<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>GitLab Breaking Changes</title>
    <link>https://docs.gitlab.com/ee/update/deprecations.html</link>
    <description>Receive notifications of upcoming changes to GitLab that may affect your team's workflow.</description>
    <item>
      <title>Support for Redis 6</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/585839</link>
      <description><![CDATA[In GitLab 19.0, we plan to remove support for Redis 6 as part of our commitment to maintaining a secure and
supportable infrastructure stack.

Before upgrading to GitLab 19.0, you must be running either:

- Redis 7.2.
- Valkey 7.2, which is available in beta from GitLab 18.9 with general availability planned for GitLab 19.0.

The bundled Redis included with the Linux package has used Redis 7 since GitLab 16.2 and is not affected.
Only GitLab Self-Managed instances using an external Redis 6 deployment must migrate.

See the following resources for migrating an external Redis 6 deployment:

- **AWS ElastiCache**: Upgrade your Redis 6 instance to Redis 7.2 or Valkey 7.2. For available upgrade paths, see
  <a href="https://docs.aws.amazon.com/AmazonElastiCache/latest/dg/supported-engine-versions.html">AWS ElastiCache documentation</a>.
- **GCP Memorystore**: Upgrade your Redis 6 instance to Redis 7.2 or Valkey 7.2. For available upgrade paths, see
  <a href="https://cloud.google.com/memorystore/docs/redis/supported-versions">GCP Memorystore documentation</a>.
- **Azure Cache for Redis**: A managed Redis 7.2 or Valkey 7.2 option is not currently available on Azure. You can
  self-host Redis 7.2 or Valkey 7.2 on Azure VMs or AKS. You can also use the GitLab Linux package installation method,
  which will support Valkey 7.2 with general availability planned for GitLab 19.0.
- **Self-hosted**: Upgrade your Redis 6 instance to Redis 7.2 or Valkey 7.2.

For more information, see the <a href="https://docs.gitlab.com/install/requirements/">requirements documentation</a>.
]]></description>
      <pubDate>Wed, 11 Mar 2026 10:35:29 +1000</pubDate>
    </item>
    <item>
      <title>Elasticsearch 7.x no longer supported for advanced search</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/583544</link>
      <description><![CDATA[The <a href="https://www.elastic.co/support/eol">maintenance term for Elasticsearch 7.x</a> ended on 2026-01-15.
For GitLab Self-Managed, administrators must upgrade their Elasticsearch instance to use advanced search.
]]></description>
      <pubDate>Tue, 10 Mar 2026 08:56:29 +0100</pubDate>
    </item>
    <item>
      <title>Legacy instance-level audit event streaming destination GraphQL APIs</title>
      <link>https://gitlab.com/groups/gitlab-org/-/work_items/12339</link>
      <description><![CDATA[The following instance-level GraphQL APIs for audit event streaming destinations are deprecated and will be removed in GitLab 20.0.

Deprecated mutations:

- `instanceExternalAuditEventDestinationCreate` — use `instanceAuditEventStreamingDestinationsCreate` instead.
- `instanceExternalAuditEventDestinationDestroy` — use `instanceAuditEventStreamingDestinationsDelete` instead.
- `instanceExternalAuditEventDestinationUpdate` — use `instanceAuditEventStreamingDestinationsUpdate` instead.
- `instanceGoogleCloudLoggingConfigurationCreate` — use `instanceAuditEventStreamingDestinationsCreate` with `gcpLogging` category instead.
- `instanceGoogleCloudLoggingConfigurationDestroy` — use `instanceAuditEventStreamingDestinationsDelete` instead.
- `instanceGoogleCloudLoggingConfigurationUpdate` — use `instanceAuditEventStreamingDestinationsUpdate` instead.
- `auditEventsInstanceAmazonS3ConfigurationCreate` — use `instanceAuditEventStreamingDestinationsCreate` with `amazonS3` category instead.
- `auditEventsInstanceAmazonS3ConfigurationDelete` — use `instanceAuditEventStreamingDestinationsDelete` instead.
- `auditEventsInstanceAmazonS3ConfigurationUpdate` — use `instanceAuditEventStreamingDestinationsUpdate` instead.
- `auditEventsStreamingInstanceHeadersCreate` — configure headers by using the streaming destination configuration using `instanceAuditEventStreamingDestinationsUpdate`.
- `auditEventsStreamingInstanceHeadersDestroy` — configure headers by using the streaming destination configuration using `instanceAuditEventStreamingDestinationsUpdate`.
- `auditEventsStreamingInstanceHeadersUpdate` — configure headers by using the streaming destination configuration using `instanceAuditEventStreamingDestinationsUpdate`.
- `auditEventsStreamingDestinationInstanceEventsAdd` — use `auditEventsInstanceDestinationEventsAdd` instead.
- `auditEventsStreamingDestinationInstanceEventsRemove` — use `auditEventsInstanceDestinationEventsRemove` instead.

Deprecated query fields:

- `instanceExternalAuditEventDestinations` — use `auditEventsInstanceStreamingDestinations` instead.
- `instanceGoogleCloudLoggingConfigurations` — use `auditEventsInstanceStreamingDestinations` with `gcpLogging` category instead.
- `auditEventsInstanceAmazonS3Configurations` — use `auditEventsInstanceStreamingDestinations` with `amazonS3` category instead.

The new unified streaming destination APIs support all destination categories (HTTP, Google Cloud Logging, Amazon S3) through a single set of endpoints with a `category` parameter.
]]></description>
      <pubDate>Thu, 19 Feb 2026 10:51:59 -0500</pubDate>
    </item>
    <item>
      <title>Legacy group-level audit event streaming destination GraphQL APIs</title>
      <link>https://gitlab.com/groups/gitlab-org/-/work_items/12339</link>
      <description><![CDATA[The following group-level GraphQL APIs for audit event streaming destinations are deprecated and will be removed in GitLab 20.0.

Deprecated mutations:

- `externalAuditEventDestinationCreate` — use `groupAuditEventStreamingDestinationsCreate` instead.
- `externalAuditEventDestinationDestroy` — use `groupAuditEventStreamingDestinationsDelete` instead.
- `externalAuditEventDestinationUpdate` — use `groupAuditEventStreamingDestinationsUpdate` instead.
- `googleCloudLoggingConfigurationCreate` — use `groupAuditEventStreamingDestinationsCreate` with `gcpLogging` category instead.
- `googleCloudLoggingConfigurationDestroy` — use `groupAuditEventStreamingDestinationsDelete` instead.
- `googleCloudLoggingConfigurationUpdate` — use `groupAuditEventStreamingDestinationsUpdate` instead.
- `auditEventsAmazonS3ConfigurationCreate` — use `groupAuditEventStreamingDestinationsCreate` with `amazonS3` category instead.
- `auditEventsAmazonS3ConfigurationDelete` — use `groupAuditEventStreamingDestinationsDelete` instead.
- `auditEventsAmazonS3ConfigurationUpdate` — use `groupAuditEventStreamingDestinationsUpdate` instead.
- `auditEventsStreamingHeadersCreate` — configure headers by using the streaming destination configuration using `groupAuditEventStreamingDestinationsUpdate`.
- `auditEventsStreamingHeadersDestroy` — configure headers by using the streaming destination configuration using `groupAuditEventStreamingDestinationsUpdate`.
- `auditEventsStreamingHeadersUpdate` — configure headers by using the streaming destination configuration using `groupAuditEventStreamingDestinationsUpdate`.
- `auditEventsStreamingDestinationEventsAdd` — use `auditEventsGroupDestinationEventsAdd` instead.
- `auditEventsStreamingDestinationEventsRemove` — use `auditEventsGroupDestinationEventsRemove` instead.
- `auditEventsStreamingHttpNamespaceFiltersAdd` — use `auditEventsGroupDestinationNamespaceFilterCreate` instead.
- `auditEventsStreamingHttpNamespaceFiltersDelete` — use `auditEventsGroupDestinationNamespaceFilterDelete` instead.

Deprecated group fields:

- `Group.externalAuditEventDestinations` — use `Group.externalAuditEventStreamingDestinations` instead.
- `Group.googleCloudLoggingConfigurations` — use `Group.externalAuditEventStreamingDestinations` with `gcpLogging` category instead.
- `Group.amazonS3Configurations` — use `Group.externalAuditEventStreamingDestinations` with `amazonS3` category instead.

The new unified streaming destination APIs support all destination categories (HTTP, Google Cloud Logging, Amazon S3) through a single set of endpoints with a `category` parameter.
]]></description>
      <pubDate>Thu, 19 Feb 2026 10:51:59 -0500</pubDate>
    </item>
    <item>
      <title>Support for NGINX Ingress, HAProxy, and Traefik charts</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/590799</link>
      <description><![CDATA[The GitLab Helm chart bundles several Ingress controllers as an alternative to
the default Envoy Gateway which uses the Kubernetes Gateway API.

These bundled Ingress controllers, namely NGINX Ingress, HAProxy, and
Traefik will be dropped from the GitLab Helm chart and GitLab Operator.
Using Ingresses will still be supported by the GitLab Helm chart and GitLab Operator,
but a external Ingress controller must be deployed to do so.

We recommend to migrate to the bundled Envoy Gateway and Gateway API.
Alternatively, you can deploy and configure an
<a href="https://docs.gitlab.com/charts/charts/globals/#configure-ingress-settings">external Ingress controller and class</a>.
]]></description>
      <pubDate>Fri, 13 Feb 2026 13:11:57 +0200</pubDate>
    </item>
    <item>
      <title>Support for NGINX Ingress</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/590800</link>
      <description><![CDATA[The GitLab Helm chart currently bundles NGINX Ingress as the default networking component. With
NGINX Ingress reaching end-of-life in March 2026, we are transitioning to Gateway API with Envoy
Gateway.

Starting with GitLab 19.0, Gateway API and the bundled Envoy Gateway become the default configuration.
If migration to Envoy Gateway isn't feasible for your deployment, you can explicitly re-enable the
bundled NGINX Ingress, which remains available until its planned removal in GitLab 20.0.

This change does not impact the NGINX in the Linux package, or GitLab Helm chart and GitLab Operator instances
that use an externally managed Ingress or Gateway API controller.

We will provide best-effort security maintenance for our forked NGINX Ingress chart and builds until
the full removal. To ensure a smooth transition, we recommend planning your migration to the provided
Gateway API solution or an externally managed Ingress controller.
]]></description>
      <pubDate>Fri, 13 Feb 2026 13:11:57 +0200</pubDate>
    </item>
    <item>
      <title>Support for PostgreSQL 16</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/589774</link>
      <description><![CDATA[GitLab follows an
<a href="https://handbook.gitlab.com/handbook/engineering/infrastructure-platforms/data-access/database-framework/postgresql-upgrade-cadence/">annual upgrade cadence for PostgreSQL</a>.

Support for PostgreSQL 16 is scheduled for removal in GitLab 19.0.
In GitLab 19.0, PostgreSQL 17 becomes the minimum required PostgreSQL version.

PostgreSQL 17 is available as of GitLab 18.9, and you can upgrade at any time before the removal of PostgreSQL 16 in GitLab 19.0.

If you are running a single PostgreSQL instance you installed by using the Linux package, an automatic upgrade may
be attempted with 18.11. Make sure you have enough disk space to accommodate the upgrade.

For more information, see <a href="https://docs.gitlab.com/omnibus/settings/database/#upgrade-packaged-postgresql-server">Upgrade packaged PostgreSQL server</a>.
]]></description>
      <pubDate>Fri, 13 Feb 2026 12:05:23 +1000</pubDate>
    </item>
    <item>
      <title>Spamcheck support in the Linux package and GitLab Helm chart</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/590796</link>
      <description><![CDATA[In GitLab 19.0, we are removing <a href="https://docs.gitlab.com/administration/reporting/spamcheck/">Spamcheck</a> from the
Linux package and GitLab Helm chart.

Spamcheck is a service to combat spam on public-facing GitLab instances. By its nature, this feature is primarily
relevant to large public instances, which represents an edge case in our customer base.

Given the low adoption and the availability of standalone deployment options, we are removing Spamcheck from the
Linux package and GitLab Helm chart. Customers not using Spamcheck will not be impacted by this change.
The removal will reduce package size and dependency footprint (and thus security) for the majority of customers.

If you currently use the bundled Spamcheck, you can deploy it separately by using
<a href="https://gitlab.com/gitlab-org/gl-security/security-engineering/security-automation/spam/spamcheck">Docker</a>.

No data migration is required. Configuration guidance is available in the linked documentation.
]]></description>
      <pubDate>Fri, 13 Feb 2026 11:46:13 +1000</pubDate>
    </item>
    <item>
      <title>Support for bundled PostgreSQL, Redis, and MinIO in GitLab Helm chart</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/590797</link>
      <description><![CDATA[The GitLab Helm chart bundles a Bitnami PostgreSQL, Bitnami Redis, and
a fork of the official MinIO chart to make setting up GitLab easier. Because of several
changes to licensing, project maintenance, and public image availability these,
components will be removed from the GitLab Helm chart and GitLab Operator with no replacement.

These charts are currently enabled by default but are explicitly documented as not
recommended for production usage. Their sole purpose was to enable quick setup
proof of concept and test environments.

If you are running an instance with the bundled PostgreSQL, Redis, or MinIO, please
check the <a href="https://docs.gitlab.com/charts/installation/migration/bundled_chart_migration/">migration guide</a>.

The Redis and PostgreSQL provided by the Linux package are not impacted by this
change.
]]></description>
      <pubDate>Fri, 13 Feb 2026 10:56:09 +1000</pubDate>
    </item>
    <item>
      <title>Linux package support for Ubuntu 20.04</title>
      <link>https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8915</link>
      <description><![CDATA[Ubuntu standard support for Ubuntu 20.04 <a href="https://wiki.ubuntu.com/Releases">ended in May 2025</a>.

In accordance with our <a href="https://docs.gitlab.com/install/package/#supported-platforms">Linux package supported platforms policy</a>,
we drop package builds once a vendor stops supporting the operating system.

From GitLab 19.0, we will no longer provide packages for the Ubuntu 20.04 distribution for Linux package installs.
GitLab 18.11 will be the last GitLab version with Linux packages for Ubuntu 20.04.

If you currently run GitLab on Ubuntu 20.04, you must upgrade to Ubuntu 22.04 or another
<a href="https://docs.gitlab.com/install/package/#supported-platforms">supported operating system</a> before upgrading to GitLab
19.0. Canonical provides an <a href="https://documentation.ubuntu.com/server/how-to/software/upgrade-your-release/">upgrade guide</a>
to help you migrate.
]]></description>
      <pubDate>Fri, 13 Feb 2026 10:11:30 +1000</pubDate>
    </item>
    <item>
      <title>Linux package support for Amazon Linux 2</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/590802</link>
      <description><![CDATA[In GitLab 19.1, we are removing Amazon Linux 2 (AL2) package builds for the Linux package.

Amazon Linux 2 reaches end of life in June 2026 and will no longer receive security updates after that date.
In accordance with our <a href="https://docs.gitlab.com/install/package/#supported-platforms">Linux package supported platforms policy</a>,
we drop package builds once a vendor stops supporting the operating system, with at least a six-month announcement period.

If you currently run GitLab on Amazon Linux 2, you must migrate to Amazon Linux 2023 (AL2023) or another
<a href="https://docs.gitlab.com/install/package/#supported-platforms">supported operating system</a> before upgrading to GitLab 19.1.
Amazon provides <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/using-features.migration-al.generic.from-al2.html">migration documentation</a>
to help you move from AL2 to AL2023.
]]></description>
      <pubDate>Fri, 13 Feb 2026 10:07:01 +1000</pubDate>
    </item>
    <item>
      <title>Linux package support for SUSE distributions</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/590801</link>
      <description><![CDATA[We are ending support for SUSE distributions in GitLab 19.0. This affects:

- openSUSE Leap 15.6
- SUSE Linux Enterprise Server 12.5
- SUSE Linux Enterprise Server 15.6

openSUSE Leap 15.6 is approaching end-of-life. While SUSE Linux Enterprise Server remains supported by SUSE via
long-term service, adoption among GitLab customers is too low to make continued support commercially viable.

Customers on SUSE distributions that use the Linux package will not be able to upgrade GitLab past version `18.11.x`.

For customers on one of these distributions, we recommend migrating to a
<a href="https://docs.gitlab.com/install/docker/installation/">Docker deployment of GitLab</a> on your existing distribution.
This avoids having to migrate to a different Linux distribution to continue to receive GitLab upgrades.
]]></description>
      <pubDate>Fri, 13 Feb 2026 09:32:42 +1000</pubDate>
    </item>
    <item>
      <title>Mattermost bundled with Linux package</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/590798</link>
      <description><![CDATA[In GitLab 19.0, we plan to remove bundled Mattermost from the Linux package.

Mattermost was first bundled with GitLab in 2015 as an open source team messaging solution, with GitLab SSO included
to support the integration. Since then, Mattermost has significantly matured its own packaging and deployment
options, and adoption of the bundled Mattermost among GitLab customers has remained relatively low.

With Mattermost v11, <a href="https://forum.mattermost.com/t/mattermost-v11-changes-in-free-offerings/25126">Mattermost has deprecated GitLab SSO from their free offering</a>.
Given this change, the maturity of Mattermost standalone deployment options, and the low adoption in our customer
base, we are removing Mattermost from the Linux package.

If you currently use Mattermost bundled with GitLab, refer to
<a href="https://docs.mattermost.com/administration-guide/onboard/migrate-gitlab-omnibus.html">Migrating from GitLab Omnibus to Mattermost Standalone</a>
in the Mattermost documentation for migration instructions and available Mattermost editions.
]]></description>
      <pubDate>Fri, 13 Feb 2026 09:26:29 +1000</pubDate>
    </item>
    <item>
      <title>Using app passwords with Bitbucket Cloud import GitLab API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/588961</link>
      <description><![CDATA[Atlassian has deprecated app passwords (username and password authentication) for Bitbucket Cloud and
<a href="https://www.atlassian.com/blog/bitbucket/bitbucket-cloud-transitions-to-api-tokens-enhancing-security-with-app-password-deprecation">announced</a>
that this authentication method will stop working on 2026-06-09.

From GitLab 19.0, if you want to import repositories from Bitbucket Cloud through the GitLab API, you must use
<a href="https://support.atlassian.com/organization-administration/docs/understand-user-api-tokens/">user API tokens</a> instead.

Users importing repositories from Bitbucket Server, or from Bitbucket Cloud through the GitLab UI, are unaffected.
]]></description>
      <pubDate>Tue, 10 Feb 2026 09:13:13 +0000</pubDate>
    </item>
    <item>
      <title>Enforce page limit for unauthenticated Projects API requests</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/585176</link>
      <description><![CDATA[To maintain platform stability and ensure optimal performance for all customers, we're enforcing a maximum offset limit on unauthenticated Projects API requests. The offset limit applies only to GitLab.com. On GitLab Self-Managed and GitLab Dedicated, the offset limit will be disabled by default behind a feature flag.

**What's changing**

A maximum offset limit of 50,000 will be enforced for all unauthenticated requests to the Projects List REST API. For example, the `page` parameter will be limited to 2,500 pages when retrieving 20 results per page.

Workflows requiring access to more data must use keyset-based pagination parameters.

**Why it matters**

This limit ensures consistent service quality and performance across GitLab.com by managing resource utilization effectively.
]]></description>
      <pubDate>Fri, 9 Jan 2026 12:07:50 +0800</pubDate>
    </item>
    <item>
      <title>Trending tab in Explore projects page is deprecated</title>
      <link>https://gitlab.com/groups/gitlab-org/-/work_items/18493</link>
      <description><![CDATA[The **Trending** tab in **Explore** > **Projects** and its associated GraphQL arguments are deprecated in GitLab 18.8 and will be removed in GitLab 19.0.
In the month before the GitLab 19.0 release, the ***Trending** tab redirects to the **Active** tab sorted by stars in descending order on GitLab.com.

**What's being removed**

- The **Trending** tab on the **Explore** > **Projects** page
- The trending argument in the following GraphQL types:
  - `Query.adminProjects`
  - `Query.projects`
  - `Organization.projects`

**Why we're making this change**

The trending algorithm only considers public projects, making it ineffective for GitLab Self-Managed instances that primarily use internal or private visibility. The algorithm's limitations and lack of search capability have led to explicit removal requests from Self-Managed users. Rather than investing in significant improvements, we're focusing resources on enhancing existing discovery mechanisms.

**Action required**

UI users: The **Trending** tab will be inaccessible during the next breaking change window before full removal in 19.0. We recommend using the **Active** tab to view recently updated or most starred projects.
]]></description>
      <pubDate>Thu, 18 Dec 2025 11:22:50 -0500</pubDate>
    </item>
    <item>
      <title>Slack slash commands</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/work_items/569345</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/user/project/integrations/slack_slash_commands/">Slack slash commands integration</a> is
deprecated in favor of the <a href="https://docs.gitlab.com/user/project/integrations/gitlab_slack_application/">GitLab for Slack app</a>,
which provides a more secure integration method with the same capabilities.

From GitLab 19.0, users will no longer be able to configure or use the Slack slash commands integration. This
integration is only available on GitLab Self-Managed and GitLab Dedicated instances. If you're on GitLab.com, you
don't need to do anything.

If you're on GitLab Self-Managed or GitLab Dedicated, to find out if you're impacted, see
<a href="https://gitlab.com/gitlab-org/gitlab/-/work_items/569345#am-i-impacted">issue 569345</a>.
]]></description>
      <pubDate>Tue, 9 Dec 2025 14:07:16 +1000</pubDate>
    </item>
    <item>
      <title>Design Management deprecated</title>
      <link>https://gitlab.com/groups/gitlab-org/-/work_items/20375</link>
      <description><![CDATA[In GitLab 20.0, GitLab will begin deprecation of Design Management. Design Management allows users to upload design assets such as wireframes and mockups to GitLab issues for collaboration. We've made this decision after careful consideration of existing usage and estimated customer impact. The ongoing maintenance required for Design Management outweighed the current usage, and we're focusing our efforts on solutions that better align with modern designer workflows. In GitLab 20.0 and later, users will no longer be able to upload new designs. Existing designs will remain available in read-only mode until GitLab 21.0, giving users time to save their designs as needed. GitLab is exploring alternatives that better integrate with the tools designers already use.
]]></description>
      <pubDate>Mon, 17 Nov 2025 08:27:12 +0000</pubDate>
    </item>
    <item>
      <title>Bitnami PostgreSQL and Redis images in GitLab chart</title>
      <link>https://gitlab.com/gitlab-org/charts/gitlab/-/issues/6089</link>
      <description><![CDATA[The GitLab Helm chart default configuration relies on Bitnami charts and container images
for PostgreSQL and Redis. Bitnami will discontinue these images from their free catalogs
on September 29th, 2025. Brownouts taking down images temporarily started on August 28th, 2025.

GitLab chart bundles Bitnami's PostgreSQL and Redis for demo and testing purposes only.
They are not part of any <a href="https://docs.gitlab.com/administration/reference_architectures/">supported GitLab reference architecture</a>.
If you are on a reference architecture or deployed an external PostgreSQL and Redis with
another vendor's packages or images, you are **not impacted** by this change.

As a temporary solution, GitLab has migrated the chart configuration to the Bitnami legacy
repository. However, unpatched GitLab chart environments (GitLab 17.11, GitLab 18.0.5. GitLab 18.1.4, and GitLab
18.2.1 or earlier) will continue to pull images from the deprecated Bitnami repository,
which will cause deployment failures after September 29th and may cause deployment failures during the brownout phase.

If you're running an affected GitLab chart configuration, you must do one of the following:

- Migrate to a supported GitLab reference architecture.
- Upgrade to a patched chart version.
- Configure the legacy repository in your chart values. For an example, see
  <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/4421">merge request 4421</a>.

Looking ahead, <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/issues/6089">we will assess alternatives</a> to replace
or potentially remove Bitnami components from the GitLab chart entirely. For more information, see the
<a href="https://github.com/bitnami/charts/issues/35164">official Bitnami announcement</a>.
]]></description>
      <pubDate>Mon, 8 Sep 2025 09:47:04 +1000</pubDate>
    </item>
    <item>
      <title>`bin_path` and `use_bundled_binaries` configuration options in Gitaly</title>
      <link>https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/9181</link>
      <description><![CDATA[Support for using `bin_path` and `use_bundled_binaries` configuration options in Gitaly is deprecated and will be
removed in GitLab 19.0.

The Git binaries provided by Gitaly will be the only supported way to execute Git.
]]></description>
      <pubDate>Fri, 11 Jul 2025 09:14:25 +0530</pubDate>
    </item>
    <item>
      <title>Static compliance violations report</title>
      <link>https://gitlab.com/groups/gitlab-org/-/epics/12774</link>
      <description><![CDATA[The existing static compliance violations report is deprecated in GitLab 18.2 and will be removed in GitLab 18.8.

To replace the static compliance violations report:

- In GitLab 17.11, we released <a href="https://docs.gitlab.com/user/compliance/compliance_frameworks/">custom compliance frameworks</a>.
- In GitLab 18.2, we released the new <a href="https://docs.gitlab.com/user/compliance/compliance_center/compliance_violations_report/">dynamic compliance violations report</a>.

These features give all of the same functionality as the static violations report, but you can configure the violations that you require.

In GitLab 18.8, we'll replace the static compliance violations report with the dynamic report using compliance frameworks for more accurate reporting on requirements
and controls.
]]></description>
      <pubDate>Tue, 8 Jul 2025 12:23:45 +1200</pubDate>
    </item>
    <item>
      <title>cert-manager Helm chart update</title>
      <link>https://gitlab.com/gitlab-org/charts/gitlab/-/issues/5928</link>
      <description><![CDATA[To enable schema validation of newer cert-manager charts, the GitLab Helm chart `certmanager.install` value is
deprecated in favor of `installCertmanager`. The schema definition does not accept the extra property that we
added within the `certmanager` section of the GitLab chart.

In GitLab 18.3 (GitLab chart 9.3), we will remove the deprecated value and update the bundled cert-manager.

If you've previously used the `certmanager.install` setting:

1. Transfer the value of `certmanager.install` to `installCertmanager`.
1. Remove the `certmanager.install` setting completely.

Also review the cert-manager release notes:

- <a href="https://cert-manager.io/docs/releases/upgrading/upgrading-1.12">Release Notes 1.12 - 1.16</a>
- <a href="https://cert-manager.io/docs/releases/upgrading/upgrading-1.16-1.17">Release Notes 1.17</a>
]]></description>
      <pubDate>Thu, 8 May 2025 08:42:45 +1000</pubDate>
    </item>
    <item>
      <title>Limited `scan` actions in a scan execution policy</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/472213</link>
      <description><![CDATA[On GitLab.com, starting in GitLab 18.0, <a href="https://docs.gitlab.com/user/application_security/policies/scan_execution_policies/">scan execution policies</a> are limited to 10 `scan` actions per policy. You can't create new policies that exceed the limit, and you can't update existing policies if they exceed the limit. For any existing policy that exceeds the limit, only the policy's first 10 `scan` actions are run.

On GitLab Self-Managed and GitLab Dedicated instances, you can configure a custom limit with the `scan_execution_policies_action_limit` application setting. Limits for these instances default to zero actions. We recommend configuring a limit of 10 actions.
]]></description>
      <pubDate>Thu, 24 Apr 2025 21:46:21 -0400</pubDate>
    </item>
    <item>
      <title>Resource owner password credentials grant is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/457353</link>
      <description><![CDATA[Using the resource owner password credentials (ROPC) grant as an OAuth flow is deprecated, and support will be fully removed in GitLab 19.0. We have added a setting that can be enabled or disabled by administrators to use this grant type with client credentials only, in their instances. This allows users who would like to opt out of using ROPC without client credentials to do so prior to 19.0. ROPC will be completely removed in 19.0 and cannot be used even with client credentials after that point.

GitLab has <a href="https://about.gitlab.com/blog/improving-oauth-ropc-security-on-gitlab-com/">required client authentication for ROPC on GitLab.com</a> since April 8, 2025 for security reasons. Fully removing ROPC support keeps security in line with the OAuth RFC version 2.1.
]]></description>
      <pubDate>Wed, 23 Apr 2025 17:07:48 -0400</pubDate>
    </item>
    <item>
      <title>OAuth ROPC grant without client credentials is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/535298</link>
      <description><![CDATA[GitLab.com requires client authentication for OAuth Resource Owner Password Credentials (ROPC) OAuth grant as of April 8, 2025. ROPC was omitted by the OAuth working group in RFC Version 2.1. Existing ROPC integrations without client credentials will experience service disruption after this date. If you experience disruption, update your integrations to include client credentials before the deadline. More information can be found <a href="https://about.gitlab.com/blog/2025/04/01/improving-oauth-ropc-security-on-gitlab-com/">on our blog</a>.
]]></description>
      <pubDate>Mon, 14 Apr 2025 17:51:39 -0400</pubDate>
    </item>
    <item>
      <title>Pipeline execution policies `inject_ci` strategy replaced by `inject_policy`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/573447</link>
      <description><![CDATA[With the introduction of <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/475152">custom stages</a> in pipeline execution policies (available in GitLab 17.9), we've introduced the configuration option `inject_policy` to replace the deprecated `inject_ci`.

This new strategy allows for a graceful rollout of the custom stages functionality for users with existing pipeline execution policies that use the `inject_ci` strategy.

To prepare for the pending removal, update all pipeline execution policies that use `inject_ci` to use `inject_policy` instead.
]]></description>
      <pubDate>Wed, 2 Apr 2025 14:38:39 -0400</pubDate>
    </item>
    <item>
      <title>Error handling for `/repository/tree` REST API endpoint returns `404`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/420865</link>
      <description><![CDATA[In GitLab 17.7, the error handling behavior for the list repository tree API endpoint, `/projects/:id/repository/tree`, is updated when a requested path is not found. The endpoint now returns a status code `404 Not Found`. Previously, the status code was `200 OK`.

This change was enabled on GitLab.com in GitLab 16.5, and will be available for self-managed instances in GitLab 17.7.

If your implementation relies on receiving a `200` status code with an empty array for missing paths, you must update your error handling to handle the new `404` responses.
]]></description>
      <pubDate>Thu, 6 Mar 2025 08:33:17 +0100</pubDate>
    </item>
    <item>
      <title>PostgreSQL 14 and 15 no longer supported</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/521663</link>
      <description><![CDATA[GitLab follows an <a href="https://handbook.gitlab.com/handbook/engineering/infrastructure-platforms/data-access/database-framework/postgresql-upgrade-cadence/">annual upgrade cadence for PostgreSQL</a>.

Support for PostgreSQL 14 and 15 is scheduled for removal in GitLab 18.0.
In GitLab 18.0, PostgreSQL 16 becomes the minimum required PostgreSQL version.

PostgreSQL 14 and 15 will be supported for the full GitLab 17 release cycle.
PostgreSQL 16 will also be supported for instances that want to upgrade prior to GitLab 18.0.

If you are running a single PostgreSQL instance you installed by using an Omnibus Linux package, an automatic upgrade may be attempted with 17.11.
Make sure you have enough disk space to accommodate the upgrade. For more information, see the <a href="https://docs.gitlab.com/omnibus/settings/database/#upgrade-packaged-postgresql-server">Omnibus database documentation</a>.
]]></description>
      <pubDate>Wed, 5 Mar 2025 10:06:03 +1000</pubDate>
    </item>
    <item>
      <title>Coverage-guided fuzz testing is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/517841</link>
      <description><![CDATA[Coverage-guided fuzz testing is deprecated and will not be supported
from GitLab 18.0. The feature will be completely removed in GitLab 19.0.

Coverage-guided fuzz testing integrated several open-source fuzzers into GitLab.
If you are impacted, you can integrate your open-source fuzzers as standalone applications,
or migrate to another security feature like <a href="https://docs.gitlab.com/user/application_security/sast/gitlab_advanced_sast/">GitLab Advanced SAST</a>.
]]></description>
      <pubDate>Wed, 26 Feb 2025 17:27:46 +0000</pubDate>
    </item>
    <item>
      <title>The `agentk` container registry is moving to Cloud Native GitLab</title>
      <link>https://gitlab.com/gitlab-org/cluster-integration/gitlab-agent/-/issues/630</link>
      <description><![CDATA[We are moving the `agentk` container registry from
<a href="https://gitlab.com/gitlab-org/cluster-integration/gitlab-agent/container_registry/1223205">its project-specific registry</a>
to <a href="https://gitlab.com/gitlab-org/build/CNG/container_registry/8241772">the Cloud Native GitLab (CNG) registry</a>.
From GitLab 18.0 onward, `agentk` images built in CNG will mirror into the project-specific registry.
The new image is equivalent to the old image, except the new image only supports `amd64` and `arm64` architectures.
It does not support the 32-bit `arm` architecture.
From GitLab 19.0 onward, the project-specific registry will not receive `agentk` updates.
If you mirror the `agentk` container to a local registry, you should change your mirror source to the
<a href="https://gitlab.com/gitlab-org/build/CNG/container_registry/8241772">CNG registry</a>.

