection exclusion is applied. This enables security teams to audit and track any occurence when a secret on the project’s exclusions list is allowed to be pushed.
Available in: Ultimate
Offerings: GitLab.com
Automated Repository X-Ray
Repository X-Ray enriches code generation requests for GitLab Duo Code Suggestions by providing additional context about a project’s dependencies to improve the accuracy and relevance of code recommendations. This improves the quality of code generation. Previously, Repository X-Ray used a CI job that you had to configure and manage.
Now, when a new commit is pushed to your project’s default branch, Repository X-Ray automatically triggers a background job that scans and parses the applicable configuration files in your repository.
Available in: Premium, Ultimate
Offerings: GitLab.com
Add-ons: Duo Pro, Duo Enterprise
Corporate network support for GitLab Duo
The latest update to the GitLab Duo plugin introduces advanced proxy authentication. This enables developers to connect seamlessly in environments with strict corporate firewalls. Building on our existing HTTP proxy support, this enhancement allows for authenticated connections. It ensures secure and uninterrupted access to Duo features in VS Code and JetBrains IDEs.
This update is crucial for developers needing secure, authenticated connections in restricted network environments. It ensures all Duo features remain available without compromising security.
Available in: Premium, Ultimate
Offerings: GitLab.com
Merge at a scheduled date and time
Some merge requests may need to be held for merging until after a certain date or time. When that date and time does pass you need to find someone with permissions to merge and hope they’re available to take care of it for you. If this is after hours or the timeline is critical you may need to prepare folks well in advance for the task.
Now, when you create or edit a merge request you can specify a merge after date. This date will be used to prevent the merge request from being merged until it has passed. Using this new capability with our previously released improvements to auto-merge gives you the flexibility to schedule merge requests to merge in the future.
A big thank you to Niklas van Schrick for the amazing contribution!
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Add support for values to the `glab agent bootstrap` command
In the last release, we introduced support for easy agent bootstrapping to the GitLab CLI tool. GitLab 17.6 further improves the glab cluster agent bootstrap command with support for custom Helm values. You can use the --helm-release-values and --helm-release-values-from flags to customize the generated HelmRelease resource.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Select a GitLab agent for an environment in a CI/CD job
To use the dashboard for Kubernetes, you need to select an agent for Kubernetes connection from the environment settings. Until now, you could select the agent only from the UI or (from GitLab 17.5) the API, which made configuring a dashboard from CI/CD difficult. In GitLab 17.6, you can configure an agent connection with the
environment.kubernetes.agent syntax.
In addition,
issue 500164 proposes to add support for selecting a namespace and Flux resource from your CI/CD configuration.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Audit events for privileged actions
There are now additional audit events for privileged settings-related administrator actions. A record of when these settings were changed can help improve security by providing an audit trail.
Available in: Free, Premium, Ultimate
New audit event when merge requests are merged
With this release, when a merge request is merged, a new audit event type called merge_request_merged is triggered that contains key information about
the merge request, including:
- The title of the merge request
- The description or summary of the merge request
- How many approvals were required for merge
- How many approvals were granted for merge
- Which users approved the merge request
- Whether committers approve the merge request
- Whether authors approved the merge request
- The date/time of the merge
- The list of SHAs from Commit history
Available in: Ultimate
Offerings: GitLab.com
Disable OTP authenticator and WebAuthn devices independently
It is now possible to disable the OTP authenticator and WebAuthn devices individually or simultaneously. Previously, if you disabled the OTP authenticator, the WebAuthn device(s) were also disabled. Because the two now operate independently, there is more granular control over these authentication methods.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Administrators can use the new token information API to get information about personal access tokens, deploy tokens, and feed tokens. Unlike other API endpoints that expose token information, this endpoint allows administrators to retrieve token information without knowing the type of the token.
Thank you Nicholas Wittstruck and the rest of the crew from Siemens for your contribution!
Available in: Free, Premium, Ultimate
GitLab optionally sends an email when a sign-in from a new location is detected. Previously, this email only contained the IP address, which is difficult to correlate to a location. This email now contains city and country location information as well.
Thank you Henry Helm for your contribution!