If you use the official <a href="https://gitlab.com/gitlab-org/charts/gitlab-agent/">GitLab Agent Helm chart</a>,
the new `agentk` image will start deploying from the new location seamlessly in GitLab 18.0.
]]></description>
      <pubDate>Mon, 17 Feb 2025 15:21:41 +0000</pubDate>
    </item>
    <item>
      <title>DAST `dast_devtools_api_timeout` will have a lower default value</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/517254</link>
      <description><![CDATA[The `DAST_DEVTOOLS_API_TIMEOUT` environment variable determines how long a DAST scan waits for a response from the browser. Before GitLab 18.0, the variable has a static value of 45 seconds. After GitLab 18.0, `DAST_DEVTOOLS_API_TIMEOUT` environment variable has a dynamic value, which is calculated based on other timeout configurations.
In most cases, the 45-second value was higher than the timeout value of many scanner functions. The dynamically calculated value makes the `DAST_DEVTOOLS_API_TIMEOUT` variable more useful by increasing the number of cases it applies to.

To lessen potential disruptions, we will incrementally adjust the default timeout value according to this schedule:

| Timeout value | Milestone         |
|:--------------|:------------------|
| 45            | 17.11 and earlier |
| 30            | 18.0              |
| 20            | 18.1              |
| 10            | 18.2              |
| 5             | 18.3              |
]]></description>
      <pubDate>Fri, 14 Feb 2025 20:41:15 +0000</pubDate>
    </item>
    <item>
      <title>Updating CI/CD job tokens to JWT standard</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/509578</link>
      <description><![CDATA[In GitLab 19.0, CI/CD job tokens will switch from a string token format to the JWT token format. This changes impacts new and existing CI/CD job tokens in all projects. If you experience issues, you can still <a href="https://docs.gitlab.com/ci/jobs/ci_job_token#use-legacy-format-for-cicd-tokens">use the legacy format for your CI/CD tokens</a> until the GitLab 20.0 release.

Known issues:

1. GitLab Runner's AWS Fargate Drive 0.5.0 and earlier is incompatible with the JWT standard. Jobs will fail with a `file name too long` error. Users of the <a href="https://docs.gitlab.com/runner/configuration/runner_autoscale_aws_fargate/">AWS Fargate custom executor driver</a> must upgrade to 0.5.1 or later. For migration instructions, see <a href="https://gitlab.com/gitlab-org/ci-cd/custom-executor-drivers/fargate/-/tree/master/docs">the documentation</a>.
1. The much longer JWT standard breaks the `echo $CI_JOB_TOKEN | base64` command used in some CI/CD configuration files. You can use the `echo $CI_JOB_TOKEN | base64 -w0` command instead.
]]></description>
      <pubDate>Fri, 14 Feb 2025 18:48:53 +0000</pubDate>
    </item>
    <item>
      <title>Reject container image pull policies not in `allowed_pull_policies`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/516107</link>
      <description><![CDATA[All configured pull-policies should be present in the
<a href="https://docs.gitlab.com/runner/executors/docker/#allow-docker-pull-policies">`allowed_pull_policies` configuration</a>
specified in the runner's `config.toml` file. If they are not, the job should fail with an `incompatible pull policy` error.

In the current implementation, when multiple pull policies are defined, jobs pass if at least one pull policy
matches those in `allowed-pull-policies`, even if other policies are not included.

In GitLab 18.0, jobs will fail only if none of the pull policies match those in `allowed-pull-policies`.
However, unlike the current behavior, jobs will use only the pull policies listed in `allowed-pull-policies`.
This distinction can cause jobs that currently pass to fail in GitLab 18.0.
]]></description>
      <pubDate>Fri, 14 Feb 2025 04:29:36 +0000</pubDate>
    </item>
    <item>
      <title>Raspberry Pi 32-bit packages are deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/519113</link>
      <description><![CDATA[Starting from GitLab version 18.0, we will no longer provide 32-bit packages for Raspberry Pi.
You should use 64-bit Raspberry Pi OS and <a href="https://about.gitlab.com/install/#debian">install the `arm64` Debian packages</a>.
For information on backing up data on a 32-bit OS and restoring it to a 64-bit OS, see
<a href="https://docs.gitlab.com/administration/postgresql/upgrading_os/">Upgrading operating systems for PostgreSQL</a>.
]]></description>
      <pubDate>Thu, 13 Feb 2025 23:46:20 +0000</pubDate>
    </item>
    <item>
      <title>New data retention limits for vulnerabilities on GitLab.com</title>
      <link>https://gitlab.com/groups/gitlab-org/-/epics/16629</link>
      <description><![CDATA[In GitLab 18.0, we are introducing a new data retention limit for GitLab.com Ultimate customers to improve system performance and reliability. The data retention limit affects how long your vulnerability data is stored for. Vulnerabilities older than 12 months that have not been updated are automatically moved to cold storage archives. These archives:

- Remain accessible and downloadable through the GitLab UI.
- Are retained for 3 years.
- Are permanently deleted after 3 years.
]]></description>
      <pubDate>Thu, 13 Feb 2025 17:54:05 +0000</pubDate>
    </item>
    <item>
      <title>Dependency scanning upgrades to the GitLab SBOM vulnerability scanner</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/501308</link>
      <description><![CDATA[The dependency scanning feature is upgrading to the GitLab SBOM vulnerability scanner. As part of this change, the Gemnasium analyzer (previously used in CI/CD pipelines) is deprecated in GitLab 17.9.

It is replaced with the <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/dependency_scanning_sbom/">dependency scanning using SBOM</a> feature and
the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/dependency-scanning">new dependency scanning analyzer</a> that focuses on detecting dependencies and their relationships (dependency graph) and relies on GitLab's built-in SBOM vulnerability scanner, which is already employed by
<a href="https://docs.gitlab.com/user/application_security/continuous_vulnerability_scanning/">continuous vulnerability scanning</a>, to identify their vulnerabilities.

As of GitLab 18.5, this new feature is in Limited Availability. Until the majority of users have migrated to the new dependency scanning feature, GitLab will continue to support the Gemnasium analyzer. Only then,
the Gemnasium analyzer will reach <a href="https://docs.gitlab.com/update/terminology/#end-of-support">end of support</a>.

Due to the significant changes and feature removals this upgrade introduces, it will not be implemented automatically. Existing CI/CD jobs
using the Gemnasium analyzer will continue to function by default to prevent disruption to CI/CD configurations.

Please review the fully detailed changes below and consult <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/migration_guide_to_sbom_based_scans/">the migration guide</a> to assist you with the transition.

- To prevent disruptions to your CI/CD configuration, when your application uses the stable dependency scanning CI/CD template (`Dependency-Scanning.gitlab-ci.yml`), dependency scanning uses only the existing CI/CD jobs based on the Gemnasium analyzer.
- When your application uses the latest dependency scanning CI/CD template (`Dependency-Scanning.latest.gitlab-ci.yml`), dependency scanning uses the existing CI/CD jobs based on the Gemnasium analyzer and the new dependency scanning analyzer also runs on the supported file types.
  You can also opt-in to enforce the new dependency scanning analyzer for all projects.
- Other migration paths might be considered as the feature gains maturity.
- The <a href="https://gitlab.com/gitlab-org/security-products/analyzers/gemnasium/">Gemnasium analyzer</a> project is deprecated, as well as the corresponding container images (all tags and variants): `gemnasium`, `gemnasium-maven`, `gemnasium-python`.
  These images will not be removed from the GitLab container registry.
- The following CI/CD variables associated with the Gemnasium analyzer are also deprecated. While these variables will continue to work when using the Gemnasium analyzer, they will not be effective after migrating to the new dependency scanning analyzer.
  If a variable is also used in another context, the deprecation only applies to the dependency scanning feature (for example, `GOOS` and `GOARCH` are not specific to the dependency scanning feature).
  `DS_EXCLUDED_ANALYZERS`, `DS_GRADLE_RESOLUTION_POLICY`, `DS_IMAGE_SUFFIX`, `DS_JAVA_VERSION`, `DS_PIP_DEPENDENCY_PATH`, `DS_PIP_VERSION`, `DS_REMEDIATE_TIMEOUT`, `DS_REMEDIATE`, `GEMNASIUM_DB_LOCAL_PATH`, `GEMNASIUM_DB_REF_NAME`, `GEMNASIUM_DB_REMOTE_URL`,
  `GEMNASIUM_DB_UPDATE_DISABLED`, `GEMNASIUM_LIBRARY_SCAN_ENABLED`, `GOARCH`, `GOFLAGS`, `GOOS`, `GOPRIVATE`, `GRADLE_CLI_OPTS`, `GRADLE_PLUGIN_INIT_PATH`, `MAVEN_CLI_OPTS`, `PIP_EXTRA_INDEX_URL`, `PIP_INDEX_URL`, `PIPENV_PYPI_MIRROR`, `SBT_CLI_OPTS`.
- The following <a href="https://gitlab.com/components/dependency-scanning/#components">CI/CD components</a> are deprecated: Android, Rust, Swift, CocoaPods. These are replaced by
  <a href="https://gitlab.com/components/dependency-scanning/-/tree/main/templates/main?ref_type=heads">the main dependency scanning CI/CD component</a> that covers all supported languages and package managers.
- The <a href="https://docs.gitlab.com/user/application_security/vulnerabilities/#resolve-a-vulnerability">Resolve a vulnerability</a> feature **for Yarn projects** is deprecated in GitLab 17.9.
  While this functionality will continue to work when using the Gemnasium analyzer, it will not be available after migrating to the new dependency scanning analyzer.
  See the corresponding <a href="https://docs.gitlab.com/update/deprecations/#resolve-a-vulnerability-for-dependency-scanning-on-yarn-projects">deprecation announcement</a> for more details.
- The <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/#javascript">dependency scanning for JavaScript vendored libraries</a> feature is deprecated in GitLab 17.9.
  While this functionality will continue to work when using the Gemnasium analyzer, it will not be available after migrating to the new dependency scanning analyzer.
  See the corresponding <a href="https://docs.gitlab.com/update/deprecations/#dependency-scanning-for-javascript-vendored-libraries">deprecation announcement</a> for more details.
]]></description>
      <pubDate>Wed, 12 Feb 2025 23:32:46 +0000</pubDate>
    </item>
    <item>
      <title>Resolve a vulnerability for dependency scanning on Yarn projects</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/501308</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/user/application_security/vulnerabilities/#resolve-a-vulnerability">Resolve a vulnerability</a> feature for Yarn projects
provided by the Gemnasium analyzer for dependency scanning is deprecated in GitLab 17.9.

While this functionality will continue to work when using the Gemnasium analyzer, it will not be available after migrating to the new dependency scanning analyzer.
See details in <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/migration_guide_to_sbom_based_scans/">the migration guide</a>

A replacement feature is planned as part of the <a href="https://gitlab.com/groups/gitlab-org/-/epics/7186">Auto Remediation vision</a> but no timeline has been set for its delivery.
]]></description>
      <pubDate>Wed, 12 Feb 2025 23:32:46 +0000</pubDate>
    </item>
    <item>
      <title>Dependency scanning for JavaScript vendored libraries</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/501308</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/#javascript">dependency scanning for JavaScript vendored libraries</a> feature
provided by the Gemnasium analyzer for dependency scanning is deprecated in GitLab 17.9.

While this functionality will continue to work when using the Gemnasium analyzer, it will not be available after migrating to the new dependency scanning analyzer.
See details in <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/migration_guide_to_sbom_based_scans/">the migration guide</a>

A replacement feature will be developed with <a href="https://gitlab.com/groups/gitlab-org/-/epics/7186">dependency scanning on vendored libraries</a> but no timeline has been set for its delivery.
]]></description>
      <pubDate>Wed, 12 Feb 2025 23:32:46 +0000</pubDate>
    </item>
    <item>
      <title>End-of-Support SAST jobs will be removed from the CI/CD template</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/519133</link>
      <description><![CDATA[In GitLab 18.0, we will update the SAST CI/CD template to remove analyzer jobs that have reached End of Support in previous releases.
The following jobs will be removed from `SAST.gitlab-ci.yml` and `SAST.latest.gitlab-ci.yml`:

- `bandit-sast`, which <a href="#sast-analyzer-consolidation-and-cicd-template-changes">reached End of Support in 15.4</a>
- `brakeman-sast`, which <a href="#sast-analyzer-coverage-changing-in-gitlab-170">reached End of Support in 17.0</a>
- `eslint-sast`, which <a href="#sast-analyzer-consolidation-and-cicd-template-changes">reached End of Support in 15.4</a>
- `flawfinder-sast`, which <a href="#sast-analyzer-coverage-changing-in-gitlab-170">reached End of Support in 17.0</a>
- `gosec-sast`, which <a href="#sast-analyzer-consolidation-and-cicd-template-changes">reached End of Support in 15.4</a>
- `mobsf-android-sast`, which <a href="#sast-analyzer-coverage-changing-in-gitlab-170">reached End of Support in 17.0</a>
- `mobsf-ios-sast`, which <a href="#sast-analyzer-coverage-changing-in-gitlab-170">reached End of Support in 17.0</a>
- `nodejs-scan-sast`, which <a href="#sast-analyzer-coverage-changing-in-gitlab-170">reached End of Support in 17.0</a>
- `phpcs-security-audit-sast`, which <a href="#sast-analyzer-coverage-changing-in-gitlab-170">reached End of Support in 17.0</a>
- `security-code-scan-sast`, which <a href="#sast-analyzer-coverage-changing-in-gitlab-160">reached End of Support in 16.0</a>

At the time when each analyzer reached End of Support, we updated its job `rules` to cause it not to run by default and stopped releasing updates.
However, you might have customized the template to continue to use these jobs or depend on them existing in your pipelines.
If you have any customization that depends on the jobs above, perform the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/519133#actions-required">actions required</a> before
upgrading to 18.0 to avoid disruptions to your CI/CD pipelines.
]]></description>
      <pubDate>Wed, 12 Feb 2025 02:52:57 +0000</pubDate>
    </item>
    <item>
      <title>API Discovery will use branch pipelines by default</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/515487</link>
      <description><![CDATA[In GitLab 18.0, we'll update the default behavior of the CI/CD template for API Discovery (`API-Discovery.gitlab-ci.yml`).

Before GitLab 18.0, this template configures jobs to run in <a href="https://docs.gitlab.com/ci/pipelines/merge_request_pipelines/">merge request (MR) pipelines</a> by default when an MR is open.
Starting in GitLab 18.0, we'll align this template's behavior with the behavior of the <a href="https://docs.gitlab.com/user/application_security/detect/roll_out_security_scanning/#template-editions">Stable template editions</a> for other AST scanners:

- By default, the template will run scan jobs in branch pipelines.
- You'll be able to set the CI/CD variable `AST_ENABLE_MR_PIPELINES: true` to use MR pipelines instead when an MR is open. The implementation of this new variable is tracked in <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/410880">issue 410880</a>.
]]></description>
      <pubDate>Wed, 12 Feb 2025 01:18:33 +0000</pubDate>
    </item>
    <item>
      <title>`kpt`-based `agentk` is deprecated</title>
      <link>https://gitlab.com/gitlab-org/cluster-integration/gitlab-agent/-/issues/656</link>
      <description><![CDATA[We'll remove support for the `kpt`-based installation of the agent for Kubernetes.
Instead, you should install the agent with one of the supported installation methods:

- Helm (recommended)
- GitLab CLI
- Flux

To migrate from `kpt` to Helm, follow <a href="https://docs.gitlab.com/user/clusters/agent/install/">the agent installation documentation</a> to overwrite your `kpt`-deployed `agentk` instance.
]]></description>
      <pubDate>Tue, 11 Feb 2025 19:58:46 +0000</pubDate>
    </item>
    <item>
      <title>Major update of the Prometheus subchart</title>
      <link>https://gitlab.com/gitlab-org/charts/gitlab/-/issues/5927</link>
      <description><![CDATA[With GitLab 18.0 and GitLab chart 9.0, the Prometheus subchart will be updated from 15.3 to 27.3.
Along with this update, Prometheus 3 will be shipped by default.

Manual steps are required to perform the upgrade. If you have Alertmanager, Node Exporter or
Pushgateway enabled, you will also need to update your Helm values.

Please refer to the <a href="https://docs.gitlab.com/charts/releases/9_0/#prometheus-upgrade">migration guide</a>
for more information.
]]></description>
      <pubDate>Mon, 10 Feb 2025 10:08:35 +0100</pubDate>
    </item>
    <item>
      <title>Support for SUSE Linux Enterprise Server 15 SP2</title>
      <link>https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8888</link>
      <description><![CDATA[Long term service and support (LTSS) for SUSE Linux Enterprise Server (SLES) 15 SP2 ended in December 2024.

Therefore, we will no longer support the SLES SP2 distribution for Linux package installs. You should upgrade to
SLES 15 SP6 for continued support.
]]></description>
      <pubDate>Sat, 8 Feb 2025 09:11:35 +0000</pubDate>
    </item>
    <item>
      <title>Subscription related API endpoints in the public API are deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/515371#note_2319368251</link>
      <description><![CDATA[The following endpoints in the public REST API will be removed:

- `PUT /api/v4/user/:id/credit_card_validation`
- `POST /api/v4/namespaces/:namespace_id/minutes`
- `PATCH /api/v4/namespaces/:previous_namespace_id/minutes/move/:target_namespace_id`
- `GET /api/v4/namespaces/:namespace_id/subscription_add_on_purchase/:id`
- `PUT /api/v4/namespaces/:namespace_id/subscription_add_on_purchase/:id`
- `POST /api/v4/namespaces/:namespace_id/subscription_add_on_purchase/:id`
- `POST /api/v4/namespaces/:id/gitlab_subscription`
- `PUT /api/v4/namespaces/:id/gitlab_subscription`
- `PUT /api/v4/namespaces/:id`

These endpoints were being used by the Subscription Portal to manage subscription information on GitLab.com. Their
usage has been replaced by internal endpoints with JWT authentication to support the upcoming Cells architecture.
The endpoints in the public API are being removed so that they are not accidentally used again, and to reduce
the maintenance burden as they start to drift in functionality.

You shouldn't experience any impact as a result of this change, as these are endpoints that were used internally.
]]></description>
      <pubDate>Wed, 5 Feb 2025 15:35:26 +1300</pubDate>
    </item>
    <item>
      <title>Dependency Proxy token scope enforcement</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/426887</link>
      <description><![CDATA[The Dependency Proxy for containers accepts `docker login` and `docker pull` requests using personal access tokens or group access tokens without validating their scopes.

In GitLab 18.0, the Dependency Proxy will require both `read_registry` and `write_registry` scopes for authentication. After this change, authentication attempts using tokens without these scopes will be rejected.

This is a breaking change. Before you upgrade, create new access tokens with the <a href="https://docs.gitlab.com/user/packages/dependency_proxy/#authenticate-with-the-dependency-proxy-for-container-images">required scopes</a>, and update your workflow variables and scripts with these new tokens.

To assess how this change impacts your GitLab Self-Managed instance, you can monitor authentication logs for warning messages in GitLab 17.10 and later. In your `auth_json.log` file, look for entries that contain `Dependency proxy missing authentication abilities`. If you're using GitLab Helm charts or GitLab Dedicated, then the logs will be in `component: "gitlab"` and `subcomponent: "auth_json"`. These entries show authentication attempts using tokens without the required scopes, which will fail after upgrading to GitLab 18.0.
]]></description>
      <pubDate>Tue, 4 Feb 2025 22:30:43 +0000</pubDate>
    </item>
    <item>
      <title>Remove duoProAssignedUsersCount GraphQL field</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/498671</link>
      <description><![CDATA[In 18.0 we are removing the `duoProAssignedUsersCount` GraphQL field. Users may experience issues if they are using this field with the <a href="https://docs.gitlab.com/api/graphql/reference/#aimetrics">`aiMetrics` API</a>, and instead they can use the `duoAssignedUsersCount`. This removal is part of the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/485510">fix to count both GitLab Duo Pro and Duo seats assigned users</a>.
]]></description>
      <pubDate>Mon, 3 Feb 2025 13:35:20 +0000</pubDate>
    </item>
    <item>
      <title>Container scanning default severity threshold set to `medium`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/515358</link>
      <description><![CDATA[The container scanning security feature generates a lot of security findings and this volume is often difficult for engineering teams to manage.
By changing the severity threshold to `medium`, we provide a more reasonable default to our users, where any findings with a severity below `medium` are not reported.
Starting with GitLab 18.0, the default value for the `CS_SEVERITY_THRESHOLD` environment variable is set to `medium` instead of `unknown`. As a result, the security findings with the `low` and `unknown`
severity levels will no longer be reported by default. Consequently, any vulnerability with these severities that were previously reported on the default branch will be marked as no longer detected
upon the next execution of container scanning.
To continue showing these findings, you must configure the `CS_SEVERITY_THRESHOLD` variable to the desired level.
]]></description>
      <pubDate>Mon, 3 Feb 2025 00:10:27 +0000</pubDate>
    </item>
    <item>
      <title>GitLab Advanced SAST will be enabled by default</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/513685</link>
      <description><![CDATA[In GitLab 19.0, we will update the <a href="https://docs.gitlab.com/user/application_security/sast#stable-vs-latest-sast-templates">SAST CI/CD templates</a> to enable <a href="https://docs.gitlab.com/user/application_security/sast/gitlab_advanced_sast">GitLab Advanced SAST</a> by default in projects with GitLab Ultimate.
Before this change, the GitLab Advanced SAST analyzer is enabled only if you set the CI/CD variable `GITLAB_ADVANCED_SAST_ENABLED` to `true`.
This change was previously scheduled for GitLab 18.0 and has now been delayed.

Advanced SAST delivers more accurate results by using cross-file, cross-function scanning and a new ruleset.
Advanced SAST takes over coverage for <a href="https://docs.gitlab.com/user/application_security/sast/gitlab_advanced_sast#supported-languages">supported languages</a> and disables scanning for that language in the previous scanner.
An automated process migrates results from previous scanners after the first scan on each project's default branch, if they're still detected.

Because it scans your project in more detail, Advanced SAST may take more time to scan your project.
If needed, you can <a href="https://docs.gitlab.com/user/application_security/sast/gitlab_advanced_sast#disable-gitlab-advanced-sast-scanning">disable GitLab Advanced SAST</a> by setting the CI/CD variable `GITLAB_ADVANCED_SAST_ENABLED` to `false`.
You can set this variable in your project, group, or policy now to prevent Advanced SAST from being enabled by default in GitLab 19.0.
]]></description>
      <pubDate>Fri, 31 Jan 2025 19:26:35 +0000</pubDate>
    </item>
    <item>
      <title>Application Security Testing analyzers major version update</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/513417</link>
      <description><![CDATA[In GitLab 18.0, we will update the major version of all Application Security Testing analyzer container images.

If you are not using the default included templates, or have pinned your analyzer versions, you
must update your CI/CD job definition to either remove the pinned version or update
the latest major version.

Users of GitLab 17.0 to GitLab 17.11 will continue to receive analyzer updates until the
release of GitLab 18.0, after which all newly fixed bugs and released features will be
released only in the new major version of the analyzers.
However, we will not remove any published container images from the container registry.

We do not backport bugs and features to deprecated versions as per our maintenance policy. As
required, security patches will be backported within the latest 3 minor releases.

Specifically, the following analyzers will no longer be updated after the GitLab 18.0 release:

- GitLab Advanced SAST: version 1
- Container scanning: version 7
- Gemnasium: version 5
- DAST: version 5
- DAST API: version 4
- Fuzz API: version 4
- IaC scanning: version 5
- Pipeline secret detection: version 6
- Static application security testing (SAST): version 5 of <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/">all analyzers</a>
  - `kics`
  - `kubesec`
  - `pmd-apex`
  - `semgrep`
  - `sobelow`
  - `spotbugs`
]]></description>
      <pubDate>Wed, 22 Jan 2025 16:13:25 +0000</pubDate>
    </item>
    <item>
      <title>SAST jobs no longer use global cache settings</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/512564</link>
      <description><![CDATA[In GitLab 18.0, we will update SAST and IaC scanning to explicitly <a href="https://docs.gitlab.com/ci/caching/#disable-cache-for-specific-jobs">disable the use of the CI/CD job cache</a> by default.

This change affects the CI/CD templates for:

- SAST: `SAST.gitlab-ci.yml`.
- IaC scanning: `SAST-IaC.gitlab-ci.yml`.

We already updated the `latest` templates `SAST.latest.gitlab-ci.yml` and `SAST-IaC.latest.gitlab-ci.yml`. See <a href="https://docs.gitlab.com/user/application_security/sast/#stable-vs-latest-sast-templates">stable and latest templates</a> for more details on these template versions.

The cache directories are not in scope for scanning in most projects, so fetching the cache can cause timeouts or false-positive results.

If you need to use the cache when scanning a project, you can restore the previous behavior by <a href="https://docs.gitlab.com/user/application_security/sast/#overriding-sast-jobs">overriding</a> the
<a href="https://docs.gitlab.com/ci/yaml/#cache">`cache`</a> property in the project's CI configuration.
]]></description>
      <pubDate>Tue, 21 Jan 2025 15:53:57 +0000</pubDate>
    </item>
    <item>
      <title>Legacy Web IDE is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/513938</link>
      <description><![CDATA[The legacy Vue-based GitLab Web IDE implementation will be removed from GitLab.
This change follows our successful transition to the GitLab VSCode Fork-based Web IDE,
which has been the default Web IDE experience since GitLab 15.11.

This removal affects users who are still accessing the legacy Web IDE implementation.

To prepare for this removal, enable the `vscode_web_ide` feature flag on your GitLab instance
if it was previously disabled in the GitLab instance.
]]></description>
      <pubDate>Mon, 20 Jan 2025 09:30:43 +0000</pubDate>
    </item>
    <item>
      <title>`git_data_dirs` for configuring Gitaly storages</title>
      <link>https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8786</link>
      <description><![CDATA[Support for using `git_data_dirs` to configure Gitaly storages for Linux package instances has been deprecated
<a href="https://docs.gitlab.com/update/versions/gitlab_16_changes/#gitaly-configuration-structure-change">since 16.0</a> and will be removed in 18.0.

For migration instructions, see
<a href="https://docs.gitlab.com/omnibus/settings/configuration/#migrating-from-git_data_dirs">Migrating from `git_data_dirs`</a>.
]]></description>
      <pubDate>Tue, 14 Jan 2025 23:27:43 +0000</pubDate>
    </item>
    <item>
      <title>Enforce keyset pagination on audit event API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/382338</link>
      <description><![CDATA[The Audit Event APIs for instances, groups, and projects currently support optional keyset pagination. In GitLab 20.0
we will enforce keyset pagination on these APIs.
]]></description>
      <pubDate>Fri, 10 Jan 2025 01:51:47 +0000</pubDate>
    </item>
    <item>
      <title>`scanResultPolicies` GraphQL field is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/439199</link>
      <description><![CDATA[In 16.10, scan result policies were renamed to merge request approval policies to more accurately reflect the change in scope and capability for the policy type.

As a result, we updated the GraphQL endpoints. Use `approvalPolicies` instead of `scanResultPolicies`.
]]></description>
      <pubDate>Fri, 3 Jan 2025 19:46:17 +0000</pubDate>
    </item>
    <item>
      <title>Limit number of scan execution policy actions allowed per policy</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/510897</link>
      <description><![CDATA[New limits have been added for maximum scan execution policy actions allowed per policy. This change was introduced in 17.4 behind feature flags `scan_execution_policy_action_limit` and `scan_execution_policy_action_limit_group`. When enabled, only the first 10 actions of a scan execution policy are processed.

By adding limits, we can ensure performance and scalability for security policies.

If additional actions are needed, limit existing polices to no more than 10 actions. Then, create new scan execution policies with additional actions, within the limit of 5 scan execution policies per security policy project.

For GitLab Self-Managed and GitLab Dedicated administrators, you can configure a custom limit with the `scan_execution_policies_action_limit` application setting.
]]></description>
      <pubDate>Fri, 3 Jan 2025 16:15:05 +0000</pubDate>
    </item>
    <item>
      <title>Behavior change for Upcoming and Started milestone filters</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/501294</link>
      <description><![CDATA[The behavior of "Upcoming" and "Started" special filters is planned to change in upcoming GitLab major release 18.0.
The new behavior of both the filters is outlined in
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/429728#proposed-issue-filter-logic-for-upcoming-and-started-milestones">issue 429728</a>.

This change does not impact the GitLab REST API, which will continue to use the existing milestone filtering logic.
The GitLab GraphQL API will be updated to adhere to the new filtering logic.
]]></description>
      <pubDate>Mon, 9 Dec 2024 16:10:41 +0000</pubDate>
    </item>
    <item>
      <title>Deprecation of `STORAGE` enum in `NamespaceProjectSortEnum` GraphQL API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/396284</link>
      <description><![CDATA[The `STORAGE` enum in `NamespaceProjectSortEnum` of the GitLab GraphQL API will be removed in GitLab 18.0.

To prepare for this change, we recommend reviewing and updating your GraphQL queries that interact with the `NamespaceProjectSortEnum`. Replace any references to the `STORAGE` field with `EXCESS_REPO_STORAGE_SIZE_DESC`.
]]></description>
      <pubDate>Thu, 21 Nov 2024 15:18:04 +0000</pubDate>
    </item>
    <item>
      <title>Pipeline job limits extended to the Commits API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/436361</link>
      <description><![CDATA[Starting in GitLab 18.0, the maximum <a href="https://docs.gitlab.com/administration/instance_limits/#number-of-jobs-in-active-pipelines">number of jobs in active pipelines</a> will also apply when creating jobs using the <a href="https://docs.gitlab.com/api/commits/#set-the-pipeline-status-of-a-commit">Commits API</a>. Review your integration to ensure it stays within the configured job limits.
]]></description>
      <pubDate>Thu, 21 Nov 2024 00:33:55 +0000</pubDate>
    </item>
    <item>
      <title>Increased default security for use of pipeline variables</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/502382</link>
      <description><![CDATA[GitLab believes in secure-by-default practices. To honor this, we are making some changes to support least privilege principles relating to the use of CI/CD variables.
Today, users with the Developer role or higher are able to use <a href="https://docs.gitlab.com/ci/variables/#use-pipeline-variables">pipeline variables</a> by default, without any verification or opt-in.

You can already start using a more secure-by-default experience for pipeline variables by raising the minimum role to the recommended <a href="https://docs.gitlab.com/ci/variables/#restrict-pipeline-variables">Owner only, or no one</a>.
Starting in 17.7, `no one allowed` is the default for all new projects in new namespaces on GitLab.com.
]]></description>
      <pubDate>Wed, 20 Nov 2024 10:46:37 +0000</pubDate>
    </item>
    <item>
      <title>Deprecation of `name` field in `ProjectMonthlyUsageType` GraphQL API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/381894</link>
      <description><![CDATA[The `name` field in the `ProjectMonthlyUsageType` of the GitLab GraphQL API will be removed in GitLab 18.0.

To prepare for this change, we recommend reviewing and updating your GraphQL queries that interact with the `ProjectMonthlyUsageType`. Replace any references to the `name` field with `project.name`.
]]></description>
      <pubDate>Mon, 18 Nov 2024 17:39:46 +0000</pubDate>
    </item>
    <item>
      <title>Fallback support for GitLab NGINX chart controller image v1.3.1</title>
      <link>https://gitlab.com/gitlab-org/charts/gitlab/-/issues/5794</link>
      <description><![CDATA[> [!note]
> This change affects you only if you're using the <a href="https://docs.gitlab.com/charts/charts/nginx/">GitLab NGINX chart</a>,
> and you have set your own NGINX RBAC rules.
>
> If you're using your own <a href="https://docs.gitlab.com/charts/advanced/external-nginx/">external NGINX chart</a>,
> or you're using the GitLab NGINX chart without any NGINX RBAC rules changes, this deprecation doesn't apply to you.

In GitLab 17.6 (Helm chart 8.6), the GitLab chart updated the default NGINX
controller image from version 1.3.1 to 1.11.2. This new version requires new
RBAC rules that were added to our GitLab NGINX chart, so you'll need to
ultimately create those rules. This change is also backported to:

- GitLab 17.5.1 (Helm chart 8.5.1)
- GitLab 17.4.3 (Helm chart 8.4.3)
- GitLab 17.3.6 (Helm chart 8.3.6)

> [!note]
> The latest patch versions of Helm chart 8.3 to 8.7 contain the NGINX controller version 1.11.2.
> Later chart versions include version 1.11.5, since it contains various
> security fixes. GitLab 18.0 will default to controller version 1.11.5.

If you manage your own NGINX RBAC rules, it means that you have set
`nginx-ingress.rbac.create` to `false`. In that case, from GitLab 17.3 (Helm
chart 8.3) up until GitLab 17.11 (Helm chart 8.11), there's a fallback
mechanism that detects that change and uses the old controller image,
which means you don't need to make any RBAC rules changes.

Starting with GitLab 18.0 (Helm chart 9.0), this fallback mechanism will
be removed, so the new controller image will be used and the new RBAC
rules must exist.

If you want to take advantage of the new NGINX controller image before it's
enforced in GitLab 18.0:

1. Add the new RBAC rules to your cluster <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/3901/diffs?commit_id=93a3cbdb5ad83db95e12fa6c2145df0800493d8b">see an example</a>.
1. Set `nginx-ingress.controller.image.disableFallback` to `true`.

For more information, see the <a href="https://docs.gitlab.com/charts/releases/8_0/#upgrade-to-86x-851-843-836">charts release page</a>.
]]></description>
      <pubDate>Fri, 8 Nov 2024 00:10:58 +0000</pubDate>
    </item>
    <item>
      <title>Removal of `migrationState` field in `ContainerRepository` GraphQL API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/459869</link>
      <description><![CDATA[The `migrationState` field in the `ContainerRepositoryType` of the GitLab GraphQL API is deprecated. This deprecation is part of our efforts to streamline and improve our API.

To prepare for this change, we recommend reviewing and updating your GraphQL queries that interact with the `ContainerRepositoryType`. Remove any references to the `migrationState` field and adjust your application logic accordingly.
]]></description>
      <pubDate>Thu, 7 Nov 2024 01:05:28 +0000</pubDate>
    </item>
    <item>
      <title>GitLab Runner Docker Machine executor is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/498268</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/runner/executors/docker_machine/">GitLab Runner Docker Machine executor</a> is deprecated and will be fully removed from the product as a supported feature in GitLab 20.0 (May 2027). The replacement for Docker Machine, <a href="https://docs.gitlab.com/runner/runner_autoscale/">GitLab Runner Autoscaler</a> with GitLab developed plugins for Amazon Web Services (AWS) EC2, Google Compute Engine (GCE) and Microsoft Azure virtual machines (VMs) is generally available. With this announcement, the GitLab Runner team will no longer accept community contributions for the GitLab maintained Docker Machine fork, or resolve newly identified bugs.
]]></description>
      <pubDate>Thu, 10 Oct 2024 17:21:51 +0000</pubDate>
    </item>
    <item>
      <title>`mergeTrainIndex` and `mergeTrainsCount` GraphQL fields deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/473759</link>
      <description><![CDATA[The GraphQL field `mergeTrainIndex` and `mergeTrainsCount` in `MergeRequest` are deprecated. To
determine the position of the merge request on the merge train use the
`index` field in `MergeTrainCar` instead. To get the count of MRs in a merge train,
use `count` from `cars` in `MergeTrains::TrainType` instead.
]]></description>
      <pubDate>Thu, 10 Oct 2024 02:03:38 +0000</pubDate>
    </item>
    <item>
      <title>Replace GraphQL field `take_ownership_pipeline_schedule` with `admin_pipeline_schedule` in PipelineSchedulePermissions</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/391941</link>
      <description><![CDATA[The GraphQL field `take_ownership_pipeline_schedule` will be deprecated. To
determine if a user can take ownership of a pipeline schedule, use the
`admin_pipeline_schedule` field instead.
]]></description>
      <pubDate>Tue, 1 Oct 2024 19:56:52 +0000</pubDate>
    </item>
    <item>
      <title>`ciJobTokenScopeAddProject` GraphQL mutation is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/474175</link>
      <description><![CDATA[With the <a href="https://docs.gitlab.com/update/deprecations/#default-cicd-job-token-ci_job_token-scope-changed">upcoming default behavior change to the CI/CD job token</a> in GitLab 18.0, we are also deprecating the associated `ciJobTokenScopeAddProject` GraphQL mutation in favor of `ciJobTokenScopeAddGroupOrProject`.
]]></description>
      <pubDate>Thu, 26 Sep 2024 06:26:42 +0000</pubDate>
    </item>
    <item>
      <title>Replace namespace `add_on_purchase` GraphQL field with `add_on_purchases`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/489850</link>
      <description><![CDATA[The namespace GraphQL field `add_on_purchase` will be deprecated in GitLab 17.5 and removed in GitLab 18.0. Use the root `add_on_purchases` field instead.
]]></description>
      <pubDate>Mon, 16 Sep 2024 18:37:48 +0200</pubDate>
    </item>
    <item>
      <title>Replace `add_on_purchase` GraphQL field with `add_on_purchases`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/476858</link>
      <description><![CDATA[The GraphQL field `add_on_purchase` will be deprecated in GitLab 17.4 and removed in GitLab 18.0. Use the `add_on_purchases` field instead.
]]></description>
      <pubDate>Fri, 13 Sep 2024 14:03:42 +0000</pubDate>
    </item>
    <item>
      <title>The `heroku/builder:22` image is deprecated</title>
      <link>https://gitlab.com/gitlab-org/cluster-integration/auto-build-image/-/issues/79</link>
      <description><![CDATA[The cloud native buildpack (CNB) builder image was updated to `heroku/builder:24` in the Auto DevOps Build project. While we don't expect the changes to be disruptive for the most part, this might be a breaking change for some users of Auto DevOps, and especially users of Auto Build. To better understand the impact of you workloads, review the following:

- <a href="https://devcenter.heroku.com/articles/heroku-24-stack#what-s-new">Heroku-24 stack release notes</a>
- <a href="https://devcenter.heroku.com/articles/heroku-24-stack#upgrade-notes">Heroku-24 stack upgrade notes</a>
- <a href="https://devcenter.heroku.com/articles/stack-packages">Heroku stack packages</a>

These changes affect you if your pipelines use the <a href="https://gitlab.com/gitlab-org/cluster-integration/auto-build-image">`auto-build-image`</a> provided by <a href="https://docs.gitlab.com/topics/autodevops/stages/#auto-build">the Auto Build stage of Auto DevOps</a>.

To continue to use `heroku/builder:22` after GitLab 19.0, set `AUTO_DEVOPS_BUILD_IMAGE_CNB_BUILDER` to `heroku/builder:22`.
]]></description>
      <pubDate>Wed, 11 Sep 2024 21:18:35 +0000</pubDate>
    </item>
    <item>
      <title>Public use of Secure container registries is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/470641</link>
      <description><![CDATA[Container registries under `registry.gitlab.com/gitlab-org/security-products/`
are no longer accessible in GitLab 18.0. <a href="https://docs.gitlab.com/update/deprecations/#secure-and-protect-analyzer-images-published-in-new-location">Since GitLab 14.8</a>
the correct location is under `registry.gitlab.com/security-products` (note the absence of
`gitlab-org` in the address).

This change improves the security of the release process for GitLab <a href="https://docs.gitlab.com/user/application_security/#vulnerability-scanner-maintenance">vulnerability scanners</a>.

Users are advised to use the equivalent registry under `registry.gitlab.com/security-products/`,
which is the canonical location for GitLab security scanner images. The relevant GitLab CI
templates already use this location, so no changes should be necessary for users that use the
unmodified templates.

Offline deployments should review the <a href="https://docs.gitlab.com/user/application_security/offline_deployments/#specific-scanner-instructions">specific scanner instructions</a>
to ensure the correct locations are being used to mirror the required scanner images.
]]></description>
      <pubDate>Tue, 3 Sep 2024 09:30:42 +1000</pubDate>
    </item>
    <item>
      <title>Rate limits for common User, Project, and Group API endpoints</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/480914</link>
      <description><![CDATA[Rate limits will be enabled by default for commonly used <a href="https://docs.gitlab.com/administration/settings/user_and_ip_rate_limits/">User</a>,
<a href="https://docs.gitlab.com/administration/settings/rate_limit_on_projects_api/">Project</a>, and <a href="https://docs.gitlab.com/administration/settings/rate_limit_on_groups_api/">Group</a> endpoints.
Enabling these rate limits by default can help improve overall system stability,
by reducing the potential for heavy API usage to negatively impact the broader user experience. Requests made above the rate
limit will return an <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429">HTTP 429</a> error code and <a href="https://docs.gitlab.com/administration/settings/user_and_ip_rate_limits/#response-headers">additional rate limit headers</a>.

The default rate limits have been intentionally set fairly high to not disrupt most usage, based on the request rates we see on GitLab.com.
Instance administrators can set higher or lower limits as needed in the Admin area, similarly to other rate limits already in place.
]]></description>
      <pubDate>Mon, 2 Sep 2024 12:50:39 +0000</pubDate>
    </item>
    <item>
      <title>CodeClimate-based Code Quality scanning will be removed</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/471677</link>
      <description><![CDATA[In GitLab 19.0, we will remove CodeClimate-based Code Quality scanning.
This change was previously scheduled for GitLab 18.0 and has now been delayed.

In its place, you should use quality tools directly in your CI/CD pipeline and <a href="https://docs.gitlab.com/ci/testing/code_quality/#import-code-quality-results-from-a-cicd-job">provide the tool's report as an artifact</a>.
We've already documented how to integrate many tools directly, and you can integrate them by following the <a href="https://docs.gitlab.com/ci/testing/code_quality/#integrate-common-tools-with-code-quality">documentation</a>.

We expect to implement this change by:

1. Changing the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/Code-Quality.gitlab-ci.yml">`Code-Quality.gitlab-ci.yml` CI/CD template</a> to no longer execute scans. Today, this template runs CodeClimate-based scans. (We plan to change the template rather than delete it to reduce the impact on any pipelines that still `include` the template after 19.0.)
1. No longer running CodeClimate-based scanning as part of Auto DevOps.

Effective immediately, CodeClimate-based scanning will receive only <a href="https://docs.gitlab.com/update/terminology/#deprecation">limited updates</a>.
After End of Support in GitLab 19.0, we won't provide further updates.
However, we won't delete previously published container images or remove the ability to run them by using custom CI/CD pipeline job definitions.

For more details, see <a href="https://docs.gitlab.com/ci/testing/code_quality/#scan-code-for-quality-violations">Scan code for quality violations</a>.
]]></description>
      <pubDate>Fri, 2 Aug 2024 02:23:15 +0000</pubDate>
    </item>
    <item>
      <title>Compliance pipelines</title>
      <link>https://gitlab.com/groups/gitlab-org/-/epics/11275</link>
      <description><![CDATA[Currently, there are two ways to ensure that compliance- or security-related jobs are run in a project pipeline:

- <a href="https://docs.gitlab.com/user/compliance/compliance_pipelines/">Compliance pipelines</a>.
- <a href="https://docs.gitlab.com/user/application_security/policies/">Security policies</a>.

To provide a single place for ensuring required jobs are run in all pipelines for a project, we have deprecated
compliance pipelines in GitLab 17.3 and will remove the feature in GitLab 20.0.

Customers should migrate from compliance pipelines to the new
<a href="https://docs.gitlab.com/user/application_security/policies/pipeline_execution_policies/">pipeline execution policy type</a>
as soon as possible.

For more information, see the relevant:

- <a href="https://docs.gitlab.com/user/compliance/compliance_pipelines/#pipeline-execution-policies-migration">Migration guide</a>.
- <a href="https://about.gitlab.com/blog/why-gitlab-is-deprecating-compliance-pipelines-in-favor-of-security-policies/">Blog post</a>.
]]></description>
      <pubDate>Mon, 29 Jul 2024 00:40:20 +0000</pubDate>
    </item>
    <item>
      <title>OpenTofu CI/CD template</title>
      <link>https://gitlab.com/components/opentofu/-/issues/43#note_1913822299</link>
      <description><![CDATA[We introduced the OpenTofu CI/CD template in 16.8 as CI/CD components were not available for GitLab Self-Managed yet.
With the introduction of <a href="https://docs.gitlab.com/ci/components/#use-a-gitlabcom-component-in-a-self-managed-instance">GitLab CI/CD components for GitLab Self-Managed</a>
we are removing the redundant OpenTofu CI/CD templates in favor of the CI/CD components.

For information about migrating from the CI/CD template to the component, see the <a href="https://gitlab.com/components/opentofu#usage-on-self-managed">OpenTofu component documentation</a>.
]]></description>
      <pubDate>Wed, 22 May 2024 16:40:00 +0000</pubDate>
    </item>
    <item>
      <title>Remove `previousStageJobsOrNeeds` from GraphQL</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/424417</link>
      <description><![CDATA[The `previousStageJobsOrNeeds` field in GraphQL will be removed as it has been replaced by the `previousStageJobs` and `needs` fields.
]]></description>
      <pubDate>Thu, 9 May 2024 04:27:36 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL API access through unsupported methods</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/442520</link>
      <description><![CDATA[From GitLab 17.0, we limiting access to GraphQL to only through the
<a href="https://docs.gitlab.com/api/graphql/#token-authentication">already documented supported token types</a>.

For customers already using documented and supported token types, there are no breaking changes.
]]></description>
      <pubDate>Tue, 30 Apr 2024 22:13:54 +0000</pubDate>
    </item>
    <item>
      <title>`omnibus_gitconfig` configuration item is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitaly/-/issues/5132</link>
      <description><![CDATA[The `omnibus_gitconfig['system']` configuration item has been deprecated. If you use
`omnibus_gitconfig['system']` to set custom Git configuration for Gitaly, you must configure Git
directly through Gitaly configuration under `gitaly[:configuration][:git][:config]` before upgrading to GitLab 17.0.

For example:

```ruby
  gitaly[:configuration][:git][:config] = [
    {
      key: 'fetch.fsckObjects',
      value: 'true',
    },
    # ...
  ]
```

The format of the configuration keys must match what is passed to `git` through the CLI flag `git -c <configuration>`.

If you have trouble converting the existing keys to the expected format, see the existing keys in the correct format in
the Linux package-generated configuration file of Gitaly. By default, the configuration file is located at
`/var/opt/gitlab/gitaly/config.toml`.

The following configuration options that are managed by Gitaly should be removed. These keys do not need to be migrated
to Gitaly:

- `pack.threads=1`
- `receive.advertisePushOptions=true`
- `receive.fsckObjects=true`
- `repack.writeBitmaps=true`
- `transfer.hideRefs=^refs/tmp/`
- `transfer.hideRefs=^refs/keep-around/`
- `transfer.hideRefs=^refs/remotes/`
- `core.alternateRefsCommand="exit 0 #"`
- `core.fsyncObjectFiles=true`
- `fetch.writeCommitGraph=true`
]]></description>
      <pubDate>Tue, 12 Mar 2024 13:54:36 -0700</pubDate>
    </item>
    <item>
      <title>Duplicate storages in Gitaly configuration</title>
      <link>https://gitlab.com/gitlab-org/gitaly/-/issues/5598</link>
      <description><![CDATA[Support for configuring multiple Gitaly storages that point to the same storage path is deprecated and will be removed in GitLab 17.0
In GitLab 17.0 and later, this type of configuration will cause an error.

We're removing support for this type of configuration because it can cause problems with background repository
maintenance and will not be compatible with future Gitaly storage implementations.

Instance administrators must update the `storage` entries of the `gitaly['configuration']`
section in `gitlab.rb` configuration file to ensure each storage is configured with a unique path.
]]></description>
      <pubDate>Mon, 11 Mar 2024 20:05:44 +0000</pubDate>
    </item>
    <item>
      <title>Scan execution policies using `_EXCLUDED_ANALYZERS` variable override project variables</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/424513</link>
      <description><![CDATA[After delivering and verifying <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/424028">Enforce SEP variables with the highest precedence</a>, we have discovered unintended behavior, allowing users to set `_EXCLUDED_PATHS` in pipeline configuration and preventing them from setting `_EXCLUDED_ANALYZERS` in both policy and pipeline configuration.

To ensure proper enforcement of scan execution variables, when an `_EXCLUDED_ANALYZERS` or `_EXCLUDED_PATHS` variables are specified for a scan execution policy using the GitLab scan action, the variable will now override any project variables defined for excluded analyzers.

Users may enable the feature flag to enforce this behavior before 17.0. In 17.0, projects leveraging the `_EXCLUDED_ANALYZERS`/`_EXCLUDED_PATHS` variable where a scan execution policy with the variable is defined will be overridden by default.
]]></description>
      <pubDate>Thu, 22 Feb 2024 23:35:52 +0000</pubDate>
    </item>
    <item>
      <title>SAST analyzer coverage changing in GitLab 17.0</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/412060</link>
      <description><![CDATA[We're reducing the number of supported <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/">analyzers</a> used by default in GitLab SAST.
This is part of our long-term strategy to deliver a faster, more consistent user experience across different programming languages.

In GitLab 17.0, we will:

1. Remove a set of language-specific analyzers from the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/SAST.gitlab-ci.yml">SAST CI/CD template</a> and replace their coverage with <a href="https://docs.gitlab.com/user/application_security/sast/rules/">GitLab-supported detection rules</a> in the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/semgrep">Semgrep-based analyzer</a>. The following analyzers are now deprecated and will reach End of Support in GitLab 17.0:
   1. <a href="https://gitlab.com/gitlab-org/security-products/analyzers/brakeman">Brakeman</a> (Ruby, Ruby on Rails)
   1. <a href="https://gitlab.com/gitlab-org/security-products/analyzers/flawfinder">Flawfinder</a> (C, C++)
   1. <a href="https://gitlab.com/gitlab-org/security-products/analyzers/mobsf">MobSF</a> (Android, iOS)
   1. <a href="https://gitlab.com/gitlab-org/security-products/analyzers/nodejs-scan">NodeJS Scan</a> (Node.js)
   1. <a href="https://gitlab.com/gitlab-org/security-products/analyzers/phpcs-security-audit">PHPCS Security Audit</a> (PHP)
1. Change the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/SAST.gitlab-ci.yml">SAST CI/CD template</a> to stop running the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/spotbugs">SpotBugs-based analyzer</a> for Kotlin and Scala code. These languages will instead be scanned using <a href="https://docs.gitlab.com/user/application_security/sast/rules/">GitLab-supported detection rules</a> in the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/semgrep">Semgrep-based analyzer</a>.

Effective immediately, the deprecated analyzers will receive only security updates; other routine improvements or updates are not guaranteed.
After the analyzers reach End of Support in GitLab 17.0, no further updates will be provided.
However, we won't delete container images previously published for these analyzers or remove the ability to run them by using custom CI/CD pipeline job definitions.

The vulnerability management system will update most existing findings so that they're matched with the new detection rules.
Findings that aren't migrated to the new analyzer will be <a href="https://docs.gitlab.com/user/application_security/sast/#automatic-vulnerability-resolution">automatically resolved</a>.
See <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/#vulnerability-translation">Vulnerability translation documentation</a> for further details.

If you applied customizations to the removed analyzers, or if you currently disable the Semgrep-based analyzer in your pipelines, you must take action as detailed in the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/412060#action-required">deprecation issue for this change</a>.
]]></description>
      <pubDate>Fri, 16 Feb 2024 23:33:08 +0000</pubDate>
    </item>
    <item>
      <title>Upgrading the operating system version of GitLab.com runners on Linux</title>
      <link>https://gitlab.com/gitlab-org/ci-cd/shared-runners/infrastructure/-/issues/60</link>
      <description><![CDATA[GitLab is upgrading the container-optimized operating system (COS) of the ephemeral VMs used to execute jobs for GitLab.com runners on Linux.
That COS upgrade includes a Docker Engine upgrade from Version 19.03.15 to Version 23.0.5, which introduces a known compatibility issue.

Docker-in-Docker prior to version 20.10 or Kaniko images older than v1.9.0, will be unable to detect the container runtime and fail.

For more information, see <a href="https://about.gitlab.com/blog/updating-the-os-version-of-saas-runners-on-linux/">Upgrading the operating system version of our SaaS runners on Linux</a>.
]]></description>
      <pubDate>Wed, 14 Feb 2024 09:08:41 +0000</pubDate>
    </item>
    <item>
      <title>Removal of tags from small GitLab.com runners on Linux</title>
      <link>https://gitlab.com/gitlab-org/gitlab-runner/-/issues/30829</link>
      <description><![CDATA[Due to historical reasons, small Linux GitLab.com Runners had a lot of tags attached because they were used as labels. We want to streamline the tag to just use `saas-linux-small-amd64` and be consistent across all GitLab.com runners.

We are deprecating the tags: `docker`, `east-c`, `gce`, `git-annex`, `linux`, `mongo`, `mysql`, `postgres`, `ruby`, `shared`.

For more information, see <a href="https://about.gitlab.com/blog/removing-tags-from-small-saas-runner-on-linux/">Removing tags from our small SaaS runner on Linux</a>.
]]></description>
      <pubDate>Wed, 14 Feb 2024 09:07:20 +0000</pubDate>
    </item>
    <item>
      <title>Deprecating Windows Server 2019 in favor of 2022</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/438554</link>
      <description><![CDATA[We have recently announced the release of Windows Server 2022 for our GitLab.com runners on Windows (Beta). With it, we are deprecating Windows 2019 in GitLab 17.0.

For more information about how to migrate to using Windows 2022, see <a href="https://about.gitlab.com/blog/windows-2022-support-for-gitlab-saas-runners/">Windows 2022 support for GitLab.com runners now available</a>.
]]></description>
      <pubDate>Wed, 14 Feb 2024 09:04:26 +0000</pubDate>
    </item>
    <item>
      <title>npm package uploads now occur asynchronously</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/433009</link>
      <description><![CDATA[The GitLab package registry supports npm and Yarn. When you upload an npm or Yarn package, the upload is synchronous. However, there are known issues with synchronous uploads. For example, GitLab doesn't support features like <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/432876">overrides</a>.

From 17.0, npm and Yarn packages will be uploaded asynchronously. This is a breaking change because you might have pipelines that expect the package to be available as soon as it's published.

As a workaround, you should use the <a href="https://docs.gitlab.com/api/packages/">packages API</a> to check for packages.
]]></description>
      <pubDate>Mon, 12 Feb 2024 15:52:58 +0000</pubDate>
    </item>
    <item>
      <title>`repository_download_operation` audit event type for public projects</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/383218</link>
      <description><![CDATA[The audit event type `repository_download_operation` is currently saved to the database for all project downloads, both public projects and private projects. For
public projects, this audit event is not the most useful for auditing purposes because it can be triggered by non-authenticated users.

From GitLab 17.0, the `repository_download_operation` audit event type will only be triggered for private or internal projects. We will add a new audit event type
called `public_repository_download_operation` for public project downloads. This new audit event type will be streaming only.
]]></description>
      <pubDate>Mon, 12 Feb 2024 00:02:28 +0000</pubDate>
    </item>
    <item>
      <title>Compliance framework in general settings</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/422783</link>
      <description><![CDATA[We moved compliance framework management to the framework and projects reports in the
<a href="https://docs.gitlab.com/user/compliance/compliance_center/">Compliance Center</a>.

Therefore, in GitLab 17.0, we are removing the management of compliance frameworks from the **General** settings page of groups and projects.
]]></description>
      <pubDate>Mon, 12 Feb 2024 09:45:31 +1000</pubDate>
    </item>
    <item>
      <title>Deprecate Grype scanner for container scanning</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/439164</link>
      <description><![CDATA[Support for the Grype scanner in the GitLab container scanning analyzer is deprecated in
GitLab 16.9.

From GitLab 17.0, the Grype analyzer will no longer be maintained, except for limited fixes as
explained in our <a href="https://about.gitlab.com/support/statement-of-support/#version-support">statement of support</a>.

Users are advised to use the default setting for `CS_ANALYZER_IMAGE`, which uses the Trivy
scanner.

The existing current major version for the Grype analyzer image will continue to be updated
with the latest advisory database, and operating system packages until GitLab 19.0, at which
point the analyzer will stop working.

To continue to use Grype past 19.0, see the <a href="https://docs.gitlab.com/development/integrations/secure/">Security scanner integration documentation</a>
to learn how to create your own integration with GitLab.
]]></description>
      <pubDate>Fri, 9 Feb 2024 23:08:13 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate License Scanning CI/CD artifact report type</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/439301</link>
      <description><![CDATA[The CI/CD <a href="https://docs.gitlab.com/ci/yaml/artifacts_reports/">artifact report</a> type is deprecated in GitLab 16.9, and will be removed in GitLab 18.0. CI/CD configurations using this keyword will stop working in GitLab 18.0.

The artifact report type is no longer used because of the removal of the legacy License Scanning CI/CD job in GitLab 16.3.
Instead, you should use <a href="https://docs.gitlab.com/user/compliance/license_scanning_of_cyclonedx_files/">License scanning of CycloneDX files</a>.
]]></description>
      <pubDate>Fri, 9 Feb 2024 22:52:35 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate Python 3.9 in dependency scanning and license scanning</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/441201</link>
      <description><![CDATA[From GitLab 16.9, dependency scanning and license scanning support for Python 3.9 is deprecated. In GitLab 17.0, Python 3.10 is the default version for the dependency scanning CI/CD job.

From GitLab 17.0, dependency scanning and license scanning features won't support projects that require Python 3.9 without a
<a href="https://docs.gitlab.com/user/application_security/dependency_scanning/#obtaining-dependency-information-by-parsing-lockfiles">compatible lockfile</a>.
]]></description>
      <pubDate>Fri, 9 Feb 2024 22:38:35 +0000</pubDate>
    </item>
    <item>
      <title>`dependency_files` is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/396376</link>
      <description><![CDATA[Today in GitLab, a project's dependency list is generated using content from `dependency_files` in the dependency scanning report. However, to maintain consistency with the group dependency list, starting with GitLab 17.0, the project's dependency list will use CycloneDX SBOM report artifacts, stored in the PostgreSQL database. As such, the `dependency_files` property of the dependency scanning report schema is deprecated, and will be removed in 17.0.

As a part of this deprecation, the <a href="https://docs.gitlab.com/user/application_security/dependency_list/#dependency-paths">`dependency_path`</a> will also be deprecated and removed in 17.0. GitLab will move forward with the implementation of the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/441118">dependency graph using the CycloneDX specification</a> to provide similar information.

Additionally, the container scanning CI job <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/439782">will no longer produce a dependency scanning report</a> to provide the list of Operating System components as this is replaced with the CycloneDX SBOM report. The `CS_DISABLE_DEPENDENCY_LIST` environment variable for container scanning is no longer in use and will also be removed in 17.0.
]]></description>
      <pubDate>Fri, 9 Feb 2024 21:15:57 +0000</pubDate>
    </item>
    <item>
      <title>Autogenerated Markdown anchor links with dash (`-`) characters</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/440733</link>
      <description><![CDATA[GitLab automatically creates anchor links for all headings, so you can link to
a specific place in a Markdown document or wiki page. But in some edge cases,
the autogenerated anchor is created with fewer dash (`-`) characters than many users expect.
For example, with a heading with `## Step - 1`, most other Markdown tools and linters would expect `#step---1`.
But GitLab generates an anchor of `#step-1`, with consecutive dashes compressed down to one.

In GitLab 17.0, we will align our autogenerated anchors to the industry standard by no longer stripping consecutive dashes.
If you have Markdown documents and link to headings that could have multiple dashes in 17.0,
you should update the heading to avoid this edge case. With the example above, you
can change `## Step - 1` to `## Step 1` to ensure in-page links continue to work.
]]></description>
      <pubDate>Fri, 9 Feb 2024 16:27:29 +0000</pubDate>
    </item>
    <item>
      <title>Security policy field `match_on_inclusion` is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/424513</link>
      <description><![CDATA[In <a href="https://gitlab.com/groups/gitlab-org/-/epics/6826#note_1341377224">Support additional filters for scan result policies</a>, we broke the `newly_detected` field into two options: `new_needs_triage` and `new_dismissed`. By including both options in the security policy YAML, you will achieve the same result as the original `newly_detected` field. However, you may now narrow your filter to ignore findings that have been dismissed by only using `new_needs_triage`.
Based on discussion in <a href="https://gitlab.com/groups/gitlab-org/-/epics/10203#note_1545826313">epic 10203</a>, we have changed the name of the `match_on_inclusion` field to `match_on_inclusion_license` for more clarity in the YAML definition.
]]></description>
      <pubDate>Fri, 9 Feb 2024 01:20:05 +0000</pubDate>
    </item>
    <item>
      <title>Min concurrency and max concurrency in Sidekiq options</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/439687</link>
      <description><![CDATA[For Linux package (Omnibus) installations, the [`sidekiq['min_concurrency']` and `sidekiq['max_concurrency']`](https://docs.gitlab.com/administration/sidekiq/extra_sidekiq_processes/#manage-thread-counts-explicitly) settings are deprecated in GitLab 16.9 and will be removed in GitLab 17.0.

You can use `sidekiq['concurrency']` in GitLab 16.9 and later to set thread counts explicitly in each process.

The above change only applies to Linux package (Omnibus) installations.

For GitLab Helm chart installations, passing `SIDEKIQ_CONCURRENCY_MIN` and/or `SIDEKIQ_CONCURRENCY_MAX` as `extraEnv` to the `sidekiq` sub-chart is deprecated in GitLab 16.10 and will be removed in GitLab 17.0.

You can use the `concurrency` option to set thread counts explicitly in each process.
]]></description>
      <pubDate>Wed, 7 Feb 2024 22:32:22 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate `fmt` job in Terraform Module CI/CD template</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/440249</link>
      <description><![CDATA[The `fmt` job in the Terraform Module CI/CD templates is deprecated and will be removed in GitLab 17.0.
This affects the following templates:

- `Terraform-Module.gitlab-ci.yml`
- `Terraform/Module-Base.gitlab-ci.yml`

You can manually add back a Terraform `fmt` job to your pipeline using:

```yaml
fmt:
  image: hashicorp/terraform
  script: terraform fmt -chdir "$TF_ROOT" -check -diff -recursive
```

You can also use the `fmt` template from the <a href="https://gitlab.com/components/opentofu">OpenTofu CI/CD component</a>.
]]></description>
      <pubDate>Tue, 6 Feb 2024 08:18:07 +0100</pubDate>
    </item>
    <item>
      <title>`omniauth-azure-oauth2` gem is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/408989</link>
      <description><![CDATA[GitLab users can use the `omniauth-azure-oauth2` gem to authenticate with GitLab. In 17.0, this gem will be replaced with the `omniauth_openid_connect` gem. The new gem contains all of the same features as the old gem, but also has upstream maintenance and is better for security and centralized maintenance.

This change requires that users re-connect to the OAuth 2.0 provider at time of migration. To avoid disruption, <a href="https://docs.gitlab.com/administration/auth/oidc/#configure-multiple-openid-connect-providers">add `omniauth_openid_connect` as a new provider</a> any time before 17.0. Users will see a new login button and have to manually reconnect their credentials. If you do not implement the `omniauth_openid_connect` gem before 17.0, users will no longer be able to sign in using the Azure login button, and will have to sign in using their username and password, until the correct gem is implemented by the administrator.
]]></description>
      <pubDate>Thu, 1 Feb 2024 15:47:29 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate Terraform CI/CD templates</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/438010</link>
      <description><![CDATA[The Terraform CI/CD templates are deprecated and will be removed in GitLab 18.0.
This affects the following templates:

- `Terraform.gitlab-ci.yml`
- `Terraform.latest.gitlab-ci.yml`
- `Terraform/Base.gitlab-ci.yml`
- `Terraform/Base.latest.gitlab-ci.yml`

In GitLab 16.9, a new job is added to the templates to inform users of the deprecation.
The warning can be switched off by overwriting the `deprecated-and-will-be-removed-in-18.0` job with a placeholder job in the affected pipelines.

GitLab won't be able to update the `terraform` binary in the job images to any version that
is licensed under BSL.

To continue using Terraform, clone the templates and <a href="https://gitlab.com/gitlab-org/terraform-images">Terraform image</a>,
and maintain them as needed.
GitLab provides <a href="https://gitlab.com/gitlab-org/terraform-images">detailed instructions</a> for migrating to a custom built image.

As an alternative we recommend using the new OpenTofu CI/CD component on GitLab.com
or the new OpenTofu CI/CD template on GitLab Self-Managed.
CI/CD components are not yet available on GitLab Self-Managed,
but <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/415638">Issue #415638</a>
proposes to add this feature. If CI/CD components become available on GitLab Self-Managed,
the OpenTofu CI/CD template will be removed.

See more about the <a href="https://gitlab.com/components/opentofu">new OpenTofu CI/CD component</a>.
]]></description>
      <pubDate>Wed, 31 Jan 2024 17:34:41 +0000</pubDate>
    </item>
    <item>
      <title>Secure analyzers major version update</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/438123</link>
      <description><![CDATA[The Secure stage will be bumping the major versions of its analyzers in tandem with the GitLab
17.0 release.

If you are not using the default included templates, or have pinned your analyzer versions you
must update your CI/CD job definition to either remove the pinned version or to update
the latest major version.

Users of GitLab 16.0-16.11 will continue to experience analyzer updates as normal until the
release of GitLab 17.0, following which all newly fixed bugs and released features will be
released only in the new major version of the analyzers.

We do not backport bugs and features to deprecated versions as per our maintenance policy. As
required, security patches will be backported within the latest 3 minor releases.

Specifically, the following analyzers are being deprecated and will no longer be updated after
the GitLab 17.0 release:

- Container scanning: version 6
- Dependency scanning: version 4
- DAST: version 4
- DAST API: version 3
- Fuzz API: version 3
- IaC scanning: version 4
- Secret detection: version 5
- Static application security testing (SAST): version 4 of <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/">all analyzers</a>
  - `brakeman`
  - `flawfinder`
  - `kubesec`
  - `mobsf`
  - `nodejs-scan`
  - `phpcs-security-audit`
  - `pmd-apex`
  - `semgrep`
  - `sobelow`
  - `spotbugs`
]]></description>
      <pubDate>Wed, 31 Jan 2024 10:49:47 +1100</pubDate>
    </item>
    <item>
      <title>Deprecate custom role creation for group owners on GitLab Self-Managed</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/439284</link>
      <description><![CDATA[In GitLab Self-Managed 17.0, custom role creation will be removed for group Owners. This functionality will move to the instance level for administrators only.
Group Owners will be able to assign custom roles at the group level.