Available in: Free, Premium, Ultimate
Prevent modification of group protected branches
When a merge request approval policy is configured to prevent group branch modification, policies now account for protected branches configured for a group. This setting ensures that branches protected at the group level cannot be unprotected. Protected branches restrict certain actions, such as deleting the branch and force pushing to the branch. You can override this behavior and declare exceptions for specific top-level groups with the new approval_settings.block_group_branch_modification property to allow group owners to temporarily modify protected branches when necessary.
This new project override setting ensures that group protected branch settings cannot be modified to circumvent security and compliance requirements, ensuring more stable enforcement of protected branches.
Available in: Ultimate
Offerings: GitLab.com
Top-level group Owners can create service accounts
Currently, only administrators can create service accounts on GitLab self-managed. Now, there is an optional setting which allows top-level group Owners to create service accounts. This allows administrators to choose if they would like a wider range of roles that are allowed to create service accounts, or keep it as an administrator-only task.
Available in: Premium, Ultimate
Service accounts badge
Service accounts now have a designated badge and can be easily identified in the users list. Previously, these accounts only had the bot badge, making it difficult to distinguish between them and group and project access tokens.
Available in: Premium, Ultimate
Offerings: GitLab.com
Deploy your Pages site with any CI/CD job
To give you more flexibility in designing your pipelines, you no longer
need to name your Pages deploy job pages. You can now simply use the
pages attribute in any CI/CD job to trigger a Pages deployment.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
AI Impact Analytics API for GitLab Duo Pro
GitLab Duo Pro customers can now programmatically access AI Impact Analytics metrics with the aiMetrics GraphQL API. Metrics include the number of assigned GitLab Duo seats, Duo Chat users, and Code Suggestion users. The API also provides granular counts for code suggestions that are shown and accepted. With this data, you can calculate the acceptance rate for Code Suggestions, and better understand your Duo Pro users’ adoption of Duo Chat and Code Suggestions. You can also pair AI Impact Analytics metrics with Value Stream Analytics and DORA metrics to gain deeper insight into how adopting Duo Chat and Code Suggestions are impacting your team’s productivity.
Available in: Premium, Ultimate
Offerings: GitLab.com
Add-ons: Duo Pro, Duo Enterprise
Easily remove closed items from your view
You can now hide closed items from the linked and child items lists by turning off the Show closed items toggle. With this addition, you have greater control over your view and can focus on active work while reducing visual clutter in complex projects.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Query user-level GitLab Duo Enterprise usage metrics
Prior to this release, it was not possible to get GitLab Duo Chat and Code Suggestions usage data per Duo Enterprise user. In 17.6, we’ve added a GraphQL API to provide visibility into the number of code suggestions accepted and Duo Chat interactions for each active Duo Enterprise user. The API can help you get more granular insight into who is using which Duo Enterprise features and how frequently. This is the first iteration toward our goal of
providing more comprehensive Duo Enterprise usage data within GitLab.
Available in: Ultimate
Offerings: GitLab.com
Add-ons: Duo Enterprise
Support for license data from CycloneDX SBOMs
The License Scanner now has the ability to consume a dependency’s license from a CycloneDX SBOM that includes supported package types.
In cases where the licenses field of a CycloneDX SBOM is available, users will see license data from their SBOM. In cases where the SBOM lacks license information we will continue to provide this data from our License database.
Available in: Ultimate
Offerings: GitLab.com
macOS Sequoia 15 and Xcode 16 job image
You can now create, test, and deploy applications for the newest
generations of Apple devices using macOS Sequoia 15 and Xcode 16.
GitLab’s hosted runners on macOS
help your development teams build and deploy macOS applications faster in a secure,
on-demand build environment integrated with GitLab CI/CD.
Try it out today by using the macos-15-xcode-16 image in your .gitlab-ci.yml file.
Available in: Silver, Gold
Offerings: GitLab.com
JaCoCo test coverage visualization now generally available
You can now see JaCoCo test coverage results directly in your merge request diff view. This visualization allows you to quickly identify which lines are covered by tests and which need additional coverage before merging.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
GitLab Runner 17.6
We’re also releasing GitLab Runner 17.6 today! GitLab Runner is the highly-scalable build agent that runs your CI/CD jobs and sends the results back to a GitLab instance. GitLab Runner works in conjunction with GitLab CI/CD, the open-source continuous integration service included with GitLab.
Bug Fixes:
Available in: Free, Premium, Ultimate