Group owners on GitLab.com can continue to manage custom roles and assign at the group level.

If using the API to manage custom roles on GitLab Self-Managed, a new instance endpoint has been added and is required to continue API operations.

- List all member roles on the instance - `GET /api/v4/member_roles`
- Add member role to the instance - `POST /api/v4/member_roles`
- Remove member role from the instance - `DELETE /api/v4/member_roles/:id`
]]></description>
      <pubDate>Tue, 30 Jan 2024 11:49:54 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate License Scanning CI templates</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/439157</link>
      <description><![CDATA[GitLab 17.0 removes the License Scanning CI templates:

- <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/6d9956863d3cd066edc50a29767c2cd4a939c6fd/lib/gitlab/ci/templates/Jobs/License-Scanning.gitlab-ci.yml">`Jobs/License-Scanning.gitlab-ci.yml`</a>
- <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/6d9956863d3cd066edc50a29767c2cd4a939c6fd/lib/gitlab/ci/templates/Jobs/License-Scanning.latest.gitlab-ci.yml">`Jobs/License-Scanning.latest.gitlab-ci.yml`</a>
- <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/6d9956863d3cd066edc50a29767c2cd4a939c6fd/lib/gitlab/ci/templates/Security/License-Scanning.gitlab-ci.yml">`Security/License-Scanning.gitlab-ci.yml`</a>

CI configurations including any of the templates above will stop working in GitLab 17.0.

Users are advised to use <a href="https://docs.gitlab.com/user/compliance/license_scanning_of_cyclonedx_files/">License scanning of CycloneDX files</a> instead.
]]></description>
      <pubDate>Wed, 24 Jan 2024 15:29:40 +1100</pubDate>
    </item>
    <item>
      <title>Maven versions below 3.8.8 support in dependency scanning and license scanning</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/438772</link>
      <description><![CDATA[GitLab 17.0 drops dependency scanning and license scanning support for Maven versions below 3.8.8.

Users are advised to upgrade to 3.8.8 or greater.
]]></description>
      <pubDate>Tue, 23 Jan 2024 01:16:48 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate license metadata format V1</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/438477</link>
      <description><![CDATA[The license metadata format V1 dataset has been deprecated and will be removed
in GitLab 18.0.

Users who have the `package_metadata_synchronization` feature flag enabled are advised to
upgrade to GitLab 16.3 or above, and remove the feature flag configuration.
]]></description>
      <pubDate>Tue, 23 Jan 2024 07:55:11 +1100</pubDate>
    </item>
    <item>
      <title>Dependency scanning incorrect SBOM metadata properties</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/438779</link>
      <description><![CDATA[GitLab 17.0 removes support for the following metadata properties in CycloneDX SBOM reports:

- `gitlab:dependency_scanning:input_file`
- `gitlab:dependency_scanning:package_manager`

These properties were added in GitLab 15.7 to the SBOM produced by dependency scanning. However, these properties were incorrect and didn't align with the <a href="https://docs.gitlab.com/development/sec/cyclonedx_property_taxonomy/">GitLab CycloneDX property taxonomy</a>.
The following correct properties were added in GitLab 15.11 to address this:

- `gitlab:dependency_scanning:input_file:path`
- `gitlab:dependency_scanning:package_manager:name`

The incorrect properties were kept for backward compatibility. They are now deprecated and will be removed in 17.0.
]]></description>
      <pubDate>Mon, 22 Jan 2024 08:37:09 +0000</pubDate>
    </item>
    <item>
      <title>Support for self-hosted Sentry versions 21.4.1 and earlier</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/435791</link>
      <description><![CDATA[Support for self-hosted Sentry versions 21.4.1 and earlier is deprecated and will be removed in GitLab 17.0.

If your self-hosted Sentry version is 21.4.1 or earlier, you may not be able to collect errors from your GitLab instance after upgrading to GitLab 17.0 or later.
To continue sending errors from your GitLab instance to your Sentry instance, upgrade Sentry to version 21.5.0 or later. For more information,
see <a href="https://develop.sentry.dev/self-hosted/releases/">Sentry documentation</a>.

> [!note]
> The deprecated support is for
> <a href="https://docs.gitlab.com/omnibus/settings/configuration/#error-reporting-and-logging-with-sentry">GitLab instance error tracking features</a>
> for administrators. The deprecated support does not relate to
> <a href="https://docs.gitlab.com/operations/error_tracking/#sentry-error-tracking">GitLab error tracking</a> for
> developers' own deployed applications.
]]></description>
      <pubDate>Mon, 22 Jan 2024 07:32:17 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate `version` field in feature flag API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/437986</link>
      <description><![CDATA[The `version` field in the <a href="https://docs.gitlab.com/api/feature_flags/">feature flag REST API</a>
is deprecated and will be removed in GitLab 17.0.

After the `version` field is removed, there won't be a way to create legacy feature flags.
]]></description>
      <pubDate>Fri, 19 Jan 2024 20:01:15 +0000</pubDate>
    </item>
    <item>
      <title>Agent for Kubernetes option `ca-cert-file` renamed</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/437728</link>
      <description><![CDATA[In the GitLab agent for Kubernetes (agentk), the `--ca-cert-file` command line option
and the corresponding `config.caCert` Helm chart value have been renamed
to `--kas-ca-cert-file` and `config.kasCaCert`, respectively.

The old `--ca-cert-file` and `config.caCert` options are deprecated, and will
be removed in GitLab 17.0.
]]></description>
      <pubDate>Fri, 19 Jan 2024 19:45:15 +0000</pubDate>
    </item>
    <item>
      <title>Heroku image upgrade in Auto DevOps build</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/437937</link>
      <description><![CDATA[In GitLab 17.0, the `auto-build-image` project will upgrade from the `heroku/builder:20` image to `heroku/builder:22`.

To test the behavior of the new image, set the CI/CD variable `AUTO_DEVOPS_BUILD_IMAGE_CNB_BUILDER` to
`heroku/builder:22`.

To continue to use `heroku/builder:20` after GitLab 17.0,
set `AUTO_DEVOPS_BUILD_IMAGE_CNB_BUILDER` to `heroku/builder:20`.
]]></description>
      <pubDate>Fri, 19 Jan 2024 19:09:00 +0000</pubDate>
    </item>
    <item>
      <title>The `direction` GraphQL argument for `ciJobTokenScopeRemoveProject` is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/383084</link>
      <description><![CDATA[The `direction` GraphQL argument for the `ciJobTokenScopeRemoveProject` mutation is deprecated. Following the <a href="https://docs.gitlab.com/update/deprecations/#default-cicd-job-token-ci_job_token-scope-changed">default CI/CD job token scope change</a> announced in GitLab 15.9, the `direction` argument will default to `INBOUND` and `OUTBOUND` will no longer be valid in GitLab 17.0. We will remove the `direction` argument in GitLab 18.0.

If you are using `OUTBOUND` with the `direction` argument to control the direction of your project's token access, your pipeline that use job tokens risk failing authentication. To ensure pipelines continue to run as expected, you will need to explicitly <a href="https://docs.gitlab.com/ci/jobs/ci_job_token/#add-a-group-or-project-to-the-job-token-allowlist">add the other projects to your project's allowlist</a>.
]]></description>
      <pubDate>Thu, 18 Jan 2024 05:01:42 +0000</pubDate>
    </item>
    <item>
      <title>Support for setting custom schema for backup is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/435210</link>
      <description><![CDATA[You could configure GitLab to use a custom schema for backup, by setting
`gitlab_rails['backup_pg_schema'] = '<schema_name>'` in `/etc/gitlab/gitlab.rb` for Linux package installations,
or by editing `config/gitlab.yml` for self-compiled installations.

While the configuration setting was available, it had no effect and did not serve the purpose it was intended.
This configuration setting will be removed in GitLab 17.0.
]]></description>
      <pubDate>Thu, 11 Jan 2024 13:46:02 +0000</pubDate>
    </item>
    <item>
      <title>`after_script` keyword will run for canceled jobs</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/437789</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/ci/yaml/#after_script">`after_script`</a> CI/CD keyword is used to run additional commands after the main `script` section of a job. This is often used for cleaning up environments or other resources that were used by the job. For many users, the fact that the `after_script` commands do not run if a job is canceled was unexpected and undesired. In 17.0, the keyword will be updated to also run commands after job cancellation. Make sure that your CI/CD configuration that uses the `after_script` keyword is able to handle running for canceled jobs as well.
]]></description>
      <pubDate>Thu, 11 Jan 2024 06:15:21 +0000</pubDate>
    </item>
    <item>
      <title>License List is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/436100</link>
      <description><![CDATA[Today in GitLab you can see a list of all of the licenses your project and the components that
use that license on the License List. As of 16.8, the License List is deprecated and scheduled
to be removed in 17.0 as a breaking change. You can now access all of the licenses your project
or group is using on the dependency list, including the ability to filter by license.
]]></description>
      <pubDate>Wed, 10 Jan 2024 23:29:14 +0000</pubDate>
    </item>
    <item>
      <title>GitLab Runner provenance metadata SLSA v0.2 statement</title>
      <link>https://gitlab.com/gitlab-org/gitlab-runner/-/issues/36869</link>
      <description><![CDATA[Runners generate provenance metadata and currently defaults to generating statements that adhere to SLSA v0.2. Because SLSA v1.0 has been released and is now supported by GitLab, the v0.2 statement is now deprecated and removal is planned in GitLab 17.0. The SLSA v1.0 statement is planned to become the new default statement format in GitLab 17.0.
]]></description>
      <pubDate>Mon, 8 Jan 2024 10:19:50 +0000</pubDate>
    </item>
    <item>
      <title>License Scanning support for sbt 1.0.X</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/437591</link>
      <description><![CDATA[GitLab 17.0 removes License Scanning support for sbt 1.0.x.

Users are advised to upgrade from sbt 1.0.x.
]]></description>
      <pubDate>Mon, 8 Jan 2024 08:35:00 +1100</pubDate>
    </item>
    <item>
      <title>Dependency scanning support for sbt 1.0.X</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/415835</link>
      <description><![CDATA[Supporting very old versions of sbt is preventing us from improving our support for additional use cases with this package manager without increasing our maintenance cost.

Version 1.1.0 of sbt was released 6 years ago, and users are advised to upgrade from 1.0.x as dependency scanning will no longer work.
]]></description>
      <pubDate>Wed, 3 Jan 2024 22:39:12 +0000</pubDate>
    </item>
    <item>
      <title>`metric` filter and `value` field for DORA API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/393172</link>
      <description><![CDATA[Multiple DORA metrics can now be queried simultaneously using a new metrics field. The `metric` filter and `value` field for GraphQL DORA API will be removed in GitLab 17.0.
]]></description>
      <pubDate>Tue, 2 Jan 2024 08:10:22 +0000</pubDate>
    </item>
    <item>
      <title>JWT `/-/jwks` instance endpoint is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/221031</link>
      <description><![CDATA[With the <a href="https://docs.gitlab.com/update/deprecations/?removal_milestone=17.0#old-versions-of-json-web-tokens-are-deprecated">deprecation of old JSON web token versions</a> in GitLab 17.0, the associated `/-/jwks` endpoint, which is an alias for `/oauth/discovery/keys`, is no longer necessary and will be removed.
If you've been specifying `jwks_url` in your auth configuration, update your configuration to `oauth/discovery/keys` instead and remove all uses of `/-/jwks` in your endpoints.
If you've already been using `oauth_discovery_keys` in your auth configuration and the `/-/jwks` alias in your endpoints, remove `/-/jwks` from your endpoints. For example, change `https://gitlab.example.com/-/jwks` to `https://gitlab.example.com`.
]]></description>
      <pubDate>Tue, 5 Dec 2023 05:26:13 +0000</pubDate>
    </item>
    <item>
      <title>List repository directories Rake task</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/384361</link>
      <description><![CDATA[The `gitlab-rake gitlab:list_repos` Rake task does not work and will be removed in GitLab 17.0.
If you're migrating GitLab, use
<a href="https://docs.gitlab.com/administration/operations/moving_repositories/#recommended-approach-in-all-cases">backup and restore</a>
instead.
]]></description>
      <pubDate>Tue, 28 Nov 2023 19:14:03 -1000</pubDate>
    </item>
    <item>
      <title>Deprecated parameters related to custom text in the sign-in page</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/124461</link>
      <description><![CDATA[The parameters, `sign_in_text` and `help_text`, are deprecated in the <a href="https://docs.gitlab.com/api/settings/">Settings API</a>. To add a custom text to the sign-in and new user account pages, use the `description` field in the <a href="https://docs.gitlab.com/api/appearance/">Appearance API</a>.
]]></description>
      <pubDate>Fri, 10 Nov 2023 03:45:18 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL: deprecate support for `canDestroy` and `canDelete`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390754</link>
      <description><![CDATA[The Package Registry user interface relies on the GitLab GraphQL API. To make it easy for everyone to contribute, it's important that the frontend is coded consistently across all GitLab product areas. Before GitLab 16.6, however, the Package Registry UI handled permissions differently from other areas of the product.

In 16.6, we added a new `UserPermissions` field under the `Types::PermissionTypes::Package` type to align the Package Registry with the rest of GitLab. This new field replaces the `canDestroy` field under the `Package`, `PackageBase`, and `PackageDetailsType` types. It also replaces the field `canDelete` for `ContainerRepository`, `ContainerRepositoryDetails`, and `ContainerRepositoryTag`. In GitLab 17.0, the `canDestroy` and `canDelete` fields will be removed.

This is a breaking change that will be completed in 17.0.
]]></description>
      <pubDate>Thu, 9 Nov 2023 23:35:57 +0000</pubDate>
    </item>
    <item>
      <title>Geo: Housekeeping Rake tasks</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/416384</link>
      <description><![CDATA[As part of the migration of the replication and verification to the
<a href="https://docs.gitlab.com/development/geo/framework/">Geo self-service framework (SSF)</a>,
the legacy replication for project repositories has been
<a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130565">removed</a>.
As a result, the following Rake tasks that relied on legacy code have also been removed. The work invoked by these Rake tasks are now triggered automatically either periodically or based on trigger events.

| Rake task | Replacement |
| --------- | ----------- |
| `geo:git:housekeeping:full_repack` | <a href="https://docs.gitlab.com/administration/housekeeping/#heuristical-housekeeping">Moved to UI</a>. No equivalent Rake task in the SSF. |
| `geo:git:housekeeping:gc` | Always executed for new repositories, and then when it's needed. No equivalent Rake task in the SSF. |
| `geo:git:housekeeping:incremental_repack` | Executed when needed. No equivalent Rake task in the SSF. |
| `geo:run_orphaned_project_registry_cleaner` | Executed regularly by a registry <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/ee/app/workers/geo/secondary/registry_consistency_worker.rb">consistency worker</a> which removes orphaned registries. No equivalent Rake task in the SSF. |
| `geo:verification:repository:reset` | Moved to UI. No equivalent Rake task in the SSF. |
| `geo:verification:wiki:reset` | Moved to UI. No equivalent Rake task in the SSF. |
]]></description>
      <pubDate>Wed, 8 Nov 2023 09:23:48 +0000</pubDate>
    </item>
    <item>
      <title>Proxy-based DAST deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/430966</link>
      <description><![CDATA[As of GitLab 17.0, Proxy-based DAST will not be supported. Please migrate to Browser-based DAST to continue analyzing your projects for security findings via dynamic analysis. **Breach and Attack Simulation**, an incubating feature which is built on top of Proxy-based DAST, is also included in this deprecation and will not be supported after 17.0.
]]></description>
      <pubDate>Wed, 8 Nov 2023 00:41:31 +0000</pubDate>
    </item>
    <item>
      <title>Legacy Geo Prometheus metrics</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/430192</link>
      <description><![CDATA[Following the migration of projects to the <a href="https://docs.gitlab.com/development/geo/framework/">Geo self-service framework</a> we have deprecated a number of <a href="https://docs.gitlab.com/administration/monitoring/prometheus/">Prometheus</a> metrics.
The following Geo-related Prometheus metrics are deprecated and will be removed in 17.0.
The table below lists the deprecated metrics and their respective replacements. The replacements are available in GitLab 16.3.0 and later.

| Deprecated metric                        |  Replacement metric                            |
| ---------------------------------------- | ---------------------------------------------- |
| `geo_repositories_synced`                | `geo_project_repositories_synced`              |
| `geo_repositories_failed`                | `geo_project_repositories_failed`              |
| `geo_repositories_checksummed`           | `geo_project_repositories_checksummed`         |
| `geo_repositories_checksum_failed`       | `geo_project_repositories_checksum_failed`     |
| `geo_repositories_verified`              | `geo_project_repositories_verified`            |
| `geo_repositories_verification_failed`   | `geo_project_repositories_verification_failed` |
| `geo_repositories_checksum_mismatch`     |  None available                                |
| `geo_repositories_retrying_verification` |  None available                                |
]]></description>
      <pubDate>Tue, 7 Nov 2023 09:28:29 +0000</pubDate>
    </item>
    <item>
      <title>Container registry support for the Swift and OSS storage drivers</title>
      <link>https://gitlab.com/gitlab-org/container-registry/-/issues/1141</link>
      <description><![CDATA[The container registry uses storage drivers to work with various object storage platforms. While each driver's code is relatively self-contained, there is a high maintenance burden for these drivers. Each driver implementation is unique and making changes to a driver requires a high level of domain expertise with that specific driver.

As we look to reduce maintenance costs, we are deprecating support for OSS (Object Storage Service) and OpenStack Swift. Both have already been removed from the upstream Docker Distribution. This helps align the container registry with the broader GitLab product offering with regards to <a href="https://docs.gitlab.com/administration/object_storage/#supported-object-storage-providers">object storage support</a>.

OSS has an <a href="https://www.alibabacloud.com/help/en/oss/developer-reference/compatibility-with-amazon-s3">S3 compatibility mode</a>, so consider using that if you can't migrate to a supported driver. Swift is <a href="https://docs.openstack.org/swift/latest/s3_compat.html">compatible with S3 API operations</a>, required by the S3 storage driver as well.
]]></description>
      <pubDate>Wed, 25 Oct 2023 09:49:30 +0000</pubDate>
    </item>
    <item>
      <title>The GitHub importer Rake task</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/428225</link>
      <description><![CDATA[In GitLab 16.6, the GitHub importer Rake task was deprecated. The Rake task lacks several features that are supported by the API and is not actively maintained.

In GitLab 17.0, the Rake task will be removed.

Instead, GitHub repositories can be imported by using the <a href="https://docs.gitlab.com/api/import/#import-repository-from-github">API</a> or the <a href="https://docs.gitlab.com/user/project/import/github/">UI</a>.
]]></description>
      <pubDate>Tue, 24 Oct 2023 23:52:00 +0000</pubDate>
    </item>
    <item>
      <title>File type variable expansion fixed in downstream pipelines</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/419445</link>
      <description><![CDATA[Previously, if you tried to reference a <a href="https://docs.gitlab.com/ci/variables/#use-file-type-cicd-variables">file type CI/CD variable</a> in another CI/CD variable, the CI/CD variable would expand to contain the contents of the file. This behavior was incorrect because it did not comply with typical shell variable expansion rules. The CI/CD variable reference should expand to only contain the path to the file, not the contents of the file itself. This was <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/29407">fixed for most use cases in GitLab 15.7</a>. Unfortunately, passing CI/CD variables to downstream pipelines was an edge case not yet fixed, but which will now be fixed in GitLab 17.0.

With this change, a variable configured in the `.gitlab-ci.yml` file can reference a file variable and be passed to a downstream pipeline, and the file variable will be passed to the downstream pipeline as well. The downstream pipeline will expand the variable reference to the file path, not the file contents.

This breaking change could disrupt user workflows that depend on expanding a file variable in a downstream pipeline.
]]></description>
      <pubDate>Mon, 23 Oct 2023 09:41:53 +0000</pubDate>
    </item>
    <item>
      <title>Security policy field `newly_detected` is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/422414</link>
      <description><![CDATA[In <a href="https://gitlab.com/groups/gitlab-org/-/epics/6826#note_1341377224">Support additional filters for scan result policies</a>, we broke the `newly_detected` field into two options: `new_needs_triage` and `new_dismissed`. By including both options in the security policy YAML, you will achieve the same result as the original `newly_detected` field. However, you may now narrow your filter to ignore findings that have been dismissed by only using `new_needs_triage`.
]]></description>
      <pubDate>Thu, 12 Oct 2023 00:48:09 +0000</pubDate>
    </item>
    <item>
      <title>Offset pagination for `/users` REST API endpoint is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/426547</link>
      <description><![CDATA[Offset pagination for the `/users` REST API is deprecated in GitLab 16.5, and will be removed in GitLab 17.0. Use <a href="https://docs.gitlab.com/api/rest/#keyset-based-pagination">keyset pagination</a> instead.
]]></description>
      <pubDate>Tue, 3 Oct 2023 10:22:39 +0000</pubDate>
    </item>
    <item>
      <title>GitLab administrators must have permission to modify protected branches or tags</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/12776</link>
      <description><![CDATA[GitLab administrators can no longer perform actions on protected branches or tags unless they have been explicitly granted that permission. These actions include pushing and merging into a <a href="https://docs.gitlab.com/user/project/repository/branches/protected/">protected branch</a>, unprotecting a branch, and creating <a href="https://docs.gitlab.com/user/project/protected_tags/">protected tags</a>.
]]></description>
      <pubDate>Mon, 25 Sep 2023 12:12:16 +0000</pubDate>
    </item>
    <item>
      <title>`omniauth-authentiq` gem no longer available</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/389452</link>
      <description><![CDATA[`omniauth-authentiq` is an OmniAuth strategy gem that was part of GitLab. The company providing authentication services, Authentiq, has shut down. Therefore the gem is being removed.
]]></description>
      <pubDate>Mon, 25 Sep 2023 12:12:16 +0000</pubDate>
    </item>
    <item>
      <title>Integrated error tracking disabled by default</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/353639</link>
      <description><![CDATA[In GitLab 14.4, GitLab released an integrated error tracking backend that replaces Sentry. This feature caused database performance issues. In GitLab 14.9, integrated error tracking is removed from GitLab.com, and turned off by default in GitLab Self-Managed. While we explore the future development of this feature, please consider switching to the Sentry backend by <a href="https://docs.gitlab.com/operations/error_tracking/#sentry-error-tracking">changing your error tracking to Sentry in your project settings</a>.

For additional background on this removal, please reference <a href="https://gitlab.com/groups/gitlab-org/-/epics/7580">Disable Integrated Error Tracking by Default</a>. If you have feedback please add a comment to <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/355493">Feedback: Removal of Integrated Error Tracking</a>.
]]></description>
      <pubDate>Mon, 25 Sep 2023 12:12:16 +0000</pubDate>
    </item>
    <item>
      <title>`postgres_exporter['per_table_stats']` configuration setting</title>
      <link>https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8164</link>
      <description><![CDATA[The Linux package provides custom queries for the bundled PostgreSQL exporter, which included a `per_table_stats` query controlled by `postgres_exporter['per_table_stats']`
configuration setting.

The PostgreSQL exporter now provides a `stat_user_tables` collector that provides the same metrics. If you had `postgres_exporter['per_table_stats']` enabled,
enable `postgres_exporter['flags']['collector.stat_user_tables']` instead.
]]></description>
      <pubDate>Wed, 20 Sep 2023 18:31:15 +0000</pubDate>
    </item>
    <item>
      <title>CI/CD job token - **Authorized groups and projects** allowlist enforcement</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/383084</link>
      <description><![CDATA[With the <a href="https://docs.gitlab.com/ci/jobs/ci_job_token/#add-a-group-or-project-to-the-job-token-allowlist">**Authorized groups and projects** setting</a>
introduced in GitLab 15.9 (renamed from **Limit access _to_ this project** in GitLab 16.3), you can control CI/CD job token access to your project.
When set to **Only this project and any groups and projects in the allowlist**,
only groups or projects added to the allowlist can use job tokens to access your project.

For projects created before GitLab 15.9, the allowlist was disabled by default
(<a href="https://docs.gitlab.com/ci/jobs/ci_job_token/#allow-any-project-to-access-your-project">**All groups and projects**</a>
access setting selected), allowing job token access from any project.
The allowlist is now enabled by default in all new projects. In older
projects, it might still be disabled or you might have manually selected
the **All groups and projects** option to make access unrestricted.

Starting in GitLab 17.6, administrators for GitLab Self-Managed and GitLab Dedicated instances can optionally
<a href="https://docs.gitlab.com/administration/settings/continuous_integration/#job-token-permissions">enforce this more secure setting for all projects</a>.
This setting prevents project maintainers from selecting **All groups and projects**.
This change ensures a higher level of security between projects.

In GitLab 18.0, this instance setting will be enabled by default on GitLab.com, GitLab Self-Managed, and GitLab Dedicated.
GitLab Self-Managed and GitLab Dedicated administrators can disable the setting after upgrading to GitLab 18.0
to restore the pre-upgrade behavior. No project settings will be changed in GitLab 18.0 for GitLab Self-Managed and
GitLab Dedicated, though the status of the instance setting impacts all projects on the instance.

To prepare for this change, project maintainers using job tokens for cross-project authentication
should populate their project's **Authorized groups and projects** allowlists. They should then change
the setting to **Only this project and any groups and projects in the allowlist**.

To help identify projects that need access to your project by authenticating with a CI/CD job token, in GitLab 17.6 we also introduced a method to <a href="https://about.gitlab.com/releases/2024/11/21/gitlab-17-6-released/#track-cicd-job-token-authentications">track job token authentications</a> to your projects. You can use that data to populate your CI/CI job token allowlist.

From GitLab 17.10 to 18.6, you can use <a href="https://archives.docs.gitlab.com/18.6/ci/jobs/ci_job_token/#auto-populate-a-projects-allowlist">migration tooling</a> to automatically populate the CI/CD job token allowlist from the job token authentication log. We encourage you to use this migration tool to populate and use the allowlist before <a href="https://docs.gitlab.com/update/deprecations/?removal_milestone=18.0#cicd-job-token-authorized-groups-and-projects-allowlist-enforcement">general enforcement of allowlists in GitLab 18.0</a>. In GitLab 18.0, automatic population and enforcement of the allowlist will occur on GitLab.com as previously announced.

This migration tool <a href="https://gitlab.com/gitlab-org/gitlab/-/work_items/498305">was removed</a> in GitLab 18.7.
]]></description>
      <pubDate>Wed, 13 Sep 2023 23:14:50 +0000</pubDate>
    </item>
    <item>
      <title>Internal container registry API tag deletion endpoint</title>
      <link>https://gitlab.com/gitlab-org/container-registry/-/issues/1094</link>
      <description><![CDATA[The Docker Registry HTTP API V2 Spec, later replaced by the <a href="https://github.com/opencontainers/distribution-spec/blob/main/spec.md">OCI Distribution Spec</a> did not include a tag delete operation, and an unsafe and slow workaround (involving deleting manifests, not tags) had to be used to achieve the same end.

Tag deletion is an important function, so we added a tag deletion operation to the GitLab container registry, extending the V2 API beyond the scope of the Docker and OCI distribution spec.

Since then, the OCI Distribution Spec has had some updates and it now has a tag delete operation, using the <a href="https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-tags">`DELETE /v2/<name>/manifests/<tag>` endpoint</a>.

This leaves the container registry with two endpoints that provide the exact same functionality. `DELETE /v2/<name>/tags/reference/<tag>` is the custom GitLab tag delete endpoint and `DELETE /v2/<name>/manifests/<tag>`, the OCI compliant tag delete endpoint introduced in GitLab 16.4.

Support for the custom GitLab tag delete endpoint is deprecated in GitLab 16.4, and it will be removed in GitLab 17.0.

This endpoint is used by the **internal** container registry application API, not the public <a href="https://docs.gitlab.com/api/container_registry/">GitLab container registry API</a>. No action should be required by the majority of container registry users. All the GitLab UI and API functionality related to tag deletions will remain intact as we transition to the new OCI-compliant endpoint.

If you do access the internal container registry API and use the original tag deletion endpoint, you must update to the new endpoint.
]]></description>
      <pubDate>Wed, 13 Sep 2023 15:23:01 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate change vulnerability status from the Developer role</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/424133</link>
      <description><![CDATA[The ability for Developers to change the status of vulnerabilities is now deprecated. We plan to make a breaking change in the upcoming GitLab 17.0 release to remove this ability from the Developer role. Users who wish to continue to grant this permission to developers can <a href="https://docs.gitlab.com/user/permissions/#custom-roles">create a custom role</a> for their developers and add in the `admin_vulnerability` permission to give them this access.
]]></description>
      <pubDate>Mon, 11 Sep 2023 02:31:04 +0000</pubDate>
    </item>
    <item>
      <title>Geo: Legacy replication details routes for designs and projects deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/424002</link>
      <description><![CDATA[As part of the migration of legacy data types to the <a href="https://docs.gitlab.com/development/geo/framework/">Geo self-service framework</a>, the following replication details routes are deprecated:

- Designs `/admin/geo/replication/designs` replaced by `/admin/geo/sites/<Geo Node/Site ID>/replication/design_management_repositories`
- Projects `/admin/geo/replication/projects` replaced by `/admin/geo/sites/<Geo Node/Site ID>/replication/projects`

From GitLab 16.4 to 17.0, lookups for the legacy routes will automatically be redirected to the new routes. We will remove the redirections in 17.0. Please update any bookmarks or scripts that may use the legacy routes.
]]></description>
      <pubDate>Thu, 7 Sep 2023 20:33:20 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL `networkPolicies` resource deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/421440</link>
      <description><![CDATA[The `networkPolicies` <a href="https://docs.gitlab.com/api/graphql/reference/#projectnetworkpolicies">GraphQL resource</a> has been deprecated and will be removed in GitLab 17.0. Since GitLab 15.0 this field has returned no data.
]]></description>
      <pubDate>Fri, 1 Sep 2023 09:30:06 +0000</pubDate>
    </item>
    <item>
      <title>Job token allowlist covers public and internal projects</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/420678</link>
      <description><![CDATA[Starting in 16.6, projects that are **public** or **internal** will no longer authorize job token requests from projects that are **not** on the project's allowlist when <a href="https://docs.gitlab.com/ci/jobs/ci_job_token/#add-a-group-or-project-to-the-job-token-allowlist">**Limit access to this project**</a> is enabled.

If you have <a href="https://docs.gitlab.com/user/public_access/#change-project-visibility">public or internal</a> projects with the **Limit access to this project** setting enabled, you must add any projects which make job token requests to your project's allowlist for continued authorization.
]]></description>
      <pubDate>Fri, 18 Aug 2023 08:06:04 +0000</pubDate>
    </item>
    <item>
      <title>RSA key size limits</title>
      <link>https://gitlab.com/groups/gitlab-org/-/epics/11186</link>
      <description><![CDATA[Go versions 1.20.7 and later add a `maxRSAKeySize` constant that limits RSA keys to a maximum of 8192 bits. As a result, RSA keys larger than 8192 bits will no longer work with GitLab. Any RSA keys larger than 8192 bits must be regenerated at a smaller size.

You might notice this issue because your logs include an error like `tls: server sent certificate containing RSA key larger than 8192 bits`. To test the length of your key, use this command: `openssl rsa -in <your-key-file> -text -noout | grep "Key:"`.
]]></description>
      <pubDate>Thu, 17 Aug 2023 21:30:20 +0000</pubDate>
    </item>
    <item>
      <title>Twitter OmniAuth login option is removed from GitLab.com</title>
      <link>https://gitlab.com/gitlab-com/Product/-/issues/11417</link>
      <description><![CDATA[Twitter OAuth 1.0a OmniAuth is being deprecated and removed on GitLab.com in GitLab 16.3 due to low use, lack of gem support, and the lack of a functional sign-in option for this feature. If you sign in to GitLab.com with Twitter, you can sign in with a password or another <a href="https://gitlab.com/users/sign_in">supported OmniAuth provider</a>.
]]></description>
      <pubDate>Thu, 3 Aug 2023 19:19:16 +0000</pubDate>
    </item>
    <item>
      <title>Twitter OmniAuth login option is deprecated from GitLab Self-Managed</title>
      <link>https://gitlab.com/gitlab-com/Product/-/issues/11417</link>
      <description><![CDATA[Twitter OAuth 1.0a OmniAuth is deprecated and will be removed for GitLab Self-Managed in GitLab 17.0 due to low use and lack of gem support. Use <a href="https://docs.gitlab.com/integration/omniauth/#supported-providers">another supported OmniAuth provider</a> instead.
]]></description>
      <pubDate>Thu, 3 Aug 2023 19:19:16 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL field `totalWeight` is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/416219</link>
      <description><![CDATA[You can use GraphQL to query the total weight of issues in an issue board. However, the `totalWeight` field is limited to the maximum size 2147483647. As a result, `totalWeight` is deprecated and will be removed in GitLab 17.0.

Use `totalIssueWeight` instead, introduced in GitLab 16.2.
]]></description>
      <pubDate>Mon, 24 Jul 2023 13:53:19 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate field `hasSolutions` from GraphQL VulnerabilityType</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/414895</link>
      <description><![CDATA[The GraphQL field `Vulnerability.hasSolutions` is deprecated and will be removed in GitLab 17.0.
Use `Vulnerability.hasRemediations` instead.
]]></description>
      <pubDate>Mon, 24 Jul 2023 08:46:14 +0000</pubDate>
    </item>
    <item>
      <title>The pull-based deployment features of the GitLab agent for Kubernetes is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/406545</link>
      <description><![CDATA[We are deprecating the built-in pull-based deployment features of the GitLab agent for Kubernetes in favor of Flux and related integrations.

The GitLab agent for Kubernetes **is not deprecated**. This change affects only the pull-based functionality of the agent. All other functionality will remain intact, and GitLab will continue to support the agent for Kubernetes.

If you use the agent for pull-based deployments, you should <a href="https://docs.gitlab.com/user/clusters/agent/gitops/agent/#migrate-to-flux">migrate to Flux</a>. Because Flux is a mature CNCF project for GitOps, we decided to <a href="https://about.gitlab.com/blog/2023/02/08/why-did-we-choose-to-integrate-fluxcd-with-gitlab/">integrate Flux with GitLab in February 2023</a>.
]]></description>
      <pubDate>Mon, 17 Jul 2023 16:27:02 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL field `registrySizeEstimated` has been deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/416509</link>
      <description><![CDATA[For clarity, the GraphQL field `registrySizeEstimated` was renamed to `containerRegistrySizeIsEstimated`, to match its counterpart.
`registrySizeEstimated` was deprecated in GitLab 16.2 and will be removed in GitLab 17.0.
Use `containerRegistrySizeIsEstimated` introduced in GitLab 16.2 instead.
]]></description>
      <pubDate>Tue, 11 Jul 2023 12:55:35 +0300</pubDate>
    </item>
    <item>
      <title>Deprecate `CiRunner` GraphQL fields duplicated in `CiRunnerManager`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/415185</link>
      <description><![CDATA[These fields (`architectureName`, `ipAddress`, `platformName`, `revision`, `version`) are now deprecated from the <a href="https://docs.gitlab.com/api/graphql/reference/#cirunner">GraphQL `CiRunner`</a> type as they are duplicated with the introduction of runner managers grouped within a runner configuration.
]]></description>
      <pubDate>Tue, 4 Jul 2023 07:37:05 +0000</pubDate>
    </item>
    <item>
      <title>OmniAuth Facebook is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/416000</link>
      <description><![CDATA[OmniAuth Facebook support will be removed in GitLab 17.0. The last gem release was in 2021 and it is currently unmaintained. The current usage is less than 0.1%. If you use OmniAuth Facebook, switch to a <a href="https://docs.gitlab.com/integration/omniauth/#supported-providers">supported provider</a> in advance of support removal.
]]></description>
      <pubDate>Fri, 30 Jun 2023 14:28:39 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate `message` field from Vulnerability Management features</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/411573</link>
      <description><![CDATA[This MR deprecates the `message` field on the `VulnerabilityCreate` GraphQL mutation, and in the `AdditionalInfo` column of the vulnerability export.
The message field was removed from security reports schema in GitLab 16.0 and is no longer being used elsewhere.
]]></description>
      <pubDate>Thu, 29 Jun 2023 01:22:43 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate Windows CMD in GitLab Runner</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/414864</link>
      <description><![CDATA[In GitLab 11.11 the Windows Batch executor, the CMD shell was deprecated in GitLab Runner in favor of PowerShell. Since then, the CMD shell has continued to be supported in GitLab Runner. However this has resulted in additional complexity for both the engineering team and customers using the Runner on Windows. We plan to fully remove support for Windows CMD from GitLab Runner in 17.0. Customers should plan to use PowerShell when using the runner on Windows with the shell executor. Customers can provide feedback or ask questions in the removal issue, <a href="https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29479">issue 29479</a>.
]]></description>
      <pubDate>Fri, 16 Jun 2023 13:01:09 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL deprecation of `dependencyProxyTotalSizeInBytes` field</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/414236</link>
      <description><![CDATA[You can use GraphQL to query the amount of storage used by the GitLab Dependency Proxy. However, the `dependencyProxyTotalSizeInBytes` field is limited to about 2 gigabytes, which is not always large enough for the Dependency Proxy. As a result, `dependencyProxyTotalSizeInBytes` is deprecated.

Use `dependencyProxyTotalSizeBytes` instead, introduced in GitLab 16.1.
]]></description>
      <pubDate>Fri, 16 Jun 2023 05:31:13 +0000</pubDate>
    </item>
    <item>
      <title>Unified approval rules are deprecated</title>
      <link>https://gitlab.com/groups/gitlab-org/-/epics/9662</link>
      <description><![CDATA[Unified approval rules are deprecated in favor of multiple approval rules, which provide more flexibility.
You might not be able to migrate your Unified approval rules to multiple approval rules without breaking changes.
To help you migrate manually, we introduced migration documentation.

If you don't migrate manually before unified approval
rules are removed, GitLab will automatically migrate your settings.
As multiple approval rules allow a more fine-grained setup for approval rules, if you leave the migration to GitLab,
the automatic migrations might end up with more restrictive rules than you might prefer.
Check your migration rules if you have an issue where you need more approvals than you expect.

In GitLab 15.11, UI support for unified approval rules was removed.
You can still access unified approval rules with the API.
]]></description>
      <pubDate>Fri, 19 May 2023 21:44:53 +0000</pubDate>
    </item>
    <item>
      <title>Bundled Grafana deprecated and disabled</title>
      <link>https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/7772</link>
      <description><![CDATA[The version of Grafana bundled with Omnibus GitLab is
<a href="https://docs.gitlab.com/administration/monitoring/performance/grafana_configuration/#deprecation-of-bundled-grafana">deprecated and disabled</a>
in 16.0 and will be removed in 16.3. If you are using the bundled Grafana, you must migrate to either:

- Another implementation of Grafana. For more information, see
  <a href="https://docs.gitlab.com/administration/monitoring/performance/grafana_configuration/#switch-to-new-grafana-instance">Switch to new Grafana instance</a>.
- Another observability platform of your choice.

The version of Grafana that is currently provided is no longer a supported version.

In GitLab versions 16.0 to 16.2, you can still <a href="https://docs.gitlab.com/administration/monitoring/performance/grafana_configuration/#temporary-workaround">re-enable the bundled Grafana</a>.
However, enabling the bundled Grafana will no longer work from GitLab 16.3.
]]></description>
      <pubDate>Fri, 12 May 2023 01:54:46 +0000</pubDate>
    </item>
    <item>
      <title>PostgreSQL 13 no longer supported</title>
      <link>https://gitlab.com/groups/gitlab-org/-/epics/9065</link>
      <description><![CDATA[GitLab follows an <a href="https://handbook.gitlab.com/handbook/engineering/infrastructure-platforms/data-access/database-framework/postgresql-upgrade-cadence/">annual upgrade cadence for PostgreSQL</a>.

Support for PostgreSQL 13 is scheduled for removal in GitLab 17.0.
In GitLab 17.0, PostgreSQL 14 becomes the minimum required PostgreSQL version.

PostgreSQL 13 will be supported for the full GitLab 16 release cycle.
PostgreSQL 14 will also be supported for instances that want to upgrade prior to GitLab 17.0.
If you are running a single PostgreSQL instance you installed by using an Omnibus Linux package, an automatic upgrade may be attempted with 16.11.
Make sure you have enough disk space to accommodate the upgrade. For more information, see the <a href="https://docs.gitlab.com/omnibus/settings/database/#upgrade-packaged-postgresql-server">Omnibus database documentation</a>.
]]></description>
      <pubDate>Thu, 11 May 2023 19:21:24 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL type, `RunnerMembershipFilter` renamed to `CiRunnerMembershipFilter`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/409333</link>
      <description><![CDATA[The GraphQL type, `RunnerMembershipFilter`, has been renamed to `CiRunnerMembershipFilter`. In GitLab 17.0,
the aliasing for the `RunnerMembershipFilter` type will be removed.
]]></description>
      <pubDate>Mon, 8 May 2023 15:11:56 +0000</pubDate>
    </item>
    <item>
      <title>Changing MobSF-based SAST analyzer behavior in multi-module Android projects</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/408396</link>
      <description><![CDATA[**Update**: We previously announced a change to how the MobSF-based GitLab SAST analyzer would scan multi-module Android projects.
We've canceled that change, and no action is required.

Instead of changing which single module would be scanned, we <a href="https://gitlab.com/gitlab-org/security-products/analyzers/mobsf/-/merge_requests/73">improved multi-module support</a>.
]]></description>
      <pubDate>Thu, 4 May 2023 22:47:30 +0000</pubDate>
    </item>
    <item>
      <title>CiRunner.projects default sort is changing to `id_desc`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/372117</link>
      <description><![CDATA[The `CiRunner.projects`'s field default sort order value will change from `id_asc` to `id_desc`.
If you rely on the order of the returned projects to be `id_asc`, change your scripts to make the choice explicit.
]]></description>
      <pubDate>Fri, 28 Apr 2023 17:06:42 +0200</pubDate>
    </item>
    <item>
      <title>Work items path with global ID at the end of the path is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/393836</link>
      <description><![CDATA[Usage of global IDs in work item URLs is deprecated. In the future, only internal IDs (IID) will be supported.

Because GitLab supports multiple work item types, a path such as `https://gitlab.com/gitlab-org/gitlab/-/work_items/<global_id>` can display, for example, a <a href="https://docs.gitlab.com/user/tasks/">task</a> or an <a href="https://docs.gitlab.com/user/okrs/">OKR</a>.

In GitLab 15.10 we added support for using internal IDs (IID) in that path by appending a query parameter at
the end (`iid_path`) in the following format: `https://gitlab.com/gitlab-org/gitlab/-/work_items/<iid>?iid_path=true`.

In GitLab 16.0 we will remove the ability to use a global ID in the work items path. The number at the end of the path will be considered an internal ID (IID) without the need of adding a query parameter at the end. Only the following format will be supported: `https://gitlab.com/gitlab-org/gitlab/-/work_items/<iid>`.
]]></description>
      <pubDate>Mon, 20 Mar 2023 15:24:48 +0100</pubDate>
    </item>
    <item>
      <title>Bundled Grafana Helm Chart is deprecated</title>
      <link>https://gitlab.com/gitlab-org/charts/gitlab/-/issues/4353</link>
      <description><![CDATA[The Grafana Helm chart that is bundled with the GitLab Helm Chart is deprecated and will be removed in the GitLab Helm Chart 7.0 release (releasing along with GitLab 16.0).

The bundled Grafana Helm chart is an optional service that can be turned on to provide the Grafana UI connected to the GitLab Helm Chart's Prometheus metrics.

The version of Grafana that the GitLab Helm Chart is currently providing is no longer a supported Grafana version.
If you're using the bundled Grafana, you should switch to the <a href="https://artifacthub.io/packages/helm/grafana/grafana">newer chart version from Grafana Labs</a>
or a Grafana Operator from a trusted provider.

In your new Grafana instance, you can <a href="https://docs.gitlab.com/administration/monitoring/performance/grafana_configuration/#configure-grafana">configure the GitLab provided Prometheus as a data source</a>
and <a href="https://docs.gitlab.com/administration/monitoring/performance/grafana_configuration/#integrate-with-gitlab-ui">connect Grafana to the GitLab UI</a>.
]]></description>
      <pubDate>Mon, 20 Mar 2023 11:52:45 +0000</pubDate>
    </item>
    <item>
      <title>Major bundled Helm Chart updates for the GitLab Helm Chart</title>
      <link>https://gitlab.com/gitlab-org/charts/gitlab/-/issues/3442</link>
      <description><![CDATA[To coincide with GitLab 16.0, the GitLab Helm Chart will release the 7.0 major version. The following major bundled chart updates will be included:

- In GitLab 16.0, <a href="#postgresql-12-deprecated">PostgreSQL 12 support is being removed, and PostgreSQL 13 is becoming the new minimum</a>.
  - Installs using production-ready external databases will need to complete their migration to a newer PostgreSQL version before upgrading.
  - Installs using the <a href="https://docs.gitlab.com/charts/installation/tools/#postgresql">non-production bundled PostgreSQL 12 chart</a> will have the chart upgraded to the new version. For more information, <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/issues/4118">see issue 4118</a>
- Installs using the <a href="https://docs.gitlab.com/charts/installation/tools/#redis">non-production bundled Redis chart</a> will have the chart upgraded to a newer version. For more information, <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/issues/3375">see issue 3375</a>
- Installs using the <a href="https://docs.gitlab.com/charts/installation/tls/#option-1-cert-manager-and-lets-encrypt">bundled cert-manager chart</a> will have the chart upgraded to a newer version. For more information, <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/issues/4313">see issue 4313</a>

The full GitLab Helm Chart 7.0 upgrade steps will be available in the <a href="https://docs.gitlab.com/charts/installation/upgrade/">upgrade docs</a>.
]]></description>
      <pubDate>Mon, 20 Mar 2023 10:44:16 +0000</pubDate>
    </item>
    <item>
      <title>Deprecated Consul http metrics</title>
      <link>https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/7278</link>
      <description><![CDATA[The Consul provided in the Linux package will no longer provide older deprecated Consul metrics starting in GitLab 16.0.

In GitLab 14.0, <a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/5344">Consul was updated to 1.9.6</a>,
which deprecated some telemetry metrics from being at the `consul.http` path. In GitLab 16.0, the `consul.http` path will be removed.

If you have monitoring that consumes Consul metrics, update them to use `consul.api.http` instead of `consul.http`.
For more information, see <a href="https://github.com/hashicorp/consul/releases/tag/v1.9.0">the deprecation notes for Consul 1.9.0</a>.
]]></description>
      <pubDate>Wed, 15 Mar 2023 00:38:37 +0000</pubDate>
    </item>
    <item>
      <title>Legacy Gitaly configuration method</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/393574</link>
      <description><![CDATA[Gitaly configuration within Omnibus GitLab has been updated such that all Gitaly related configuration keys are in a single
configuration structure that matches the standard Gitaly configuration. As such, the previous configuration structure is deprecated.

The single configuration structure is available from GitLab 15.10, though backwards compatibility is maintained. Once removed, Gitaly must be configured using the single
configuration structure. You should update the configuration of Gitaly at your earliest convenience.

The change improves consistency between Omnibus GitLab and source installs and enables us to provide better documentation and tooling for both.

You should update to the new configuration structure as soon as possible using
<a href="https://docs.gitlab.com/update/#gitaly-omnibus-gitlab-configuration-structure-change">the upgrade instructions</a>.
]]></description>
      <pubDate>Tue, 14 Mar 2023 22:36:32 +0000</pubDate>
    </item>
    <item>
      <title>Environment search query requires at least three characters</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/382532</link>
      <description><![CDATA[From GitLab 16.0, when you search for environments with the API, you must use at least three characters. This change helps us ensure the scalability of the search operation.
]]></description>
      <pubDate>Thu, 2 Mar 2023 19:34:27 +0000</pubDate>
    </item>
    <item>
      <title>DingTalk OmniAuth provider</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390855</link>
      <description><![CDATA[The `omniauth-dingtalk` gem that provides GitLab with the DingTalk OmniAuth provider will be removed in our next
major release, GitLab 17.0. This gem sees very little use and is better suited for JiHu edition.
]]></description>
      <pubDate>Fri, 24 Feb 2023 10:17:17 +0100</pubDate>
    </item>
    <item>
      <title>Deprecation and planned removal for `CI_PRE_CLONE_SCRIPT` variable on GitLab.com</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/391896</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/ci/runners/saas/linux_saas_runner/#pre-clone-script">`CI_PRE_CLONE_SCRIPT` variable</a> supported by GitLab.com Runners is deprecated as of GitLab 15.9 and will be removed in 16.0. The `CI_PRE_CLONE_SCRIPT` variable enables you to run commands in your CI/CD job prior to the runner executing Git init and get fetch. For more information about how this feature works, see <a href="https://docs.gitlab.com/ci/runners/saas/linux_saas_runner/#pre-clone-script">Pre-clone script</a>. As an alternative, you can use the <a href="https://docs.gitlab.com/ci/yaml/#hookspre_get_sources_script">`pre_get_sources_script`</a>.
]]></description>
      <pubDate>Tue, 21 Feb 2023 19:25:56 +0000</pubDate>
    </item>
    <item>
      <title>Legacy Praefect configuration method</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390291</link>
      <description><![CDATA[Previously, Praefect configuration keys were scattered throughout the configuration file. Now, these are in a single configuration structure that matches
Praefect configuration so the previous configuration method is deprecated.

The single configuration structure available from GitLab 15.9, though backwards compatibility is maintained. Once removed, Praefect must be configured using the single
configuration structure. You should update your Praefect configuration as soon as possible using
<a href="https://docs.gitlab.com/update/#praefect-omnibus-gitlab-configuration-structure-change">the upgrade instructions</a>.

This change brings Praefect configuration in Omnibus GitLab in line with the configuration structure of Praefect. Previously, the hierarchies and configuration keys
didn't match. The change improves consistency between Omnibus GitLab and source installs and enables us to provide better documentation and tooling for both.
]]></description>
      <pubDate>Tue, 21 Feb 2023 00:17:04 +0000</pubDate>
    </item>
    <item>
      <title>Managed Licenses API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390417</link>
      <description><![CDATA[The Managed Licenses API is now deprecated and is scheduled for removal in GitLab 16.0.
]]></description>
      <pubDate>Fri, 17 Feb 2023 21:16:12 +0000</pubDate>
    </item>
    <item>
      <title>Enforced validation of CI/CD parameter character lengths</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/372770</link>
      <description><![CDATA[While CI/CD <a href="https://docs.gitlab.com/ci/jobs/#job-name">job names</a> have a strict 255 character limit, other CI/CD parameters do not yet have validations ensuring they also stay under the limit.

In GitLab 16.0, validation will be added to strictly limit the following to 255 characters as well:

- The `stage` keyword.
- The `ref`, which is the Git branch or tag name for the pipeline.
- The `description` and `target_url` parameter, used by external CI/CD integrations.

Users on GitLab Self-Managed should update their pipelines to ensure they do not use parameters that exceed 255 characters. Users on GitLab.com do not need to make any changes, as these are already limited in that database.
]]></description>
      <pubDate>Fri, 17 Feb 2023 18:26:18 +0000</pubDate>
    </item>
    <item>
      <title>Secure scanning CI/CD templates will use new job `rules`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/391822</link>
      <description><![CDATA[GitLab-managed CI/CD templates for security scanning will be updated in the GitLab 16.0 release.
The updates will include improvements already released in the Latest versions of the CI/CD templates.
We released these changes in the Latest template versions because they have the potential to disrupt customized CI/CD pipeline configurations.

In all updated templates, we're updating the definition of variables like `SAST_DISABLED` and `DEPENDENCY_SCANNING_DISABLED` to disable scanning only if the value is `"true"`. Previously, even if the value were `"false"`, scanning would be disabled.

The following templates will be updated:

- API fuzzing: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/API-Fuzzing.gitlab-ci.yml">`API-Fuzzing.gitlab-ci.yml`</a>
- Container scanning: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/Container-Scanning.gitlab-ci.yml">`Container-Scanning.gitlab-ci.yml`</a>
- Coverage-guided fuzzing: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/Coverage-Fuzzing.gitlab-ci.yml">`Coverage-Fuzzing.gitlab-ci.yml`</a>
- DAST: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/DAST.gitlab-ci.yml">`DAST.gitlab-ci.yml`</a>
- DAST API: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/DAST-API.gitlab-ci.yml">`DAST-API.gitlab-ci.yml`</a>
- Dependency scanning: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/Dependency-Scanning.gitlab-ci.yml">`Dependency-Scanning.gitlab-ci.yml`</a>
- IaC scanning: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/SAST-IaC.gitlab-ci.yml">`SAST-IaC.gitlab-ci.yml`</a>
- SAST: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/SAST.gitlab-ci.yml">`SAST.gitlab-ci.yml`</a>
- Secret detection: <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/Secret-Detection.gitlab-ci.yml">`Secret-Detection.gitlab-ci.yml`</a>

We recommend that you test your pipelines before the 16.0 release if you use one of the templates listed above and you use the `_DISABLED` variables but set a value other than `"true"`.

**Update**: We previously announced that we would update the `rules` on the affected templates to run in <a href="https://docs.gitlab.com/ci/pipelines/merge_request_pipelines/">merge request pipelines</a> by default.
However, due to compatibility issues <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/388988#note_1372629948">discussed in the deprecation issue</a>, we will no longer make this change in GitLab 16.0. We will still release the changes to the `_DISABLED` variables as described above.
]]></description>
      <pubDate>Fri, 17 Feb 2023 03:36:16 +0000</pubDate>
    </item>
    <item>
      <title>License-Check and the Policies tab on the license compliance page</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390417</link>
      <description><![CDATA[The **License-Check feature** is now deprecated and is scheduled for removal in GitLab 16.0. Additionally, the policies tab on the license compliance page and all APIs related to the License-Check feature are deprecated and planned for removal in GitLab 16.0. Users who wish to continue to enforce approvals based on detected licenses are encouraged to create a new <a href="https://docs.gitlab.com/user/compliance/license_approval_policies/">license approval policy</a> instead.
]]></description>
      <pubDate>Fri, 17 Feb 2023 00:09:05 +0000</pubDate>
    </item>
    <item>
      <title>SAST analyzer coverage changing in GitLab 16.0</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390416</link>
      <description><![CDATA[GitLab SAST uses various <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/">analyzers</a> to scan code for vulnerabilities.

We're reducing the number of supported analyzers used by default in GitLab SAST.
This is part of our long-term strategy to deliver a faster, more consistent user experience across different programming languages.

Starting in GitLab 16.0, the GitLab SAST CI/CD template will no longer use the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/security-code-scan">Security Code Scan</a>-based analyzer for .NET, and it will enter End of Support status.
We'll remove this analyzer from the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/SAST.gitlab-ci.yml">SAST CI/CD template</a> and replace it with GitLab-supported detection rules for C# in the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/semgrep">Semgrep-based analyzer</a>.

Effective immediately, this analyzer will receive only security updates; other routine improvements or updates are not guaranteed.
After this analyzer reaches End of Support in GitLab 16.0, no further updates will be provided.
However, we won't delete container images previously published for this analyzer or remove the ability to run it by using a custom CI/CD pipeline job.

If you've already dismissed a vulnerability finding from the deprecated analyzer, the replacement attempts to respect your previous dismissal. The system behavior depends on:

- whether you've excluded the Semgrep-based analyzer from running in the past.
- which analyzer first discovered the vulnerabilities shown in the project's Vulnerability Report.

See <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/#vulnerability-translation">Vulnerability translation documentation</a> for further details.

If you applied customizations to the affected analyzer, or if you currently disable the Semgrep-based analyzer in your pipelines, you must take action as detailed in the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/390416#breaking-change">deprecation issue for this change</a>.

**Update**: We've reduced the scope of this change. We will no longer make the following changes in GitLab 16.0:

1. Remove support for the analyzer based on <a href="https://gitlab.com/gitlab-org/security-products/analyzers/phpcs-security-audit">PHPCS Security Audit</a> and replace it with GitLab-managed detection rules in the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/semgrep">Semgrep-based analyzer</a>.
1. Remove Scala from the scope of the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/spotbugs">SpotBugs-based analyzer</a> and replace it with GitLab-managed detection rules in the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/semgrep">Semgrep-based analyzer</a>.

Work to replace the PHPCS Security Audit-based analyzer is tracked in <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/364060">issue 364060</a> and work to migrate Scala scanning to the Semgrep-based analyzer is tracked in <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/362958">issue 362958</a>.
]]></description>
      <pubDate>Thu, 16 Feb 2023 23:09:05 +0000</pubDate>
    </item>
    <item>
      <title>license compliance CI Template</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387561</link>
      <description><![CDATA[**Update**: We previously announced we would remove the existing license compliance CI/CD template in GitLab 16.0. However, due to performance issues with the <a href="https://docs.gitlab.com/user/compliance/license_scanning_of_cyclonedx_files/">license scanning of CycloneDX files</a> we will do this in 16.3 instead.

The GitLab <a href="https://docs.gitlab.com/user/compliance/license_approval_policies/">license compliance</a> CI/CD template is now deprecated and is scheduled for removal in the GitLab 16.3 release.

To continue using GitLab for license compliance, remove the license compliance template from your CI/CD pipeline and add the dependency scanning template. The dependency scanning template is now capable of gathering the required license information, so it is no longer necessary to run a separate license compliance job.

Before you remove the license compliance CI/CD template, verify that the instance has been upgraded to a version that supports the new method of license scanning.

To begin using the Dependency Scanner quickly at scale, you may set up a scan execution policy at the group level to enforce the SBOM-based license scan for all projects in the group. Then, you may remove the inclusion of the `Jobs/License-Scanning.gitlab-ci.yml` template from your CI/CD configuration.

If you wish to continue using the legacy license compliance feature, you can do so by setting the `LICENSE_MANAGEMENT_VERSION CI` variable to `4`. This variable can be set at the project, group, or instance level. This configuration change will allow you to continue using an existing version of license compliance without having to adopt the new approach.

Bugs and vulnerabilities in this legacy analyzer will no longer be fixed.

| CI Pipeline Includes | GitLab <= 15.8 | 15.9 <= GitLab < 16.3 | GitLab >= 16.3 |
| ------------- | ------------- | ------------- | ------------- |
| Both DS and LS templates | License data from LS job is used | License data from LS job is used | License data from DS job is used |
| DS template is included but LS template is not | No license data | License data from DS job is used | License data from DS job is used |
| LS template is included but DS template is not | License data from LS job is used | License data from LS job is used | No license data |
]]></description>
      <pubDate>Thu, 16 Feb 2023 22:53:28 +0000</pubDate>
    </item>
    <item>
      <title>Old versions of JSON web tokens are deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/366798</link>
      <description><![CDATA[<a href="https://docs.gitlab.com/ci/secrets/id_token_authentication/">ID tokens</a> with OIDC support
were introduced in GitLab 15.7. These tokens are more configurable than the old JSON web tokens (JWTs), are OIDC compliant,
and only available in CI/CD jobs that explicitly have ID tokens configured.
ID tokens are more secure than the old `CI_JOB_JWT*` JSON web tokens which are exposed in every job,
and as a result these old JSON web tokens are deprecated:

- `CI_JOB_JWT`
- `CI_JOB_JWT_V1`
- `CI_JOB_JWT_V2`

To prepare for this change, configure your pipelines to use <a href="https://docs.gitlab.com/ci/yaml/#id_tokens">ID tokens</a>
instead of the deprecated tokens. For OIDC compliance, the `iss` claim now uses
the fully qualified domain name, for example `https://example.com`, previously
introduced with the `CI_JOB_JWT_V2` token.

In GitLab 15.9 to 15.11, you can <a href="https://docs.gitlab.com/ci/secrets/id_token_authentication/#enable-automatic-id-token-authentication">enable the **Limit JSON Web Token (JWT) access**</a>
setting, which prevents the old tokens from being exposed to any jobs and enables
<a href="https://docs.gitlab.com/ci/secrets/id_token_authentication/#configure-automatic-id-token-authentication">ID token authentication for the `secrets:vault` keyword</a>.

In GitLab 16.0 and later:

- This setting will be removed.
- CI/CD jobs that use the `id_tokens` keyword can use ID tokens with `secrets:vault`,
  and will not have any `CI_JOB_JWT*` tokens available.
- Jobs that do not use the `id_tokens` keyword will continue to have the `CI_JOB_JWT*`
  tokens available until GitLab 17.0.

In GitLab 17.0, the deprecated tokens will be completely removed and will no longer
be available in CI/CD jobs.
]]></description>
      <pubDate>Thu, 16 Feb 2023 11:28:52 +0000</pubDate>
    </item>
    <item>
      <title>Legacy URLs replaced or removed</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/214217</link>
      <description><![CDATA[GitLab 16.0 removes legacy URLs from the GitLab application.

When subgroups were introduced in GitLab 9.0, a `/-/` delimiter was added to URLs to signify the end of a group path. All GitLab URLs now use this delimiter for project, group, and instance level features.

URLs that do not use the `/-/` delimiter are planned for removal in GitLab 16.0. For the full list of these URLs, along with their replacements, see <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/28848#release-notes">issue 28848</a>.

Update any scripts or bookmarks that reference the legacy URLs. GitLab APIs are not affected by this change.
]]></description>
      <pubDate>Wed, 15 Feb 2023 22:49:48 +0000</pubDate>
    </item>
    <item>
      <title>Secure analyzers major version update</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390912</link>
      <description><![CDATA[The Secure stage will be bumping the major versions of its analyzers in tandem with the GitLab 16.0 release. This bump will enable a clear delineation for analyzers, between:

- Those released prior to May 22, 2023
- Those released after May 22, 2023

If you are not using the default included templates, or have pinned your analyzer versions you will need to update your CI/CD job definition to either remove the pinned version or to update the latest major version.
Users of GitLab 13.0-15.10 will continue to experience analyzer updates as normal until the release of GitLab 16.0, following which all newly fixed bugs and released features will be released only in the new major version of the analyzers. We do not backport bugs and features to deprecated versions as per our <a href="https://docs.gitlab.com/policy/maintenance/">maintenance policy</a>. As required, security patches will be backported within the latest 3 minor releases.
Specifically, the following are being deprecated and will no longer be updated after 16.0 GitLab release:

- API fuzzing: version 2
- Container scanning: version 5
- Coverage-guided fuzz testing: version 3
- Dependency scanning: version 3
- Dynamic application security testing (DAST): version 3
- DAST API: version 2
- IaC scanning: version 3
- License scanning: version 4
- Secret detection: version 4
- Static application security testing (SAST): version 3 of <a href="https://docs.gitlab.com/user/application_security/sast/#supported-languages-and-frameworks">all analyzers</a>
  - `brakeman`: version 3
  - `flawfinder`: version 3
  - `kubesec`: version 3
  - `mobsf`: version 3
  - `nodejs-scan`: version 3
  - `phpcs-security-audit`: version 3
  - `pmd-apex`: version 3
  - `security-code-scan`: version 3
  - `semgrep`: version 3
  - `sobelow`: version 3
  - `spotbugs`: version 3
]]></description>
      <pubDate>Wed, 15 Feb 2023 21:36:00 +0000</pubDate>
    </item>
    <item>
      <title>External field in GraphQL ReleaseAssetLink type</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/109704</link>
      <description><![CDATA[In the <a href="https://docs.gitlab.com/api/graphql/">GraphQL API</a>, the `external` field of <a href="https://docs.gitlab.com/api/graphql/reference/#releaseassetlink">`ReleaseAssetLink` type</a> was used to indicate whether a <a href="https://docs.gitlab.com/user/project/releases/release_fields/#links">release link</a> is internal or external to your GitLab instance.
As of GitLab 15.9, we treat all release links as external, and therefore, this field is deprecated in GitLab 15.9, and will be removed in GitLab 16.0.
To avoid any disruptions to your workflow, please stop using the `external` field because it will be removed and will not be replaced.
]]></description>
      <pubDate>Wed, 15 Feb 2023 12:08:30 +0000</pubDate>
    </item>
    <item>
      <title>External field in Releases and Release Links APIs</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/109705</link>
      <description><![CDATA[In <a href="https://docs.gitlab.com/api/releases/">Releases API</a> and <a href="https://docs.gitlab.com/api/releases/links/">Release Links API</a>, the `external` field was used to indicate whether a <a href="https://docs.gitlab.com/user/project/releases/release_fields/#links">release link</a> is internal or external to your GitLab instance.
As of GitLab 15.9, we treat all release links as external, and therefore, this field is deprecated in GitLab 15.9, and will be removed in GitLab 16.0.
To avoid any disruptions to your workflow, please stop using the `external` field because it will be removed and will not be replaced.
]]></description>
      <pubDate>Wed, 15 Feb 2023 11:03:03 +0000</pubDate>
    </item>
    <item>
      <title>CI/CD job token - **Limit access from your project** setting removal</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/395708</link>
      <description><![CDATA[In GitLab 14.4, we introduced a setting to <a href="https://docs.gitlab.com/ci/jobs/ci_job_token/#limit-your-projects-job-token-access">limit access _from_ your project's CI/CD job tokens (`CI_JOB_TOKEN`)</a> to make it more secure.
This setting was called **Limit CI_JOB_TOKEN access**. In GitLab 16.3, we renamed this setting to **Limit access _from_ this project** for clarity.

In GitLab 15.9, we introduced an alternative setting called
<a href="https://docs.gitlab.com/ci/jobs/ci_job_token/#add-a-group-or-project-to-the-job-token-allowlist">**Authorized groups and projects**</a>.
This setting controls job token access _to_ your project by using an allowlist.
This new setting is a large improvement over the original. The first iteration was deprecated
in GitLab 16.0 and scheduled for removal in GitLab 18.0.

The **Limit access _from_ this project** setting is disabled by default for all new projects.
In GitLab 16.0 and later, you cannot re-enable this setting after it is disabled in any project.
Instead, use the **Authorized groups and projects** setting to control job token access to your projects.
]]></description>
      <pubDate>Tue, 14 Feb 2023 13:58:35 +0000</pubDate>
    </item>
    <item>
      <title>Queue selector for running Sidekiq is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390787</link>
      <description><![CDATA[Running Sidekiq with a <a href="https://docs.gitlab.com/administration/sidekiq/processing_specific_job_classes/#queue-selectors">queue selector</a> (having multiple processes listening to a set of queues) and <a href="https://docs.gitlab.com/administration/sidekiq/processing_specific_job_classes/#negate-settings">negate settings</a> is deprecated and will be fully removed in 17.0.

You can migrate away from queue selectors to <a href="https://docs.gitlab.com/administration/sidekiq/extra_sidekiq_processes/#start-multiple-processes">listening to all queues in all processes</a>. For example, if Sidekiq is currently running with 4 processes (denoted by 4 elements in `sidekiq['queue_groups']` in `/etc/gitlab/gitlab.rb`) with queue selector (`sidekiq['queue_selector'] = true`), you can change Sidekiq to listen to all queues in all 4 processes,for example `sidekiq['queue_groups'] = ['*'] * 4`. This approach is also recommended in our <a href="https://docs.gitlab.com/administration/reference_architectures/5k_users/#configure-sidekiq">Reference Architecture</a>. Note that Sidekiq can effectively run as many processes as the number of CPUs in the machine.

While the above approach is recommended for most instances, Sidekiq can also be run using <a href="https://docs.gitlab.com/administration/sidekiq/processing_specific_job_classes/#routing-rules">routing rules</a> which is also being used on GitLab.com. You can follow the <a href="https://docs.gitlab.com/administration/sidekiq/processing_specific_job_classes/#migrating-from-queue-selectors-to-routing-rules">migration guide from queue selectors to routing rules</a>. You need to take care with the migration to avoid losing jobs entirely.
]]></description>
      <pubDate>Mon, 13 Feb 2023 09:46:43 +0000</pubDate>
    </item>
    <item>
      <title>HashiCorp Vault integration will no longer use the `CI_JOB_JWT` CI/CD job token by default</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/366798</link>
      <description><![CDATA[As part of our effort to improve the security of your CI workflows using JWT and OIDC, the native HashiCorp integration is also being updated in GitLab 16.0. Any projects that use the <a href="https://docs.gitlab.com/ci/yaml/#secretsvault">`secrets:vault`</a> keyword to retrieve secrets from Vault will need to be <a href="https://docs.gitlab.com/ci/secrets/id_token_authentication/#configure-automatic-id-token-authentication">configured to use the ID tokens</a>. ID tokens were introduced in 15.7.

To prepare for this change, use the new <a href="https://docs.gitlab.com/ci/yaml/#id_tokens">`id_tokens`</a>
keyword and configure the `aud` claim. Ensure the bound audience is prefixed with `https://`.

In GitLab 15.9 to 15.11, you can <a href="https://docs.gitlab.com/ci/secrets/id_token_authentication/#enable-automatic-id-token-authentication">enable the **Limit JSON Web Token (JWT) access**</a>
setting, which prevents the old tokens from being exposed to any jobs and enables
<a href="https://docs.gitlab.com/ci/secrets/id_token_authentication/#configure-automatic-id-token-authentication">ID token authentication for the `secrets:vault` keyword</a>.

In GitLab 16.0 and later:

- This setting will be removed.
- CI/CD jobs that use the `id_tokens` keyword can use ID tokens with `secrets:vault`,
  and will not have any `CI_JOB_JWT*` tokens available.
- Jobs that do not use the `id_tokens` keyword will continue to have the `CI_JOB_JWT*`
  tokens available until GitLab 17.0.
]]></description>
      <pubDate>Fri, 10 Feb 2023 10:08:20 +0000</pubDate>
    </item>
    <item>
      <title>Required Pipeline Configuration is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/389467</link>
      <description><![CDATA[Required pipeline configuration will be removed in GitLab 17.0. This impacts users on GitLab Self-Managed on the Ultimate tier.

You should replace required pipeline configuration with either:

- <a href="https://docs.gitlab.com/user/application_security/policies/scan_execution_policies/#security-policy-scopes">Security policies scoped to compliance frameworks</a>, which are experimental.
- <a href="https://docs.gitlab.com/user/group/compliance_pipelines/">Compliance pipelines</a>, which are available now.

We recommend these alternative solutions because they provides greater flexibility, allowing required pipelines to be assigned to specific
compliance framework labels.

Compliance pipelines will be deprecated in the future and migrated to security policies. For more information, see the
<a href="https://gitlab.com/groups/gitlab-org/-/epics/11275">migration and deprecation epic</a>.
]]></description>
      <pubDate>Fri, 10 Feb 2023 06:04:43 +0000</pubDate>
    </item>
    <item>
      <title>Development dependencies reported for PHP and Python</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/375505</link>
      <description><![CDATA[In GitLab 16.0 the GitLab dependency scanning analyzer will begin reporting development dependencies for both Python/pipenv and PHP/composer projects. Users who do not wish to have these development dependencies reported should set `DS_INCLUDE_DEV_DEPENDENCIES: false` in their CI/CD file.
]]></description>
      <pubDate>Wed, 8 Feb 2023 04:37:21 +0000</pubDate>
    </item>
    <item>
      <title>Support for Praefect custom metrics endpoint configuration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/390266</link>
      <description><![CDATA[Support for using the `prometheus_exclude_database_from_default_metrics` configuration value is deprecated in GitLab
15.9 and will be removed in GitLab 16.0. We are removing this configuration value because using it is non-performant.
This change means the following metrics will become unavailable on `/metrics`:

- `gitaly_praefect_unavailable_repositories`.
- `gitaly_praefect_verification_queue_depth`.
- `gitaly_praefect_replication_queue_depth`.

This may require updating your metrics collection targets to also scrape `/db_metrics`.
]]></description>
      <pubDate>Tue, 7 Feb 2023 00:30:10 +0000</pubDate>
    </item>
    <item>
      <title>Embedding Grafana panels in Markdown is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/389477</link>
      <description><![CDATA[The ability to add Grafana panels in GitLab Flavored Markdown is deprecated in 15.9 and will be removed in 16.0.
We intend to replace this feature with the ability to <a href="https://gitlab.com/groups/gitlab-org/opstrace/-/epics/33">embed charts</a> with the <a href="https://gitlab.com/gitlab-org/opstrace/opstrace-ui">GitLab Observability UI</a>.
]]></description>
      <pubDate>Mon, 6 Feb 2023 11:54:56 +0000</pubDate>
    </item>
    <item>
      <title>Option to delete projects immediately is deprecated from deletion protection settings</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/389557</link>
      <description><![CDATA[The group and project deletion protection setting in the **Admin** area had an option to delete groups and projects immediately. Starting with 16.0, this option will no longer be available, and delayed group and project deletion will become the default behavior.

The option will no longer appear as a group setting. Users on GitLab Self-Managed will still have the option to define the deletion delay period, and GitLab.com users have a non-adjustable default retention period of 7 days. Users can still immediately delete the project from the project settings, and the group from the group settings.

The option to delete groups and projects immediately by default was deprecated to prevent users from accidentally taking this action and permanently losing groups and projects.
]]></description>
      <pubDate>Fri, 3 Feb 2023 13:12:03 +0000</pubDate>
    </item>
    <item>
      <title>CI/CD jobs will fail when no secret is returned from HashiCorp Vault</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/353080</link>
      <description><![CDATA[When using the native HashiCorp Vault integration, CI/CD jobs will fail when no secret is returned from Vault. Make sure your configuration always return a secret, or update your pipeline to handle this change, before GitLab 16.0.
]]></description>
      <pubDate>Mon, 30 Jan 2023 23:21:01 +0000</pubDate>
    </item>
    <item>
      <title>GitLab Runner platforms and setup instructions in GraphQL API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387937</link>
      <description><![CDATA[The `runnerPlatforms` and `runnerSetup` queries to get GitLab Runner platforms and installation instructions
are deprecated and will be removed from the GraphQL API. For installation instructions, see the
<a href="https://docs.gitlab.com/runner/">GitLab Runner documentation</a> instead of using these API queries.
]]></description>
      <pubDate>Wed, 25 Jan 2023 14:08:02 +0000</pubDate>
    </item>
    <item>
      <title>Cookie authorization in the GitLab for Jira Cloud app</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387299</link>
      <description><![CDATA[Cookie authentication in the GitLab for Jira Cloud app is now deprecated in favor of OAuth authentication.
On GitLab Self-Managed, you must <a href="https://docs.gitlab.com/integration/jira/connect-app/#set-up-oauth-authentication-for-self-managed-instances">set up OAuth authentication</a>
to continue to use the GitLab for Jira Cloud app. Without OAuth, you can't manage linked namespaces.
]]></description>
      <pubDate>Thu, 19 Jan 2023 15:31:36 +0000</pubDate>
    </item>
    <item>
      <title>Automatic backup upload using OpenStack Swift and Rackspace APIs</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387976</link>
      <description><![CDATA[We are deprecating support for **uploading backups to remote storage** using OpenStack Swift and Rackspace APIs. The support for these APIs depends on third-party libraries that are no longer actively maintained and have not been updated for Ruby 3. GitLab is switching over to Ruby 3 prior to EOL of Ruby 2 in order to stay up to date on security patches.

- If you're using OpenStack, you need to change you configuration to use the S3 API instead of Swift.
- If you're using Rackspace storage, you need to switch to a different provider or manually upload the backup file after the backup task is complete.
]]></description>
      <pubDate>Thu, 19 Jan 2023 13:34:58 +0000</pubDate>
    </item>
    <item>
      <title>Configuring Redis config file paths using environment variables is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/388255</link>
      <description><![CDATA[You can no longer specify Redis configuration file locations
using the environment variables like `GITLAB_REDIS_CACHE_CONFIG_FILE` or
`GITLAB_REDIS_QUEUES_CONFIG_FILE`. Use the default
config file locations instead, for example `config/redis.cache.yml` or
`config/redis.queues.yml`.
]]></description>
      <pubDate>Wed, 18 Jan 2023 09:44:28 +0000</pubDate>
    </item>
    <item>
      <title>Deployment API returns error when `updated_at` and `updated_at` are not used together</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/328500</link>
      <description><![CDATA[The Deployment API will now return an error when `updated_at` filtering and `updated_at` sorting are not used together. Some users were using filtering by `updated_at` to fetch "latest" deployment without using `updated_at` sorting, which may produce wrong results. You should instead use them together, or migrate to filtering by `finished_at` and sorting by `finished_at` which will give you "latest deployments" in a consistent way.
]]></description>
      <pubDate>Wed, 18 Jan 2023 03:55:34 +0000</pubDate>
    </item>
    <item>
      <title>Projects API field `operations_access_level` is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/385798</link>
      <description><![CDATA[We are deprecating the `operations_access_level` field in the Projects API. This field has been replaced by fields to control specific features: `releases_access_level`, `environments_access_level`, `feature_flags_access_level`, `infrastructure_access_level`, and `monitor_access_level`.
]]></description>
      <pubDate>Wed, 18 Jan 2023 00:00:01 +0000</pubDate>
    </item>
    <item>
      <title>Live Preview no longer available in the Web IDE</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/383889</link>
      <description><![CDATA[The Live Preview feature of the Web IDE was intended to provide a client-side preview of static web applications. However, complex configuration steps and a narrow set of supported project types have limited its utility. With the introduction of the Web IDE Beta in GitLab 15.7, you can now connect to a full server-side runtime environment. With upcoming support for installing extensions in the Web IDE, we'll also support more advanced workflows than those available with Live Preview. As of GitLab 15.9, Live Preview is no longer available in the Web IDE.
]]></description>
      <pubDate>Tue, 17 Jan 2023 22:40:02 +0000</pubDate>
    </item>
    <item>
      <title>GitLab Helm chart values `gitlab.kas.privateApi.tls.*` are deprecated</title>
      <link>https://gitlab.com/gitlab-org/charts/gitlab/-/issues/4097</link>
      <description><![CDATA[We introduced the `global.kas.tls.*` Helm values to facilitate TLS communication between KAS and your Helm chart components.
The old values `gitlab.kas.privateApi.tls.enabled` and `gitlab.kas.privateApi.tls.secretName` are deprecated and scheduled for removal in GitLab 17.0.

Because the new values provide a streamlined, comprehensive method to enable TLS for KAS, you should use `global.kas.tls.*` instead of `gitlab.kas.privateApi.tls.*`. The `gitlab.kas.privateApi.tls.*` For more information, see:

- The <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/2888">merge request</a> that introduces the `global.kas.tls.*` values.
- The <a href="https://docs.gitlab.com/charts/charts/gitlab/kas/#enable-tls-communication-through-the-gitlabkasprivateapi-attributes-deprecated">deprecated `gitlab.kas.privateApi.tls.*` documentation</a>.
- The <a href="https://docs.gitlab.com/charts/charts/globals/#tls-settings-1">new `global.kas.tls.*` documentation</a>.
]]></description>
      <pubDate>Tue, 17 Jan 2023 17:04:55 +0000</pubDate>
    </item>
    <item>
      <title>Auto DevOps no longer provisions a PostgreSQL database by default</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/343988</link>
      <description><![CDATA[Currently, Auto DevOps provisions an in-cluster PostgreSQL database by default.
In GitLab 16.0, databases will be provisioned only for users who opt in. This
change supports production deployments that require more robust database management.

If you want Auto DevOps to provision an in-cluster database,
set the `POSTGRES_ENABLED` CI/CD variable to `true`.
]]></description>
      <pubDate>Tue, 17 Jan 2023 16:52:51 +0000</pubDate>
    </item>
    <item>
      <title>Auto DevOps support for Herokuish is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/211643</link>
      <description><![CDATA[Auto DevOps support for Herokuish is deprecated in favor of <a href="https://docs.gitlab.com/topics/autodevops/stages/#auto-build-using-cloud-native-buildpacks">Cloud Native Buildpacks</a>. You should <a href="https://docs.gitlab.com/topics/autodevops/stages/#moving-from-herokuish-to-cloud-native-buildpacks">migrate your builds from Herokuish to Cloud Native Buildpacks</a>. From GitLab 14.0, Auto Build uses Cloud Native Buildpacks by default.

Because Cloud Native Buildpacks do not support automatic testing, the Auto Test feature of Auto DevOps is also deprecated.
]]></description>
      <pubDate>Tue, 17 Jan 2023 16:39:36 +0000</pubDate>
    </item>
    <item>
      <title>Non-standard default Redis ports are deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/388269</link>
      <description><![CDATA[If GitLab starts without any Redis configuration file present,
GitLab assumes it can connect to three Redis servers at `localhost:6380`,
`localhost:6381` and `localhost:6382`. We are changing this behavior
so GitLab assumes there is one Redis server at `localhost:6379`.

Administrators who want to keep the three servers must configure
the Redis URLs by editing the `config/redis.cache.yml`,`config/redis.queues.yml`
and `config/redis.shared_state.yml` files.
]]></description>
      <pubDate>Tue, 17 Jan 2023 16:28:03 +0000</pubDate>
    </item>
    <item>
      <title>The latest Terraform templates will overwrite current stable templates</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/386001</link>
      <description><![CDATA[With every major GitLab version, we update the stable Terraform templates with the current latest templates.
This change affects the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Terraform.gitlab-ci.yml">quickstart</a>
and the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Terraform/Base.gitlab-ci.yml">base</a> templates.

Because the new templates ship with default rules, the update might break your Terraform pipelines.
For example, if your Terraform jobs are triggered as a downstream pipeline, the rules won't trigger your jobs
in GitLab 16.0.

To accommodate the changes, you might need to adjust the <a href="https://docs.gitlab.com/ci/yaml/#rules">`rules`</a> in your
`.gitlab-ci.yml` file.
]]></description>
      <pubDate>Tue, 17 Jan 2023 15:39:25 +0000</pubDate>
    </item>
    <item>
      <title>The API no longer returns revoked tokens for the agent for Kubernetes</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/382129</link>
      <description><![CDATA[Currently, GET requests to the <a href="https://docs.gitlab.com/api/cluster_agents/#list-tokens-for-an-agent">Cluster Agents API</a>
endpoints can return revoked tokens. In GitLab 16.0, GET requests will not return revoked tokens.

You should review your calls to these endpoints and ensure you do not use revoked tokens.

This change affects the following REST and GraphQL API endpoints:

- REST API:
  - <a href="https://docs.gitlab.com/api/cluster_agents/#list-tokens-for-an-agent">List tokens</a>
  - <a href="https://docs.gitlab.com/api/cluster_agents/#get-a-single-agent-token">Get a single token</a>
- GraphQL:
  - <a href="https://docs.gitlab.com/api/graphql/reference/#clusteragenttokens">`ClusterAgent.tokens`</a>
]]></description>
      <pubDate>Tue, 17 Jan 2023 15:21:30 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL: The `DISABLED_WITH_OVERRIDE` value for the `SharedRunnersSetting` enum is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/385636</link>
      <description><![CDATA[In GitLab 17.0, the `DISABLED_WITH_OVERRIDE` value of the `SharedRunnersSetting` GraphQL enum type will be removed.
Use `DISABLED_AND_OVERRIDABLE` instead.
]]></description>
      <pubDate>Mon, 16 Jan 2023 15:25:53 +0000</pubDate>
    </item>
    <item>
      <title>`environment_tier` parameter for DORA API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/365939</link>
      <description><![CDATA[To avoid confusion and duplication, the `environment_tier` parameter is deprecated in favor of the `environment_tiers` parameter. The new `environment_tiers` parameter allows DORA APIs to return aggregated data for multiple tiers at the same time. The `environment_tier` parameter will be removed in GitLab 16.0.
]]></description>
      <pubDate>Mon, 16 Jan 2023 11:27:50 +0000</pubDate>
    </item>
    <item>
      <title>Developer role providing the ability to import projects to a group</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387891</link>
      <description><![CDATA[The ability for users with the Developer role for a group to import projects to that group is deprecated in GitLab
15.8 and will be removed in GitLab 16.0. From GitLab 16.0, only users with the Maintainer or Owner role for a group
will be able to import projects to that group.
]]></description>
      <pubDate>Mon, 16 Jan 2023 12:38:31 +1000</pubDate>
    </item>
    <item>
      <title>Limit personal access token and deploy token's access with external authorization</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387721</link>
      <description><![CDATA[With external authorization enabled, personal access tokens (PATs) and deploy tokens must no longer be able to access container or package registries. This defense-in-depth security measure will be deployed in 16.0. For users that use PATs and deploy tokens to access these registries, this measure breaks this use of these tokens. Disable external authorization to use tokens with container or package registries.
]]></description>
      <pubDate>Thu, 12 Jan 2023 17:59:45 +0000</pubDate>
    </item>
    <item>
      <title>The Visual Reviews tool is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387751</link>
      <description><![CDATA[Due to limited customer usage and capabilities, the Visual Reviews feature for Review Apps is deprecated and will be removed. There is no planned replacement and users should stop using Visual Reviews before GitLab 17.0.
]]></description>
      <pubDate>Thu, 12 Jan 2023 06:52:09 +0000</pubDate>
    </item>
    <item>
      <title>Dependency scanning support for Java 13, 14, 15, and 16</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/387560</link>
      <description><![CDATA[GitLab has deprecated dependency scanning support for Java versions 13, 14, 15, and 16 and plans to remove that support in the upcoming GitLab 16.0 release. This is consistent with <a href="https://www.oracle.com/java/technologies/java-se-support-roadmap.html">Oracle support policy</a> as Oracle Premier and Extended Support for these versions has ended. This also allows GitLab to focus dependency scanning Java support on LTS versions moving forward.
]]></description>
      <pubDate>Tue, 10 Jan 2023 05:01:12 +0000</pubDate>
    </item>
    <item>
      <title>Maintainer role providing the ability to change Package settings using GraphQL API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/370471</link>
      <description><![CDATA[The ability for users with the Maintainer role to change the **Packages and registries** settings for a group using
the GraphQL API is deprecated in GitLab 15.8 and will be removed in GitLab 17.0. These settings include:

- <a href="https://docs.gitlab.com/user/packages/maven_repository/#do-not-allow-duplicate-maven-packages">Allowing or preventing duplicate package uploads</a>.
- <a href="https://docs.gitlab.com/user/packages/maven_repository/#request-forwarding-to-maven-central">Package request forwarding</a>.
- <a href="https://docs.gitlab.com/user/packages/dependency_proxy/reduce_dependency_proxy_storage/">Enabling lifecycle rules for the Dependency Proxy</a>.

In GitLab 17.0 and later, you must have the Owner role for a group to change the **Packages and registries**
settings for the group using either the GitLab UI or GraphQL API.
]]></description>
      <pubDate>Thu, 5 Jan 2023 21:31:29 +0000</pubDate>
    </item>
    <item>
      <title>Azure Storage Driver defaults to the correct root prefix</title>
      <link>https://gitlab.com/gitlab-org/container-registry/-/issues/854</link>
      <description><![CDATA[The container registry's Azure Storage Driver writes to `//` as the default root directory. This default root directory appears in some places within the Azure UI as `/<no-name>/`. We have maintained this legacy behavior to support older deployments using this storage driver. However, when moving to Azure from another storage driver, this behavior hides all your data until you configure the storage driver to build root paths without an extra leading slash by setting `trimlegacyrootprefix: true`.

The new default configuration for the storage driver will set `trimlegacyrootprefix: true`, and `/` will be the default root directory. You can add `trimlegacyrootprefix: false` to your current configuration to avoid any disruptions.

This breaking change will happen in GitLab 16.0.
]]></description>
      <pubDate>Thu, 5 Jan 2023 20:11:35 +0000</pubDate>
    </item>
    <item>
      <title>Conan project-level search endpoint returns project-specific results</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/384455</link>
      <description><![CDATA[You can use the GitLab Conan repository with <a href="https://docs.gitlab.com/user/packages/conan_repository/#add-a-remote-for-your-project">project-level</a> or <a href="https://docs.gitlab.com/user/packages/conan_repository/#add-a-remote-for-your-instance">instance-level</a> endpoints. Each level supports the Conan search command. However, the search endpoint for the project level is also returning packages from outside the target project.

This unintended functionality is deprecated in GitLab 15.8 and will be removed in GitLab 16.0. The search endpoint for the project level will only return packages from the target project.
]]></description>
      <pubDate>Thu, 5 Jan 2023 00:35:48 +0000</pubDate>
    </item>
    <item>
      <title>Use of third party container registries is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/376216</link>
      <description><![CDATA[Using third-party container registries with GitLab as an auth endpoint is deprecated in GitLab 15.8 and the <a href="https://docs.gitlab.com/development/deprecation_guidelines/#terminology">end of support</a> is scheduled for GitLab 16.0. This impacts users on GitLab Self-Managed that have connected their external registry to the GitLab user interface to find, view, and delete container images.

Supporting both the GitLab container registry as well as third-party container registries is challenging for maintenance, code quality, and backward compatibility, and hinders our ability to stay efficient. As a result we will not support this functionality moving forward.

This change will not impact your ability to pull and push container images to external registries using pipelines.

Since we released the new <a href="https://gitlab.com/groups/gitlab-org/-/epics/5523">GitLab container registry</a> version for GitLab.com, we've started to implement additional features that are not available in third-party container registries. These new features have allowed us to achieve significant performance improvements, such as <a href="https://gitlab.com/groups/gitlab-org/-/epics/8379">cleanup policies</a>. We are focusing on delivering <a href="https://gitlab.com/groups/gitlab-org/-/epics/5136">new features</a>, most of which will require functionalities only available on the GitLab container registry. This deprecation allows us to reduce fragmentation and user frustration in the long term by focusing on delivering a more robust integrated registry experience and feature set.

Moving forward, we'll continue to invest in developing and releasing new features that will only be available in the GitLab container registry.
]]></description>
      <pubDate>Wed, 4 Jan 2023 21:01:04 +0000</pubDate>
    </item>
    <item>
      <title>Container registry pull-through cache</title>
      <link>https://gitlab.com/gitlab-org/container-registry/-/issues/842</link>
      <description><![CDATA[The container registry <a href="https://docs.docker.com/docker-hub/mirror/">pull-through cache</a> is deprecated in GitLab 15.8 and will be removed in GitLab 16.0. The pull-through cache is part of the upstream <a href="https://github.com/distribution/distribution">Docker Distribution project</a>. However, we are removing the pull-through cache in favor of the GitLab Dependency Proxy, which allows you to proxy and cache container images from Docker Hub. Removing the pull-through cache allows us also to remove the upstream client code without sacrificing functionality.
]]></description>
      <pubDate>Wed, 4 Jan 2023 19:55:34 +0000</pubDate>
    </item>
    <item>
      <title>Support for periods (`.`) in Terraform state names might break existing states</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/385564</link>
      <description><![CDATA[Previously, Terraform state names containing periods were not supported. However, you could still use state names with periods via a workaround.

GitLab 15.7 <a href="https://docs.gitlab.com/user/infrastructure/iac/troubleshooting/#state-not-found-if-the-state-name-contains-a-period">adds full support</a> for state names that contain periods. If you used a workaround to handle these state names, your jobs might fail, or it might look like you've run Terraform for the first time.

To resolve the issue:

1. Change any references to the state file by excluding the period and any characters that follow.
   - For example, if your state name is `state.name`, change all references to `state`.
1. Run your Terraform commands.

To use the full state name, including the period, <a href="https://docs.gitlab.com/user/infrastructure/iac/terraform_state/#migrate-to-a-gitlab-managed-terraform-state">migrate to the full state file</a>.
]]></description>
      <pubDate>Thu, 15 Dec 2022 21:43:25 +0000</pubDate>
    </item>
    <item>
      <title>The `gitlab-runner exec` command is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/385235</link>
      <description><![CDATA[The `gitlab-runner exec` command is deprecated and will be fully removed from GitLab Runner in 16.0. The `gitlab-runner exec` feature was initially developed to provide the ability to validate a GitLab CI pipeline on a local system without needing to commit the updates to a GitLab instance. However, with the continued evolution of GitLab CI, replicating all GitLab CI features into `gitlab-runner exec` was no longer viable. Pipeline syntax and validation <a href="https://docs.gitlab.com/ci/pipeline_editor/#simulate-a-cicd-pipeline">simulation</a> are available in the GitLab pipeline editor.
]]></description>
      <pubDate>Wed, 14 Dec 2022 08:57:59 +0000</pubDate>
    </item>
    <item>
      <title>DAST ZAP advanced configuration variables deprecation</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/383467</link>
      <description><![CDATA[With the new browser-based DAST analyzer GA in GitLab 15.7, we are working towards making it the default DAST analyzer at some point in the future. In preparation for this, the following legacy DAST variables are being deprecated and scheduled for removal in GitLab 17.0: `DAST_ZAP_CLI_OPTIONS` and `DAST_ZAP_LOG_CONFIGURATION`. These variables allowed for advanced configuration of the legacy DAST analyzer, which was based on OWASP ZAP. The new browser-based analyzer will not include the same functionality, as these were specific to how ZAP worked.

These three variables will be removed in GitLab 17.0.
]]></description>
      <pubDate>Wed, 14 Dec 2022 02:15:43 +0000</pubDate>
    </item>
    <item>
      <title>DAST report variables deprecation</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/384340</link>
      <description><![CDATA[With the new browser-based DAST analyzer GA in GitLab 15.7, we are working towards making it the default DAST analyzer at some point in the future. In preparation for this, the following legacy DAST variables are being deprecated and scheduled for removal in GitLab 16.0: `DAST_HTML_REPORT`, `DAST_XML_REPORT`, and `DAST_MARKDOWN_REPORT`. These reports relied on the legacy DAST analyzer and we do not plan to implement them in the new browser-based analyzer. As of GitLab 16.0, these report artifacts will no longer be generated.

These three variables will be removed in GitLab 16.0.
]]></description>
      <pubDate>Wed, 14 Dec 2022 00:36:42 +0000</pubDate>
    </item>
    <item>
      <title>DAST API scans using DAST template is deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/384198</link>
      <description><![CDATA[With the move to the new DAST API analyzer and the `DAST-API.gitlab-ci.yml` template for DAST API scans, we will be removing the ability to scan APIs with the DAST analyzer. Use of the `DAST.gitlab-ci.yml` or `DAST-latest.gitlab-ci.yml` templates for API scans is deprecated as of GitLab 15.7 and will no longer work in GitLab 16.0. Please use `DAST-API.gitlab-ci.yml` template and refer to the <a href="https://docs.gitlab.com/user/application_security/dast_api/#configure-dast-api-with-an-openapi-specification">DAST API analyzer</a> documentation for configuration details.
]]></description>
      <pubDate>Tue, 13 Dec 2022 23:44:47 +0000</pubDate>
    </item>
    <item>
      <title>The Phabricator task importer is deprecated</title>
      <link>https://gitlab.com/gitlab-com/Product/-/issues/4894</link>
      <description><![CDATA[The Phabricator task importer is being deprecated. Phabricator itself as a project is no longer actively maintained since June 1, 2021. We haven't observed imports using this tool. There has been no activity on the open related issues on GitLab.
]]></description>
      <pubDate>Fri, 9 Dec 2022 15:58:15 +0000</pubDate>
    </item>
    <item>
      <title>Shimo integration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/377824</link>
      <description><![CDATA[The **Shimo Workspace integration** has been deprecated
and will be moved to the JiHu GitLab codebase.
]]></description>
      <pubDate>Thu, 8 Dec 2022 13:05:21 +0000</pubDate>
    </item>
    <item>
      <title>DAST API variables</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/383467</link>
      <description><![CDATA[With the switch to the new DAST API analyzer in GitLab 15.6, two legacy DAST API variables are being deprecated. The variables `DAST_API_HOST_OVERRIDE` and `DAST_API_SPECIFICATION` will no longer be used for DAST API scans.

`DAST_API_HOST_OVERRIDE` has been deprecated in favor of using the `DAST_API_TARGET_URL` to automatically override the host in the OpenAPI specification.

`DAST_API_SPECIFICATION` has been deprecated in favor of `DAST_API_OPENAPI`. To continue using an OpenAPI specification to guide the test, users must replace the `DAST_API_SPECIFICATION` variable with the `DAST_API_OPENAPI` variable. The value can remain the same, but the variable name must be replaced.

These two variables will be removed in GitLab 16.0.
]]></description>
      <pubDate>Tue, 29 Nov 2022 04:03:15 +0000</pubDate>
    </item>
    <item>
      <title>`POST ci/lint` API endpoint deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/381669</link>
      <description><![CDATA[The `POST ci/lint` API endpoint is deprecated in 15.7, and will be removed in 16.0. This endpoint does not validate the full range of CI/CD configuration options. Instead, use <a href="https://docs.gitlab.com/api/lint/#validate-a-ci-yaml-configuration-with-a-namespace">`POST /projects/:id/ci/lint`</a>, which properly validates CI/CD configuration.
]]></description>
      <pubDate>Thu, 24 Nov 2022 16:30:28 +0000</pubDate>
    </item>
    <item>
      <title>KAS Metrics Port in GitLab Helm Chart</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/383039</link>
      <description><![CDATA[The `gitlab.kas.metrics.port` has been deprecated in favor of the new `gitlab.kas.observability.port` configuration field for the <a href="https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/2839">GitLab Helm Chart</a>.
This port is used for much more than just metrics, which warranted this change to avoid confusion in configuration.
]]></description>
      <pubDate>Wed, 23 Nov 2022 21:31:15 +0000</pubDate>
    </item>
    <item>
      <title>Configuration fields in GitLab Runner Helm Chart</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/379064</link>
      <description><![CDATA[From GitLab 13.6, users can <a href="https://docs.gitlab.com/runner/install/kubernetes/">specify any runner configuration in the GitLab Runner Helm chart</a>. When we implemented this feature, we deprecated values in the GitLab Helm Chart configuration that were specific to GitLab Runner. The deprecated values will be removed in GitLab 16.0.
]]></description>
      <pubDate>Thu, 10 Nov 2022 08:25:13 -0500</pubDate>
    </item>
    <item>
      <title>Changing merge request approvals with the `/approvals` API endpoint</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/353097</link>
      <description><![CDATA[To change the approvals required for a merge request, you should no longer use the `/approvals` API endpoint, which was deprecated in GitLab 14.0.

Instead, use the <a href="https://docs.gitlab.com/api/merge_request_approvals/#merge-request-level-mr-approvals">`/approval_rules` endpoint</a> to <a href="https://docs.gitlab.com/api/merge_request_approvals/#create-merge-request-level-rule">create</a> or <a href="https://docs.gitlab.com/api/merge_request_approvals/#update-merge-request-level-rule">update</a> the approval rules for a merge request.
]]></description>
      <pubDate>Wed, 9 Nov 2022 20:52:03 +0000</pubDate>
    </item>
    <item>
      <title>File Type variable expansion in `.gitlab-ci.yml`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/29407</link>
      <description><![CDATA[Previously, variables that referenced or applied alias file variables expanded the value of the `File` type variable. For example, the file contents. This behavior was incorrect because it did not comply with typical shell variable expansion rules. To leak secrets or sensitive information stored in `File` type variables, a user could run an $echo command with the variable as an input parameter.

This breaking change fixes this issue but could disrupt user workflows that work around the behavior. With this change, job variable expansions that reference or apply alias file variables, expand to the filename or path of the `File` type variable, instead of its value, such as the file contents.
]]></description>
      <pubDate>Thu, 20 Oct 2022 10:44:58 -0600</pubDate>
    </item>
    <item>
      <title>GraphQL field `confidential` changed to `internal` on notes</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/371485</link>
      <description><![CDATA[The `confidential` field for a `Note` will be deprecated and renamed to `internal`.
]]></description>
      <pubDate>Fri, 14 Oct 2022 10:53:46 +0200</pubDate>
    </item>
    <item>
      <title>`vulnerabilityFindingDismiss` GraphQL mutation</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/375645</link>
      <description><![CDATA[The `VulnerabilityFindingDismiss` GraphQL mutation is being deprecated and will be removed in GitLab 16.0. This mutation was not used often as the Vulnerability Finding ID was not available to users (this field was <a href="https://docs.gitlab.com/update/deprecations/#use-of-id-field-in-vulnerabilityfindingdismiss-mutation">deprecated in 15.3</a>). Users should instead use `VulnerabilityDismiss` to dismiss vulnerabilities in the Vulnerability Report or `SecurityFindingDismiss` for security findings in the CI Pipeline Security tab.
]]></description>
      <pubDate>Wed, 12 Oct 2022 16:48:58 +0000</pubDate>
    </item>
    <item>
      <title>Vulnerability confidence field</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/372332</link>
      <description><![CDATA[In GitLab 15.3, <a href="https://docs.gitlab.com/update/deprecations/#security-report-schemas-version-14xx">security report schemas below version 15 were deprecated</a>.
The `confidence` attribute on vulnerability findings exists only in schema versions before `15-0-0`, and therefore is effectively deprecated because GitLab 15.4 supports schema version `15-0-0`. To maintain consistency
between the reports and our public APIs, the `confidence` attribute on any vulnerability-related components of our GraphQL API is now deprecated and will be
removed in 17.0.
]]></description>
      <pubDate>Tue, 13 Sep 2022 19:05:35 +0000</pubDate>
    </item>
    <item>
      <title>Toggle behavior of `/draft` quick action in merge requests</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/365365</link>
      <description><![CDATA[In order to make the behavior of toggling the draft status of a merge request more clear via a quick action, we're deprecating and removing the toggle behavior of the `/draft` quick action. Beginning with the 16.0 release of GitLab, `/draft` will only set a merge request to Draft and a new `/ready` quick action will be used to remove the draft status.
]]></description>
      <pubDate>Tue, 13 Sep 2022 18:19:43 +0000</pubDate>
    </item>
    <item>
      <title>Starboard directive in the configuration of the GitLab agent for Kubernetes</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/368828</link>
      <description><![CDATA[GitLab container scanning capabilities no longer require starboard to be installed. Consequently, use of the `starboard:` directive in the configuration file for the GitLab agent for Kubernetes is now deprecated and is scheduled for removal in GitLab 16.0. Update your configuration file to use the `container_scanning:` directive.
]]></description>
      <pubDate>Mon, 12 Sep 2022 21:23:23 +0000</pubDate>
    </item>
    <item>
      <title>Container scanning variables that reference Docker</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/371840</link>
      <description><![CDATA[All container scanning variables that are prefixed by `DOCKER_` in variable name are deprecated. This includes the `DOCKER_IMAGE`, `DOCKER_PASSWORD`, `DOCKER_USER`, and `DOCKERFILE_PATH` variables. Support for these variables will be removed in the GitLab 16.0 release. Use the <a href="https://docs.gitlab.com/user/application_security/container_scanning/#available-cicd-variables">new variable names</a> `CS_IMAGE`, `CS_REGISTRY_PASSWORD`, `CS_REGISTRY_USER`, and `CS_DOCKERFILE_PATH` in place of the deprecated names.
]]></description>
      <pubDate>Mon, 12 Sep 2022 18:08:37 +0000</pubDate>
    </item>
    <item>
      <title>Non-expiring access tokens</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/369122</link>
      <description><![CDATA[Whether your existing project access tokens have expiry dates automatically applied depends on what GitLab offering you have, and when you upgraded to GitLab 16.0 or later:

- On GitLab.com, during the 16.0 milestone, existing project access tokens without an expiry date were automatically given an expiry date of 365 days later than the current date.
- On GitLab Self-Managed, if you upgraded from GitLab 15.11 or earlier to GitLab 16.0 or later:
  - On or before July 23, 2024, existing project access tokens without an expiry date were automatically given an expiry date of 365 days later than the current date.
    This change is a breaking change.
  - On or after July 24, 2024, existing project access tokens without an expiry date did not have an expiry date set.

On GitLab Self-Managed, if you do a new install of one of the following GitLab versions, your existing project access tokens do not have expiry dates automatically applied:

- 16.0.9
- 16.1.7
- 16.2.10
- 16.3.8
- 16.4.6
- 16.5.9
- 16.6.9
- 16.7.9
- 16.8.9
- 16.9.10
- 16.10.9
- 16.11.7
- 17.0.5
- 17.1.3
- 17.2.1

Access tokens that have no expiration date are valid indefinitely, which presents a security risk if the access token
is divulged. Because access tokens that have an expiration date are better, from GitLab 15.3 we
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/348660">populate a default expiration date</a>.

In GitLab 16.0, any <a href="https://docs.gitlab.com/user/profile/personal_access_tokens/">personal</a>,
<a href="https://docs.gitlab.com/user/project/settings/project_access_tokens/">project</a>, or
<a href="https://docs.gitlab.com/user/group/settings/group_access_tokens/">group</a> access token that does not have an
expiration date will automatically have an expiration date set at one year.

We recommend giving your access tokens an expiration date in line with your company's security policies before the
default is applied:

- On GitLab.com during the 16.0 milestone.
- On GitLab Self-Managed when they are upgraded to 16.0.
]]></description>
      <pubDate>Fri, 2 Sep 2022 00:26:50 +0000</pubDate>
    </item>
    <item>
      <title>Use of `id` field in `vulnerabilityFindingDismiss` mutation</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/367166</link>
      <description><![CDATA[You can use the `vulnerabilityFindingDismiss` GraphQL mutation to set the status of a vulnerability finding to `Dismissed`. Previously, this mutation used the `id` field to identify findings uniquely. However, this did not work for dismissing findings from the pipeline security tab. Therefore, using the `id` field as an identifier has been dropped in favor of the `uuid` field. Using the 'uuid' field as an identifier allows you to dismiss the finding from the pipeline security tab.
]]></description>
      <pubDate>Thu, 18 Aug 2022 09:32:50 +1000</pubDate>
    </item>
    <item>
      <title>Security report schemas version 14.x.x</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/366477</link>
      <description><![CDATA[Version 14.x.x <a href="https://gitlab.com/gitlab-org/security-products/security-report-schemas">security report schemas</a> are deprecated.

In GitLab 15.8 and later, <a href="https://docs.gitlab.com/development/integrations/secure/">security report scanner integrations</a> that use schema version 14.x.x will display a deprecation warning in the pipeline's **Security** tab.

In GitLab 16.0 and later, the feature will be removed. Security reports that use schema version 14.x.x will cause an error in the pipeline's **Security** tab.

For more information, refer to <a href="https://docs.gitlab.com/user/application_security/#security-report-validation">security report validation</a>.
]]></description>
      <pubDate>Tue, 16 Aug 2022 22:55:19 +0000</pubDate>
    </item>
    <item>
      <title>Redis 5 deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/331468</link>
      <description><![CDATA[With GitLab 13.9, in the Omnibus GitLab package and GitLab Helm chart 4.9, the Redis version <a href="https://about.gitlab.com/releases/2021/02/22/gitlab-13-9-released/#omnibus-improvements">was updated to Redis 6</a>.
Redis 5 has reached the end of life in April 2022 and will no longer be supported as of GitLab 15.6.
If you are using your own Redis 5.0 instance, you should upgrade it to Redis 6.0 or higher before upgrading to GitLab 16.0 or higher.
]]></description>
      <pubDate>Sat, 13 Aug 2022 08:34:55 +0000</pubDate>
    </item>
    <item>
      <title>CAS OmniAuth provider</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/369127</link>
      <description><![CDATA[The `omniauth-cas3` gem that provides GitLab with the CAS OmniAuth provider will be removed in our next major
release, GitLab 16.0. This gem sees very little use and its lack of upstream maintenance is preventing GitLab from
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/30073">upgrading to OmniAuth 2.0</a>.
]]></description>
      <pubDate>Wed, 10 Aug 2022 01:04:06 +0000</pubDate>
    </item>
    <item>
      <title>Remove `job_age` parameter from `POST /jobs/request` Runner endpoint</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/334253</link>
      <description><![CDATA[The `job_age` parameter, returned from the `POST /jobs/request` API endpoint used in communication with GitLab Runner, was never used by any GitLab or Runner feature. This parameter will be removed in GitLab 16.0.

This could be a breaking change for anyone that developed their own runner that relies on this parameter being returned by the endpoint. This is not a breaking change for anyone using an officially released version of GitLab Runner, including public shared runners on GitLab.com.
]]></description>
      <pubDate>Wed, 13 Jul 2022 08:00:45 +0000</pubDate>
    </item>
    <item>
      <title>`projectFingerprint` GraphQL field</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/343475</link>
      <description><![CDATA[The <a href="https://gitlab.com/groups/gitlab-org/-/epics/2791">`project_fingerprint`</a> attribute of vulnerability findings is being deprecated in favor of a `uuid` attribute. By using UUIDv5 values to identify findings, we can easily associate any related entity with a finding. The `project_fingerprint` attribute is no longer being used to track findings, and will be removed in GitLab 17.0. Starting in 16.1, the output of `project_fingerprint` returns the same value as the `uuid` field.
]]></description>
      <pubDate>Fri, 10 Jun 2022 18:33:08 +0000</pubDate>
    </item>
    <item>
      <title>`name` field for `PipelineSecurityReportFinding` GraphQL type</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/346335</link>
      <description><![CDATA[Previously, the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/335372">`PipelineSecurityReportFinding` GraphQL type was updated</a> to include a new `title` field. This field is an alias for the current `name` field, making the less specific `name` field redundant. The `name` field will be removed from the `PipelineSecurityReportFinding` type in GitLab 16.0.
]]></description>
      <pubDate>Fri, 10 Jun 2022 18:33:08 +0000</pubDate>
    </item>
    <item>
      <title>Jira DVCS connector for Jira Cloud</title>
      <link>https://gitlab.com/groups/gitlab-org/-/epics/7508</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/integration/jira/dvcs/">Jira DVCS connector</a> for Jira Cloud has been deprecated and will be removed in GitLab 16.0. If you're using the Jira DVCS connector with Jira Cloud, migrate to the <a href="https://docs.gitlab.com/integration/jira/connect-app/">GitLab for Jira Cloud app</a>.

The Jira DVCS connector is also deprecated for Jira 8.13 and earlier. You can only use the Jira DVCS connector with Jira Server or Jira Data Center in Jira 8.14 and later.
]]></description>
      <pubDate>Wed, 8 Jun 2022 16:05:25 +0000</pubDate>
    </item>
    <item>
      <title>PostgreSQL 12 deprecated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/349185</link>
      <description><![CDATA[Support for PostgreSQL 12 is scheduled for removal in GitLab 16.0.
In GitLab 16.0, PostgreSQL 13 becomes the minimum required PostgreSQL version.

PostgreSQL 12 will be supported for the full GitLab 15 release cycle.
PostgreSQL 13 will also be supported for instances that want to upgrade prior to GitLab 16.0.

Support for PostgreSQL 13 was added to Geo in GitLab 15.2.
]]></description>
      <pubDate>Wed, 11 May 2022 15:32:28 +0000</pubDate>
    </item>
    <item>
      <title>Dependency scanning default Java version changed to 17</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/85438</link>
      <description><![CDATA[In GitLab 15.0, for dependency scanning, the default version of Java that the scanner expects will be updated from 11 to 17. Java 17 is <a href="https://en.wikipedia.org/wiki/Java_version_history">the most up-to-date Long Term Support (LTS) version</a>. Dependency scanning continues to support the same <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/#supported-languages-and-package-managers">range of versions (8, 11, 13, 14, 15, 16, 17)</a>, only the default version is changing. If your project uses the previous default of Java 11, be sure to <a href="https://docs.gitlab.com/user/application_security/dependency_scanning/#configuring-specific-analyzers-used-by-dependency-scanning">set the `DS_Java_Version` variable to match</a>.
]]></description>
      <pubDate>Wed, 20 Apr 2022 20:35:52 +0000</pubDate>
    </item>
    <item>
      <title>GitLab.com certificate-based integration with Kubernetes</title>
      <link>https://gitlab.com/groups/gitlab-org/configure/-/epics/8</link>
      <description><![CDATA[The certificate-based integration with Kubernetes will be <a href="https://about.gitlab.com/blog/deprecating-the-cert-based-kubernetes-integration/">deprecated and removed</a>. As a GitLab.com user, on new namespaces, you will no longer be able to integrate GitLab and your cluster using the certificate-based approach as of GitLab 15.0. The integration for current users will be enabled per namespace.

For a more robust, secure, forthcoming, and reliable integration with Kubernetes, we recommend you use the
<a href="https://docs.gitlab.com/user/clusters/agent/">agent for Kubernetes</a> to connect Kubernetes clusters with GitLab. <a href="https://docs.gitlab.com/user/infrastructure/clusters/migrate_to_gitlab_agent/">How do I migrate?</a>

For updates and details about this deprecation, follow <a href="https://gitlab.com/groups/gitlab-org/configure/-/epics/8">this epic</a>.

GitLab Self-Managed customers can still use the feature <a href="https://docs.gitlab.com/update/deprecations/#self-managed-certificate-based-integration-with-kubernetes">with a feature flag</a>.
]]></description>
      <pubDate>Wed, 20 Apr 2022 18:57:52 +0000</pubDate>
    </item>
    <item>
      <title>Outdated indices of advanced search migrations</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/359133</link>
      <description><![CDATA[As advanced search migrations usually require support multiple code paths for a long period of time,
it's important to clean those up when we safely can. We use GitLab major version upgrades as a safe
time to remove backward compatibility for indices that have not been fully migrated. See the
<a href="https://docs.gitlab.com/update/#upgrading-to-a-new-major-version">upgrade documentation</a> for details.
]]></description>
      <pubDate>Mon, 18 Apr 2022 12:33:00 +0000</pubDate>
    </item>
    <item>
      <title>Toggle notes confidentiality on APIs</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/350670</link>
      <description><![CDATA[Toggling notes confidentiality with REST and GraphQL APIs is being deprecated. Updating notes confidential attribute is no longer supported by any means. We are changing this to simplify the experience and prevent private information from being unintentionally exposed.
]]></description>
      <pubDate>Fri, 8 Apr 2022 20:45:34 +0200</pubDate>
    </item>
    <item>
      <title>`user_email_lookup_limit` API field</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/83220</link>
      <description><![CDATA[The `user_email_lookup_limit` <a href="https://docs.gitlab.com/api/settings/">API field</a> is deprecated in GitLab 14.9 and removed in GitLab 16.7. Until the feature is removed, `user_email_lookup_limit` is aliased to `search_rate_limit` and existing workflows still work.

Any API calls to change the rate limits for `user_email_lookup_limit` must use `search_rate_limit` instead.
]]></description>
      <pubDate>Tue, 22 Mar 2022 15:57:07 +0000</pubDate>
    </item>
    <item>
      <title>Background upload for object storage</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/26600</link>
      <description><![CDATA[To reduce the overall complexity and maintenance burden of the <a href="https://docs.gitlab.com/administration/object_storage/">object storage feature</a>, support for using `background_upload` to upload files is deprecated and will be fully removed in GitLab 15.0. Review the <a href="https://docs.gitlab.com/omnibus/update/gitlab_15_changes/">15.0 specific changes</a> for the <a href="https://docs.gitlab.com/omnibus/update/gitlab_15_changes/#removed-background-uploads-settings-for-object-storage">removed background uploads settings for object storage</a>.

This impacts a small subset of object storage providers:

- **OpenStack** Customers using OpenStack need to change their configuration to use the S3 API instead of Swift.
- **RackSpace** Customers using RackSpace-based object storage need to migrate data to a different provider.

GitLab will publish additional guidance to assist affected customers in migrating.
]]></description>
      <pubDate>Tue, 22 Mar 2022 14:10:45 +0000</pubDate>
    </item>
    <item>
      <title>Permissions change for downloading Composer dependencies</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/82852</link>
      <description><![CDATA[The GitLab Composer repository can be used to push, search, fetch metadata about, and download PHP dependencies. All these actions require authentication, except for downloading dependencies.

Downloading Composer dependencies without authentication is deprecated in GitLab 14.9, and will be removed in GitLab 15.0. Starting with GitLab 15.0, you must authenticate to download Composer dependencies.
]]></description>
      <pubDate>Tue, 15 Mar 2022 20:19:59 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL permissions change for Package settings</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/82646</link>
      <description><![CDATA[The GitLab Package stage offers a Package Registry, container registry, and Dependency Proxy to help you manage all of your dependencies using GitLab. Each of these product categories has a variety of settings that can be adjusted using the API.

The permissions model for GraphQL is being updated. After 15.0, users with the Guest, Reporter, and Developer role can no longer update these settings:

- <a href="https://docs.gitlab.com/api/graphql/reference/#packagesettings">Package Registry settings</a>
- <a href="https://docs.gitlab.com/api/graphql/reference/#containerexpirationpolicy">Container registry cleanup policy</a>
- <a href="https://docs.gitlab.com/api/graphql/reference/#dependencyproxyimagettlgrouppolicy">Dependency Proxy time-to-live policy</a>
- <a href="https://docs.gitlab.com/api/graphql/reference/#dependencyproxysetting">Enabling the Dependency Proxy for your group</a>
]]></description>
      <pubDate>Mon, 14 Mar 2022 21:11:51 +0000</pubDate>
    </item>
    <item>
      <title>`htpasswd` Authentication for the container registry</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/82652</link>
      <description><![CDATA[The container registry supports <a href="https://gitlab.com/gitlab-org/container-registry/-/blob/master/docs/configuration.md#auth">authentication</a> with `htpasswd`. It relies on an <a href="https://httpd.apache.org/docs/2.4/programs/htpasswd.html">Apache `htpasswd` file</a>, with passwords hashed using `bcrypt`.

Since it isn't used in the context of GitLab (the product), `htpasswd` authentication will be deprecated in GitLab 14.9 and removed in GitLab 15.0.
]]></description>
      <pubDate>Fri, 11 Mar 2022 23:58:13 +0000</pubDate>
    </item>
    <item>
      <title>GitLab self-monitoring project</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/348909</link>
      <description><![CDATA[GitLab self-monitoring gives instance administrators the tools to monitor the health of their instances. This feature is deprecated in GitLab 14.9, and is scheduled for removal in 16.0.
]]></description>
      <pubDate>Fri, 4 Mar 2022 19:03:41 +0000</pubDate>
    </item>
    <item>
      <title>`projectFingerprint` in `PipelineSecurityReportFinding` GraphQL</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/80873</link>
      <description><![CDATA[The `projectFingerprint` field in the <a href="https://docs.gitlab.com/api/graphql/reference/#pipelinesecurityreportfinding">`PipelineSecurityReportFinding`</a>
GraphQL object is being deprecated. This field contains a "fingerprint" of security findings used to determine uniqueness.
The method for calculating fingerprints has changed, resulting in different values. Going forward, the new values will be
exposed in the UUID field. Data previously available in the `projectFingerprint` field will eventually be removed entirely.
]]></description>
      <pubDate>Thu, 17 Feb 2022 08:35:13 +0000</pubDate>
    </item>
    <item>
      <title>Secure and Protect analyzer major version update</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/350936</link>
      <description><![CDATA[The Secure and Protect stages will be bumping the major versions of their analyzers in tandem with the GitLab 15.0 release. This major bump will enable a clear delineation for analyzers, between:

- Those released prior to May 22, 2022, which generate reports that _are not_ subject to stringent schema validation.
- Those released after May 22, 2022, which generate reports that _are_ subject to stringent schema validation.

If you are not using the default inclusion templates, or have pinned your analyzer versions you will need to update your CI/CD job definition to either remove the pinned version or to update the latest major version.
Users of GitLab 12.0-14.10 will continue to experience analyzer updates as normal until the release of GitLab 15.0, following which all newly fixed bugs and newly released features in the new major versions of the analyzers will not be available in the deprecated versions because we do not backport bugs and new features as per our <a href="https://docs.gitlab.com/policy/maintenance/">maintenance policy</a>. As required security patches will be backported within the latest 3 minor releases.
Specifically, the following are being deprecated and will no longer be updated after 15.0 GitLab release:

- API security: version 1
- Container scanning: version 4
- Coverage-guided fuzz testing: version 2
- Dependency scanning: version 2
- Dynamic application security testing (DAST): version 2
- Infrastructure as Code (IaC) scanning: version 1
- License scanning: version 3
- Secret detection: version 3
- Static application security testing (SAST): version 2 of <a href="https://docs.gitlab.com/user/application_security/sast/#supported-languages-and-frameworks">all analyzers</a>, except `gosec` which is currently at version 3
  - `bandit`: version 2
  - `brakeman`: version 2
  - `eslint`: version 2
  - `flawfinder`: version 2
  - `gosec`: version 3
  - `kubesec`: version 2
  - `mobsf`: version 2
  - `nodejs-scan`: version 2
  - `phpcs-security-audit`: version 2
  - `pmd-apex`: version 2
  - `security-code-scan`: version 2
  - `semgrep`: version 2
  - `sobelow`: version 2
  - `spotbugs`: version 2
]]></description>
      <pubDate>Thu, 17 Feb 2022 06:26:29 +0000</pubDate>
    </item>
    <item>
      <title>Secure and Protect analyzer images published in new location</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/352564</link>
      <description><![CDATA[GitLab uses various <a href="https://docs.gitlab.com/user/application_security/terminology/#analyzer">analyzers</a> to <a href="https://docs.gitlab.com/user/application_security/">scan for security vulnerabilities</a>.
Each analyzer is distributed as a container image.

Starting in GitLab 14.8, new versions of GitLab Secure and Protect analyzers are published to a new registry location under `registry.gitlab.com/security-products`.

We will update the default value of <a href="https://gitlab.com/gitlab-org/gitlab/-/tree/master/lib/gitlab/ci/templates/Security">GitLab-managed CI/CD templates</a> to reflect this change:

- For all analyzers except container scanning, we will update the variable `SECURE_ANALYZERS_PREFIX` to the new image registry location.
- For container scanning, the default image address is already updated. There is no `SECURE_ANALYZERS_PREFIX` variable for container scanning.

In a future release, we will stop publishing images to `registry.gitlab.com/gitlab-org/security-products/analyzers`.
Once this happens, you must take action if you manually pull images and push them into a separate registry. This is commonly the case for <a href="https://docs.gitlab.com/user/application_security/offline_deployments/">offline deployments</a>.
Otherwise, you won't receive further updates.

See the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352564">deprecation issue</a> for more details.
]]></description>
      <pubDate>Thu, 17 Feb 2022 02:23:46 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate feature flag PUSH_RULES_SUPERSEDE_CODE_OWNERS</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/262019</link>
      <description><![CDATA[The feature flag `PUSH_RULES_SUPERSEDE_CODE_OWNERS` is being removed in GitLab 15.0. Upon its removal, push rules will supersede Code Owners. Even if Code Owner approval is required, a push rule that explicitly allows a specific user to push code supersedes the Code Owners setting.
]]></description>
      <pubDate>Wed, 16 Feb 2022 18:10:40 +0000</pubDate>
    </item>
    <item>
      <title>`CI_BUILD_*` predefined variables</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/352957</link>
      <description><![CDATA[The predefined CI/CD variables that start with `CI_BUILD_*` were deprecated in GitLab 9.0, and will be removed in GitLab 16.0. If you still use these variables, be sure to change to the replacement <a href="https://docs.gitlab.com/ci/variables/predefined_variables/">predefined variables</a> which are functionally identical:

| Removed variable      | Replacement variable    |
| --------------------- |------------------------ |
| `CI_BUILD_BEFORE_SHA` | `CI_COMMIT_BEFORE_SHA`  |
| `CI_BUILD_ID`         | `CI_JOB_ID`             |
| `CI_BUILD_MANUAL`     | `CI_JOB_MANUAL`         |
| `CI_BUILD_NAME`       | `CI_JOB_NAME`           |
| `CI_BUILD_REF`        | `CI_COMMIT_SHA`         |
| `CI_BUILD_REF_NAME`   | `CI_COMMIT_REF_NAME`    |
| `CI_BUILD_REF_SLUG`   | `CI_COMMIT_REF_SLUG`    |
| `CI_BUILD_REPO`       | `CI_REPOSITORY_URL`     |
| `CI_BUILD_STAGE`      | `CI_JOB_STAGE`          |
| `CI_BUILD_TAG`        | `CI_COMMIT_TAG`         |
| `CI_BUILD_TOKEN`      | `CI_JOB_TOKEN`          |
| `CI_BUILD_TRIGGERED`  | `CI_PIPELINE_TRIGGERED` |
]]></description>
      <pubDate>Wed, 16 Feb 2022 22:48:48 +0900</pubDate>
    </item>
    <item>
      <title>SAST support for .NET 2.1</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/352553</link>
      <description><![CDATA[The GitLab SAST Security Code Scan analyzer scans .NET code for security vulnerabilities.
For technical reasons, the analyzer must first build the code to scan it.

In GitLab versions prior to 15.0, the default analyzer image (version 2) includes support for:

- .NET 2.1
- .NET 3.0 and .NET Core 3.0
- .NET Core 3.1
- .NET 5.0

In GitLab 15.0, we will change the default major version for this analyzer from version 2 to version 3. This change:

- Adds <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/350408">severity values for vulnerabilities</a> along with <a href="https://gitlab.com/gitlab-org/security-products/analyzers/security-code-scan/-/blob/master/CHANGELOG.md">other new features and improvements</a>.
- Removes .NET 2.1 support.
- Adds support for .NET 6.0, Visual Studio 2019, and Visual Studio 2022.

Version 3 was <a href="https://about.gitlab.com/releases/2021/12/22/gitlab-14-6-released/#sast-support-for-net-6">announced in GitLab 14.6</a> and made available as an optional upgrade.

If you rely on .NET 2.1 support being present in the analyzer image by default, you must take action as detailed in the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352553#breaking-change">deprecation issue for this change</a>.
]]></description>
      <pubDate>Wed, 16 Feb 2022 04:12:42 +0000</pubDate>
    </item>
    <item>
      <title>SAST analyzer consolidation and CI/CD template changes</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/352554</link>
      <description><![CDATA[GitLab SAST uses various <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/">analyzers</a> to scan code for vulnerabilities.

We are reducing the number of analyzers used in GitLab SAST as part of our long-term strategy to deliver a better and more consistent user experience.
Streamlining the set of analyzers will also enable faster iteration, better results, and greater efficiency (including a reduction in CI runner usage in most cases).

In GitLab 15.4, GitLab SAST will no longer use the following analyzers:

- <a href="https://gitlab.com/gitlab-org/security-products/analyzers/eslint">ESLint</a> (JavaScript, TypeScript, React)
- <a href="https://gitlab.com/gitlab-org/security-products/analyzers/gosec">Gosec</a> (Go)
- <a href="https://gitlab.com/gitlab-org/security-products/analyzers/bandit">Bandit</a> (Python)

> [!note]
> This change was originally planned for GitLab 15.0 and was postponed to GitLab 15.4.

These analyzers will be removed from the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/SAST.gitlab-ci.yml">GitLab-managed SAST CI/CD template</a> and replaced with the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/semgrep">Semgrep-based analyzer</a>.
Effective immediately, they will receive only security updates; other routine improvements or updates are not guaranteed.
After these analyzers reach End of Support, no further updates will be provided.
We will not delete container images previously published for these analyzers; any such change would be announced as a deprecation, removal, or breaking change announcement.

We will also remove Java from the scope of the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/spotbugs">SpotBugs</a> analyzer and replace it with the <a href="https://gitlab.com/gitlab-org/security-products/analyzers/semgrep">Semgrep-based analyzer</a>.
This change will make it simpler to scan Java code; compilation will no longer be required.
This change will be reflected in the automatic language detection portion of the <a href="https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/SAST.gitlab-ci.yml">GitLab-managed SAST CI/CD template</a>. Note that the SpotBugs-based analyzer will continue to cover Groovy, Kotlin, and Scala.

If you've already dismissed a vulnerability finding from one of the deprecated analyzers, the replacement attempts to respect your previous dismissal. The system behavior depends on:

- whether you've excluded the Semgrep-based analyzer from running in the past.
- which analyzer first discovered the vulnerabilities shown in the project's Vulnerability Report.

See <a href="https://docs.gitlab.com/user/application_security/sast/analyzers/#vulnerability-translation">Vulnerability translation documentation</a> for further details.

If you applied customizations to any of the affected analyzers or if you currently disable the Semgrep analyzer in your pipelines, you must take action as detailed in the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352554#breaking-change">deprecation issue for this change</a>.
]]></description>
      <pubDate>Wed, 16 Feb 2022 03:33:13 +0000</pubDate>
    </item>
    <item>
      <title>Out-of-the-box SAST support for Java 8</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/352549</link>
      <description><![CDATA[The <a href="https://gitlab.com/gitlab-org/security-products/analyzers/spotbugs">GitLab SAST SpotBugs analyzer</a> scans <a href="https://docs.gitlab.com/user/application_security/sast/#supported-languages-and-frameworks">Java, Scala, Groovy, and Kotlin code</a> for security vulnerabilities.
For technical reasons, the analyzer must first compile the code before scanning.
Unless you use the <a href="https://docs.gitlab.com/user/application_security/sast/#pre-compilation">pre-compilation strategy</a>, the analyzer attempts to automatically compile your project's code.

In GitLab versions prior to 15.0, the analyzer image includes Java 8 and Java 11 runtimes to facilitate compilation.

In GitLab 15.0, we will:

- Remove Java 8 from the analyzer image to reduce the size of the image.
- Add Java 17 to the analyzer image to make it easier to compile with Java 17.

If you rely on Java 8 being present in the analyzer environment, you must take action as detailed in the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352549#breaking-change">deprecation issue for this change</a>.
]]></description>
      <pubDate>Wed, 16 Feb 2022 02:56:55 +0000</pubDate>
    </item>
    <item>
      <title>Required pipeline configurations in Premium tier</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/80199</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/administration/settings/continuous_integration/#required-pipeline-configuration-deprecated">required pipeline configuration</a> feature is deprecated in GitLab 14.8 for Premium customers and is scheduled for removal in GitLab 15.0. This feature is not deprecated for GitLab Ultimate customers.

This change to move the feature to GitLab Ultimate tier is intended to help our features better align with our pricing philosophy as we see demand for this feature originating primarily from executives.

This change will also help GitLab remain consistent in its tiering strategy with the other related Ultimate-tier features of:
<a href="https://docs.gitlab.com/user/application_security/policies/">Security policies</a> and <a href="https://docs.gitlab.com/user/project/settings/#compliance-pipeline-configuration">compliance framework pipelines</a>.
]]></description>
      <pubDate>Wed, 16 Feb 2022 11:22:24 +1000</pubDate>
    </item>
    <item>
      <title>Retire-JS dependency scanning tool</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/350510</link>
      <description><![CDATA[As of 14.8 the retire.js job is being deprecated from dependency scanning. It will continue to be included in our CI/CD template while deprecated. We are removing retire.js from dependency scanning on May 22, 2022 in GitLab 15.0. JavaScript scanning functionality will not be affected as it is still being covered by Gemnasium.

If you have explicitly excluded retire.js using DS_EXCLUDED_ANALYZERS you will need to clean up (remove the reference) in 15.0. If you have customized your pipeline's dependency scanning configuration related to the `retire-js-dependency_scanning` job you will want to switch to gemnasium-dependency_scanning before the removal in 15.0, to prevent your pipeline from failing. If you have not used the DS_EXCLUDED_ANALYZERS to reference retire.js, or customized your template specifically for retire.js, you will not need to take action.
]]></description>
      <pubDate>Tue, 15 Feb 2022 22:22:15 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL ID and GlobalID compatibility</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/257883</link>
      <description><![CDATA[We are removing a non-standard extension to our GraphQL processor, which we added for backwards compatibility. This extension modifies the validation of GraphQL queries, allowing the use of the `ID` type for arguments where it would normally be rejected.
Some arguments originally had the type `ID`. These were changed to specific
kinds of `ID`. This change may be a breaking change if you:

- Use GraphQL.
- Use the `ID` type for any argument in your query signatures.

Some field arguments still have the `ID` type. These are typically for
IID values, or namespace paths. An example is `Query.project(fullPath: ID!)`.

For a list of affected and unaffected field arguments,
see the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352832">deprecation issue</a>.

You can test if this change affects you by validating
your queries locally, using schema data fetched from a GitLab server.
You can do this by using the GraphQL explorer tool for the relevant GitLab
instance. For example: `https://gitlab.com/-/graphql-explorer`.

For example, the following query illustrates the breaking change:

```graphql
# a query using the deprecated type of Query.issue(id:)
# WARNING: This will not work after GitLab 15.0
query($id: ID!) {
  deprecated: issue(id: $id) {
    title, description
  }
}
```

The query above will not work after GitLab 15.0 is released, because the type
of `Query.issue(id:)` is actually `IssueID!`.

Instead, you should use one of the following two forms:

```graphql
# This will continue to work
query($id: IssueID!) {
  a: issue(id: $id) {
    title, description
  }
  b: issue(id: "gid://gitlab/Issue/12345") {
    title, description
  }
}
```

This query works now, and will continue to work after GitLab 15.0.
You should convert any queries in the first form (using `ID` as a named type in the signature)
to one of the other two forms (using the correct appropriate type in the signature, or using
an inline argument expression).
]]></description>
      <pubDate>Tue, 15 Feb 2022 15:03:38 +0000</pubDate>
    </item>
    <item>
      <title>OAuth tokens without expiration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/79178</link>
      <description><![CDATA[By default, all new applications expire access tokens after 2 hours. In GitLab 14.2 and earlier, OAuth access tokens
had no expiration. In GitLab 15.0, an expiry will be automatically generated for any existing token that does not
already have one.

You should <a href="https://docs.gitlab.com/integration/oauth_provider/#access-token-expiration">opt in</a> to expiring
tokens before GitLab 15.0 is released:

1. Edit the application.
1. Select **Expire access tokens** to enable them. Tokens must be revoked or they don't expire.
]]></description>
      <pubDate>Tue, 15 Feb 2022 05:11:20 +0000</pubDate>
    </item>
    <item>
      <title>Deprecate legacy Gitaly configuration methods</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/352609</link>
      <description><![CDATA[Using environment variables `GIT_CONFIG_SYSTEM` and `GIT_CONFIG_GLOBAL` to configure Gitaly is <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352609">deprecated</a>.
These variables are being replaced with standard <a href="https://docs.gitlab.com/administration/gitaly/reference/">`config.toml` Gitaly configuration</a>.

GitLab instances that use `GIT_CONFIG_SYSTEM` and `GIT_CONFIG_GLOBAL` to configure Gitaly should switch to configuring using
`config.toml`.
]]></description>
      <pubDate>Tue, 15 Feb 2022 04:32:12 +0000</pubDate>
    </item>
    <item>
      <title>Support for gRPC-aware proxy deployed between Gitaly and rest of GitLab</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/80283</link>
      <description><![CDATA[Although not recommended or documented, it was possible to deploy a gRPC-aware proxy between Gitaly and
the rest of GitLab. For example, NGINX and Envoy. The ability to deploy a gRPC-aware proxy is
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352517">deprecated</a>. If you currently use a gRPC-aware proxy for
Gitaly connections, you should change your proxy configuration to use TCP or TLS proxying (OSI layer 4) instead.

Gitaly Cluster became incompatible with gRPC-aware proxies in GitLab 13.12. Now all GitLab installations will be incompatible with
gRPC-aware proxies, even without Gitaly Cluster.

By sending some of our internal RPC traffic through a custom protocol (instead of gRPC) we
increase throughput and reduce Go garbage collection latency. For more information, see
the <a href="https://gitlab.com/groups/gitlab-com/gl-infra/-/epics/463">relevant epic</a>.
]]></description>
      <pubDate>Mon, 14 Feb 2022 00:08:46 +0000</pubDate>
    </item>
    <item>
      <title>Elasticsearch 6.8</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/350275</link>
      <description><![CDATA[Elasticsearch 6.8 is deprecated in GitLab 14.8 and scheduled for removal in GitLab 15.0.
Customers using Elasticsearch 6.8 need to upgrade their Elasticsearch version to 7.x prior to upgrading to GitLab 15.0.
We recommend using the latest version of Elasticsearch 7 to benefit from all Elasticsearch improvements.

Elasticsearch 6.8 is also incompatible with Amazon OpenSearch, which we <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/327560">plan to support in GitLab 15.0</a>.
]]></description>
      <pubDate>Fri, 11 Feb 2022 19:08:19 +0000</pubDate>
    </item>
    <item>
      <title>Request profiling</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/352488</link>
      <description><![CDATA[<a href="https://docs.gitlab.com/administration/monitoring/performance/">Request profiling</a> is deprecated in GitLab 14.8 and scheduled for removal in GitLab 15.0.

We're working on <a href="https://gitlab.com/groups/gitlab-org/-/epics/7327">consolidating our profiling tools</a> and making them more easily accessible.
We <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/350152">evaluated</a> the use of this feature and we found that it is not widely used.
It also depends on a few third-party gems that are not actively maintained anymore, have not been updated for the latest version of Ruby, or crash frequently when profiling heavy page loads.

For more information, check the <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/352488#deprecation-summary">summary section of the deprecation issue</a>.
]]></description>
      <pubDate>Fri, 11 Feb 2022 17:59:36 +0000</pubDate>
    </item>
    <item>
      <title>Dependency scanning Python 3.9 and 3.6 image deprecation</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/334060</link>
      <description><![CDATA[For those using dependency scanning for Python projects, we are deprecating the default `gemnasium-python:2` image which uses Python 3.6 as well as the custom `gemnasium-python:2-python-3.9` image which uses Python 3.9. The new default image as of GitLab 15.0 will be for Python 3.9 as it is a <a href="https://endoflife.date/python">supported version</a> and 3.6 <a href="https://endoflife.date/python">is no longer supported</a>.

For users using Python 3.9 or 3.9-compatible projects, you should not need to take action and dependency scanning should begin to work in GitLab 15.0. If you wish to test the new container now please run a test pipeline in your project with this container (which will be removed in 15.0). Use the Python 3.9 image:

```yaml
gemnasium-python-dependency_scanning:
  image:
    name: registry.gitlab.com/gitlab-org/security-products/analyzers/gemnasium-python:2-python-3.9
```

For users using Python 3.6, as of GitLab 15.0 you will no longer be able to use the default template for dependency scanning. You will need to switch to use the deprecated `gemnasium-python:2` analyzer image. If you are impacted by this please comment in <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/351503">this issue</a> so we can extend the removal if needed.

For users using the 3.9 special exception image, you must instead use the default value and no longer override your container. To verify if you are using the 3.9 special exception image, check your `.gitlab-ci.yml` file for the following reference:

```yaml
gemnasium-python-dependency_scanning:
  image:
    name: registry.gitlab.com/gitlab-org/security-products/analyzers/gemnasium-python:2-python-3.9
```
]]></description>
      <pubDate>Fri, 11 Feb 2022 05:23:33 +0000</pubDate>
    </item>
    <item>
      <title>Container Network and Host Security</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/79698</link>
      <description><![CDATA[All functionality related to GitLab Container Network Security and
Container Host Security categories is deprecated in GitLab 14.8 and
scheduled for removal in GitLab 15.0. Users who need a replacement for this
functionality are encouraged to evaluate the following open source projects
as potential solutions that can be installed and managed outside of GitLab:
<a href="https://gitlab.com/apparmor/apparmor">AppArmor</a>,
<a href="https://github.com/cilium/cilium">Cilium</a>,
<a href="https://github.com/falcosecurity/falco">Falco</a>,
<a href="https://github.com/fluent/fluentd">FluentD</a>,
<a href="https://kubernetes.io/docs/concepts/security/pod-security-admission/">Pod Security Admission</a>.

To integrate these technologies into GitLab, add the desired Helm charts
into your copy of the
<a href="https://docs.gitlab.com/user/clusters/management_project_template/">Cluster Management Project Template</a>.
Deploy these Helm charts in production by calling commands through GitLab
<a href="https://docs.gitlab.com/user/clusters/agent/ci_cd_workflow/">CI/CD</a>.

As part of this change, the following specific capabilities within GitLab
are now deprecated, and are scheduled for removal in GitLab 15.0:

- The **Security & Compliance** > **Threat Monitoring** page.
- The `Network Policy` security policy type, as found on the **Security & Compliance** > **Policies** page.
- The ability to manage integrations with the following technologies through GitLab: AppArmor, Cilium, Falco, FluentD, and Pod Security Policies.
- All APIs related to the above functionality.

For additional context, or to provide feedback regarding this change,
please reference our open
<a href="https://gitlab.com/groups/gitlab-org/-/epics/7476">deprecation issue</a>.
]]></description>
      <pubDate>Mon, 7 Feb 2022 18:55:39 +0000</pubDate>
    </item>
    <item>
      <title>Test coverage project CI/CD setting</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/79988</link>
      <description><![CDATA[To simplify setting a test coverage pattern, in GitLab 15.0 the
<a href="https://docs.gitlab.com/ci/pipelines/settings/#add-test-coverage-results-using-project-settings-removed">project setting for test coverage parsing</a>
is being removed.

Instead, using the project's `.gitlab-ci.yml`, provide a regular expression with the `coverage` keyword to set
testing coverage results in merge requests.
]]></description>
      <pubDate>Mon, 7 Feb 2022 07:57:08 +0000</pubDate>
    </item>
    <item>
      <title>Optional enforcement of SSH expiration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/351963</link>
      <description><![CDATA[The feature to disable enforcement of SSH expiration is unusual from a security perspective.
We have become concerned that this unusual feature could create unexpected behavior for users.
Unexpected behavior in a security feature is inherently dangerous, so we have decided to remove this feature.
]]></description>
      <pubDate>Fri, 4 Feb 2022 12:23:09 +1000</pubDate>
    </item>
    <item>
      <title>Optional enforcement of PAT expiration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/351962</link>
      <description><![CDATA[The feature to disable enforcement of PAT expiration is unusual from a security perspective.
We have become concerned that this unusual feature could create unexpected behavior for users.
Unexpected behavior in a security feature is inherently dangerous, so we have decided to remove this feature.
]]></description>
      <pubDate>Fri, 4 Feb 2022 10:50:03 +1000</pubDate>
    </item>
    <item>
      <title>External status check API breaking changes</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/79250</link>
      <description><![CDATA[The <a href="https://docs.gitlab.com/api/status_checks/">external status check API</a> was originally implemented to
support pass-by-default requests to mark a status check as passing. Pass-by-default requests are now deprecated.
Specifically, the following are deprecated:

- Requests that do not contain the `status` field.
- Requests that have the `status` field set to `approved`.

Beginning in GitLab 15.0, status checks will only be updated to a passing state if the `status` field is both present
and set to `passed`. Requests that:

- Do not contain the `status` field will be rejected with a `422` error. For more information, see <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/338827">the relevant issue</a>.
- Contain any value other than `passed` will cause the status check to fail. For more information, see <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/339039">the relevant issue</a>.

To align with this change, API calls to list external status checks will also return the value of `passed` rather than
`approved` for status checks that have passed.
]]></description>
      <pubDate>Mon, 31 Jan 2022 22:26:18 +0000</pubDate>
    </item>
    <item>
      <title>Querying usage trends via the `instanceStatisticsMeasurements` GraphQL node</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/332323</link>
      <description><![CDATA[The `instanceStatisticsMeasurements` GraphQL node has been renamed to `usageTrendsMeasurements` in 13.10 and the old field name has been marked as deprecated. To fix the existing GraphQL queries, replace `instanceStatisticsMeasurements` with `usageTrendsMeasurements`.
]]></description>
      <pubDate>Mon, 31 Jan 2022 11:49:38 +0000</pubDate>
    </item>
    <item>
      <title>OAuth implicit grant</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/78949</link>
      <description><![CDATA[The OAuth implicit grant authorization flow will be removed in our next major release, GitLab 15.0. Any applications that use OAuth implicit grant should switch to alternative <a href="https://docs.gitlab.com/api/oauth2/">supported OAuth flows</a>.
]]></description>
      <pubDate>Thu, 27 Jan 2022 02:00:21 +0000</pubDate>
    </item>
    <item>
      <title>Vulnerability Check</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/79254</link>
      <description><![CDATA[The vulnerability check feature is deprecated in GitLab 14.8 and scheduled for removal in GitLab 15.0. We encourage you to migrate to the new security approvals feature instead. You can do so by navigating to **Security & Compliance** > **Policies** and creating a new Scan Result Policy.

The new security approvals feature is similar to vulnerability check. For example, both can require approvals for MRs that contain security vulnerabilities. However, security approvals improve the previous experience in several ways:

- Users can choose who is allowed to edit security approval rules. An independent security or compliance team can therefore manage rules in a way that prevents development project maintainers from modifying the rules.
- Multiple rules can be created and chained together to allow for filtering on different severity thresholds for each scanner type.
- A two-step approval process can be enforced for any desired changes to security approval rules.
- A single set of security policies can be applied to multiple development projects to allow for ease in maintaining a single, centralized ruleset.
]]></description>
      <pubDate>Wed, 26 Jan 2022 23:32:27 +0000</pubDate>
    </item>
    <item>
      <title>`started` iteration state</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/334018</link>
      <description><![CDATA[The `started` iteration state in the <a href="https://docs.gitlab.com/api/graphql/reference/#iterationstate">iterations GraphQL API</a>
and <a href="https://docs.gitlab.com/api/iterations/#list-project-iterations">iterations REST API</a> is deprecated.

The GraphQL API version will be removed in GitLab 16.0. This state is being replaced with the `current` state (already available)
which aligns with the naming for other time-based entities, such as milestones.

We plan to continue to support the `started` state in REST API version until the next v5 REST API version.
]]></description>
      <pubDate>Mon, 24 Jan 2022 12:19:43 +0000</pubDate>
    </item>
    <item>
      <title>Sidekiq metrics and health checks configuration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/347509</link>
      <description><![CDATA[Exporting Sidekiq metrics and health checks using a single process and port is deprecated.
Support will be removed in 15.0.

We have updated Sidekiq to export <a href="https://gitlab.com/groups/gitlab-org/-/epics/6409">metrics and health checks from two separate processes</a>
to improve stability and availability and prevent data loss in edge cases.
As those are two separate servers, a configuration change will be required in 15.0
to explicitly set separate ports for metrics and health-checks.
The newly introduced settings for `sidekiq['health_checks_*']`
should always be set in `gitlab.rb`.
For more information, check the documentation for <a href="https://docs.gitlab.com/administration/sidekiq/">configuring Sidekiq</a>.

These changes also require updates in either Prometheus to scrape the new endpoint or k8s health-checks to target the new
health-check port to work properly, otherwise either metrics or health-checks will disappear.

For the deprecation period those settings are optional
and GitLab will default the Sidekiq health-checks port to the same port as `sidekiq_exporter`
and only run one server (not changing the current behavior).
Only if they are both set and a different port is provided, a separate metrics server will spin up
to serve the Sidekiq metrics, similar to the way Sidekiq will behave in 15.0.
]]></description>
      <pubDate>Mon, 17 Jan 2022 12:59:15 +0000</pubDate>
    </item>
    <item>
      <title>`artifacts:reports:cobertura` keyword</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/348980</link>
      <description><![CDATA[Currently, test coverage visualizations in GitLab only support Cobertura reports. Starting 15.0, the
`artifacts:reports:cobertura` keyword will be replaced by
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/344533">`artifacts:reports:coverage_report`</a>. Cobertura will be the
only supported report file in 15.0, but this is the first step towards GitLab supporting other report types.
]]></description>
      <pubDate>Thu, 13 Jan 2022 23:06:39 +0000</pubDate>
    </item>
    <item>
      <title>Tracing in GitLab</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/346540</link>
      <description><![CDATA[Tracing in GitLab is an integration with Jaeger, an open-source end-to-end distributed tracing system. GitLab users can go to their Jaeger instance to gain insight into the performance of a deployed application, tracking each function or microservice that handles a given request. Tracing in GitLab is deprecated in GitLab 14.7, and scheduled for removal in 15.0. To track work on a possible replacement, see the issue for <a href="https://gitlab.com/groups/gitlab-org/-/epics/6976">Opstrace integration with GitLab</a>.
]]></description>
      <pubDate>Wed, 12 Jan 2022 21:49:32 +0000</pubDate>
    </item>
    <item>
      <title>Monitor performance metrics through Prometheus</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/346541</link>
      <description><![CDATA[By displaying data stored in a Prometheus instance, GitLab allows users to view performance metrics. GitLab also displays visualizations of these metrics in dashboards. The user can connect to a previously-configured external Prometheus instance, or set up Prometheus as a GitLab Managed App.
However, since certificate-based integration with Kubernetes clusters is deprecated in GitLab, the metrics functionality in GitLab that relies on Prometheus is also deprecated. This includes the metrics visualizations in dashboards. GitLab is working to develop a single user experience based on <a href="https://about.gitlab.com/press/releases/2021-12-14-gitlab-acquires-opstrace-to-expand-its-devops-platform-with-open-source-observability-solution/">Opstrace</a>. An <a href="https://gitlab.com/groups/gitlab-org/-/epics/6976">issue exists</a> for you to follow work on the Opstrace integration.
]]></description>
      <pubDate>Wed, 12 Jan 2022 18:56:05 +0000</pubDate>
    </item>
    <item>
      <title>Logging in GitLab</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/346485</link>
      <description><![CDATA[The logging features in GitLab allow users to install the ELK stack (Elasticsearch, Logstash, and Kibana) to aggregate and manage application logs. Users can search for relevant logs in GitLab. However, since deprecating certificate-based integration with Kubernetes clusters and GitLab Managed Apps, we don't have a recommended solution for logging within GitLab. For more information, you can follow the issue for <a href="https://gitlab.com/groups/gitlab-org/-/epics/6976">integrating Opstrace with GitLab</a>.
]]></description>
      <pubDate>Wed, 12 Jan 2022 18:36:50 +0000</pubDate>
    </item>
    <item>
      <title>Legacy approval status names from license compliance API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/335707</link>
      <description><![CDATA[We deprecated legacy names for approval status of license policy (`blacklisted`, `approved`) in the `managed_licenses` API but they are still used in our API queries and responses. They will be removed in 15.0.

If you are using our license compliance API you should stop using the `approved` and `blacklisted` query parameters, they are now `allowed` and `denied`. In 15.0 the responses will also stop using `approved` and `blacklisted` so you need to adjust any of your custom tools to use the old and new values so they do not break with the 15.0 release.
]]></description>
      <pubDate>Fri, 10 Dec 2021 00:47:46 +0000</pubDate>
    </item>
    <item>
      <title>bundler-audit dependency scanning tool</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/289832</link>
      <description><![CDATA[As of 14.6 bundler-audit is being deprecated from dependency scanning. It will continue to be in our CI/CD template while deprecated. We are removing bundler-audit from dependency scanning on May 22, 2022 in 15.0. After this removal Ruby scanning functionality will not be affected as it is still being covered by Gemnasium.

If you have explicitly excluded bundler-audit using DS_EXCLUDED_ANALYZERS you will need to clean up (remove the reference) in 15.0. If you have customized your pipeline's dependency scanning configuration, for example to edit the `bundler-audit-dependency_scanning` job, you will want to switch to gemnasium-dependency_scanning before removal in 15.0, to prevent your pipeline from failing. If you have not used the DS_EXCLUDED_ANALYZERS to reference bundler-audit, or customized your template specifically for bundler-audit, you will not need to take action.
]]></description>
      <pubDate>Thu, 9 Dec 2021 22:16:15 +0000</pubDate>
    </item>
    <item>
      <title>`type` and `types` keyword in CI/CD configuration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/76325</link>
      <description><![CDATA[The `type` and `types` CI/CD keywords will be removed in GitLab 15.0. Pipelines that use these keywords will stop working, so you must switch to `stage` and `stages`, which have the same behavior.
]]></description>
      <pubDate>Thu, 9 Dec 2021 11:10:55 +0000</pubDate>
    </item>
    <item>
      <title>`apiFuzzingCiConfigurationCreate` GraphQL mutation</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/333233</link>
      <description><![CDATA[The API fuzzing configuration snippet is now being generated client-side and does not require an
API request anymore. We are therefore deprecating the `apiFuzzingCiConfigurationCreate` mutation
which isn't being used in GitLab anymore.
]]></description>
      <pubDate>Wed, 1 Dec 2021 03:41:35 +0000</pubDate>
    </item>
    <item>
      <title>CI/CD job name length limit</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/342800</link>
      <description><![CDATA[In GitLab 15.0 we are going to limit the number of characters in CI/CD job names to 255. Any pipeline with job names that exceed the 255 character limit will stop working after the 15.0 release.
]]></description>
      <pubDate>Mon, 22 Nov 2021 02:30:49 +0000</pubDate>
    </item>
    <item>
      <title>Support for SLES 12 SP2</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/merge_requests/74631</link>
      <description><![CDATA[Long term service and support (LTSS) for SUSE Linux Enterprise Server (SLES) 12 SP2 <a href="https://www.suse.com/lifecycle/">ended on March 31, 2021</a>. The CA certificates on SP2 include the expired DST root certificate, and it's not getting new CA certificate package updates. We have implemented some <a href="https://gitlab.com/gitlab-org/gitlab-omnibus-builder/-/merge_requests/191">workarounds</a>, but we will not be able to continue to keep the build running properly.
]]></description>
      <pubDate>Wed, 17 Nov 2021 02:26:47 +0000</pubDate>
    </item>
    <item>
      <title>`pipelines` field from the `version` field</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/342882</link>
      <description><![CDATA[In GraphQL, there are two `pipelines` fields that you can use in a <a href="https://docs.gitlab.com/api/graphql/reference/#packagedetailstype">`PackageDetailsType`</a> to get the pipelines for package versions:

- The `versions` field's `pipelines` field. This returns all the pipelines associated with all the package's versions, which can pull an unbounded number of objects in memory and create performance concerns.
- The `pipelines` field of a specific `version`. This returns only the pipelines associated with that single package version.

To mitigate possible performance problems, we will remove the `versions` field's `pipelines` field in milestone 15.0. Although you will no longer be able to get all pipelines for all versions of a package, you can still get the pipelines of a single version through the remaining `pipelines` field for that version.
]]></description>
      <pubDate>Mon, 15 Nov 2021 18:03:05 +0000</pubDate>
    </item>
    <item>
      <title>Update to the container registry group-level API</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/336912</link>
      <description><![CDATA[In milestone 15.0, support for the `tags` and `tags_count` parameters will be removed from the container registry API that <a href="https://docs.gitlab.com/api/container_registry/#within-a-group">gets registry repositories from a group</a>.

The `GET /groups/:id/registry/repositories` endpoint will remain, but won't return any info about tags. To get the info about tags, you can use the existing `GET /registry/repositories/:id` endpoint, which will continue to support the `tags` and `tag_count` options as it does today. The latter must be called once per image repository.
]]></description>
      <pubDate>Fri, 12 Nov 2021 23:54:04 +0000</pubDate>
    </item>
    <item>
      <title>Value Stream Analytics filtering calculation change</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/343210</link>
      <description><![CDATA[We are changing how the date filter works in Value Stream Analytics. Instead of filtering by the time that the issue or merge request was created, the date filter will filter by the end event time of the given stage. This will result in completely different figures after this change has rolled out.

If you monitor Value Stream Analytics metrics and rely on the date filter, to avoid losing data, you must save the data prior to this change.
]]></description>
      <pubDate>Fri, 12 Nov 2021 12:38:10 +0000</pubDate>
    </item>
    <item>
      <title>GitLab Self-Managed certificate-based integration with Kubernetes</title>
      <link>https://gitlab.com/groups/gitlab-org/configure/-/epics/8</link>
      <description><![CDATA[The certificate-based integration with Kubernetes <a href="https://about.gitlab.com/blog/deprecating-the-cert-based-kubernetes-integration/">will be deprecated and removed</a>.

For GitLab Self-Managed, we are introducing the <a href="https://docs.gitlab.com/administration/feature_flags/#enable-or-disable-the-feature">feature flag</a> `certificate_based_clusters` in GitLab 15.0 so you can keep your certificate-based integration enabled. However, the feature flag will be disabled by default, so this change is a **breaking change**.

For a more robust, secure, forthcoming, and reliable integration with Kubernetes, use the
<a href="https://docs.gitlab.com/user/clusters/agent/">agent for Kubernetes</a> to connect Kubernetes clusters with GitLab.
For information about this migration, see <a href="https://docs.gitlab.com/user/infrastructure/clusters/migrate_to_gitlab_agent/">migrate to agent for Kubernetes</a>.

GitLab will not remove this feature until the new solution has feature parity.
For more information about the blockers to removal, see <a href="https://gitlab.com/gitlab-org/configure/general/-/issues/199">issue 199</a>.

For updates and details about this deprecation, see <a href="https://gitlab.com/groups/gitlab-org/configure/-/epics/8">epic 8</a>.
]]></description>
      <pubDate>Fri, 12 Nov 2021 06:15:17 +0000</pubDate>
    </item>
    <item>
      <title>`defaultMergeCommitMessageWithDescription` GraphQL API field</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/345451</link>
      <description><![CDATA[The GraphQL API field `defaultMergeCommitMessageWithDescription` has been deprecated and will be removed in GitLab 15.0. For projects with a commit message template set, it will ignore the template.
]]></description>
      <pubDate>Thu, 11 Nov 2021 22:48:20 +0000</pubDate>
    </item>
    <item>
      <title>`promote-to-primary-node` command from `gitlab-ctl`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/345207</link>
      <description><![CDATA[In GitLab 14.5, we introduced the command `gitlab-ctl promote` to promote any Geo secondary node to a primary during a failover. This command replaces `gitlab-ctl promote-to-primary-node` which was only usable for single-node Geo sites. `gitlab-ctl promote-to-primary-node` will continue to function as-is and be available until GitLab 15.0. We recommend that Geo customers begin testing the new `gitlab-ctl promote` command in their staging environments and incorporating the new command in their failover procedures.
]]></description>
      <pubDate>Thu, 11 Nov 2021 03:18:37 +0000</pubDate>
    </item>
    <item>
      <title>`promote-db` command from `gitlab-ctl`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/345207</link>
      <description><![CDATA[In GitLab 14.5, we introduced the command `gitlab-ctl promote` to promote any Geo secondary node to a primary during a failover. This command replaces `gitlab-ctl promote-db` which is used to promote database nodes in multi-node Geo secondary sites. `gitlab-ctl promote-db` will continue to function as-is and be available until GitLab 15.0. We recommend that Geo customers begin testing the new `gitlab-ctl promote` command in their staging environments and incorporating the new command in their failover procedures.
]]></description>
      <pubDate>Thu, 11 Nov 2021 03:18:37 +0000</pubDate>
    </item>
    <item>
      <title>Changing an instance (shared) runner to a project (specific) runner</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/345347</link>
      <description><![CDATA[In GitLab 15.0, you can no longer change an instance (shared) runner to a project (specific) runner.

Users often accidentally change instance runners to project runners, and they're unable to change them back. GitLab does not allow you to change a project runner to a shared runner because of the security implications. A runner meant for one project could be set to run jobs for an entire instance.

Administrators who need to add runners for multiple projects can register a runner for one project, then go to the Admin view and choose additional projects.
]]></description>
      <pubDate>Wed, 10 Nov 2021 22:44:01 +0000</pubDate>
    </item>
    <item>
      <title>Package pipelines in API payload is paginated</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/289956</link>
      <description><![CDATA[A request to the API for `/api/v4/projects/:id/packages` returns a paginated result of packages. Each package lists all of its pipelines in this response. This is a performance concern, as it's possible for a package to have hundreds or thousands of associated pipelines.

In milestone 17.0, we will remove the `pipelines` attribute from the API response.
]]></description>
      <pubDate>Wed, 10 Nov 2021 21:41:17 +0000</pubDate>
    </item>
    <item>
      <title>`dependency_proxy_for_private_groups` feature flag</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/276777</link>
      <description><![CDATA[We added a feature flag because <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/11582">GitLab-#11582</a> changed how public groups use the Dependency Proxy. Prior to this change, you could use the Dependency Proxy without authentication. The change requires authentication to use the Dependency Proxy.

In milestone 15.0, we will remove the feature flag entirely. Moving forward, you must authenticate when using the Dependency Proxy.
]]></description>
      <pubDate>Wed, 10 Nov 2021 19:40:09 +0000</pubDate>
    </item>
    <item>
      <title>`Versions` on base `PackageType`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/327453</link>
      <description><![CDATA[As part of the work to create a <a href="https://gitlab.com/groups/gitlab-org/-/epics/6318">Package Registry GraphQL API</a>, the Package group deprecated the `Version` type for the basic `PackageType` type and moved it to <a href="https://docs.gitlab.com/api/graphql/reference/#packagedetailstype">`PackageDetailsType`</a>.

In milestone 15.0, we will completely remove `Version` from `PackageType`.
]]></description>
      <pubDate>Wed, 10 Nov 2021 18:58:24 +0000</pubDate>
    </item>
    <item>
      <title>Known host required for GitLab Runner SSH executor</title>
      <link>https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28192</link>
      <description><![CDATA[In <a href="https://gitlab.com/gitlab-org/gitlab-runner/-/merge_requests/3074">GitLab 14.3</a>, we added a configuration setting in the GitLab Runner `config.toml` file. This setting, [`[runners.ssh.disable_strict_host_key_checking]`](https://docs.gitlab.com/runner/executors/ssh/#security), controls whether or not to use strict host key checking with the SSH executor.

In GitLab 15.0 and later, the default value for this configuration option will change from `true` to `false`. This means that strict host key checking will be enforced when using the GitLab Runner SSH executor.
]]></description>
      <pubDate>Tue, 9 Nov 2021 20:50:23 +0000</pubDate>
    </item>
    <item>
      <title>GraphQL API Runner status will not return `paused`</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/344648</link>
      <description><![CDATA[The GitLab Runner GraphQL API endpoints will not return `paused` or `active` as a status in GitLab 16.0.
In a future v5 of the REST API, the endpoints for GitLab Runner will also not return `paused` or `active`.

A runner's status will only relate to runner contact status, such as:
`online`, `offline`, or `not_connected`. Status `paused` or `active` will no longer appear.

When checking if a runner is `paused`, API users are advised to check the boolean attribute
`paused` to be `true` instead. When checking if a runner is `active`, check if `paused` is `false`.
]]></description>
      <pubDate>Thu, 4 Nov 2021 10:17:03 +0100</pubDate>
    </item>
    <item>
      <title>GitLab Serverless</title>
      <link>https://gitlab.com/groups/gitlab-org/configure/-/epics/6</link>
      <description><![CDATA[GitLab Serverless is a feature set to support Knative-based serverless development with automatic deployments and monitoring.

We decided to remove the GitLab Serverless features as they never really resonated with our users. Besides, given the continuous development of Kubernetes and Knative, our current implementations do not even work with recent versions.
]]></description>
      <pubDate>Thu, 16 Sep 2021 09:09:02 +0900</pubDate>
    </item>
    <item>
      <title>OmniAuth Kerberos gem</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/337384</link>
      <description><![CDATA[The `omniauth-kerberos` gem will be removed in our next major release, GitLab 15.0.

This gem has not been maintained and has very little usage. We therefore plan to remove support for this authentication method and recommend using the Kerberos <a href="https://en.wikipedia.org/wiki/SPNEGO">SPNEGO</a> integration instead. You can follow the <a href="https://docs.gitlab.com/integration/kerberos/#upgrading-from-password-based-to-ticket-based-kerberos-sign-ins">upgrade instructions</a> to upgrade from the `omniauth-kerberos` integration to the supported one.

Note that we are not deprecating the Kerberos SPNEGO integration, only the old password-based Kerberos integration.
]]></description>
      <pubDate>Wed, 15 Sep 2021 23:41:32 +0000</pubDate>
    </item>
    <item>
      <title>Legacy database configuration</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/338182</link>
      <description><![CDATA[The syntax of <a href="https://docs.gitlab.com/omnibus/settings/database/">GitLabs database</a>
configuration located in `database.yml` is changing and the legacy format is deprecated. The legacy format
supported using a single PostgreSQL adapter, whereas the new format is changing to support multiple databases. The `main:` database needs to be defined as a first configuration item.

This deprecation mainly impacts users compiling GitLab from source because Omnibus will handle this configuration automatically.
]]></description>
      <pubDate>Wed, 15 Sep 2021 16:52:41 +0000</pubDate>
    </item>
    <item>
      <title>Audit events for repository push events</title>
      <link>https://gitlab.com/gitlab-org/gitlab/-/issues/337993</link>
      <description><![CDATA[Audit events for **repository events** are now deprecated and will be removed in GitLab 15.0.

These events have always been disabled by default and had to be manually enabled with a
feature flag. Enabling them can cause too many events to be generated which can
dramatically slow down GitLab instances. For this reason, they are being removed.
]]></description>
      <pubDate>Tue, 14 Sep 2021 19:06:13 +0000</pubDate>
    </item>
  </channel>
</rss>
