summaryrefslogtreecommitdiff
path: root/data
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2022-02-08 16:54:12 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2022-02-08 16:54:12 +0000
commit9104dda057cc7f2c65f07e509013f3cff10db590 (patch)
tree74af16bfb1bc2afc23fb385727fda39b0f211862 /data
parent2b77b43bec240eb5ed2c5422eb810df5eb8edfcc (diff)
downloadgitlab-ce-9104dda057cc7f2c65f07e509013f3cff10db590.tar.gz
Add latest changes from gitlab-org/gitlab@14-7-stable-ee
Diffstat (limited to 'data')
-rw-r--r--data/whats_new/202201200001_14_07.yml42
1 files changed, 42 insertions, 0 deletions
diff --git a/data/whats_new/202201200001_14_07.yml b/data/whats_new/202201200001_14_07.yml
new file mode 100644
index 00000000000..4f260ee8a8c
--- /dev/null
+++ b/data/whats_new/202201200001_14_07.yml
@@ -0,0 +1,42 @@
+- title: GitLab Runner compliant with FIPS 140-2
+ body: |
+ For some GitLab customers, U.S. government regulatory requirements require the use of FIPS (Federal Information Processing Standards) compliant software. The FIPS 140-2 and FIPS 140-3 publications define the security requirements for cryptographic modules used in computer and telecommunication systems, and within cyber systems that protect sensitive information. GitLab Runner is now FIPS 140-2 compliant for AMD64 compute architectures and Red Hat Enterprise Linux (RHEL) distributions. Refer to [this epic](https://gitlab.com/groups/gitlab-org/-/epics/5104) to follow the discussions about making GitLab FIPS compliant.
+ stage: Verify
+ self-managed: true
+ gitlab-com: false
+ packages: [Free, Premium, Ultimate]
+ url: 'https://docs.gitlab.com/runner/install/index.html#fips-compliant-gitlab-runner'
+ image_url: https://about.gitlab.com/images/growth/verify.png
+ published_at: 2022-01-22
+ release: 14.7
+- title: Streaming audit events
+ body: |
+ You can now stream audit events to a destination of your choosing! This is a great way to correlate GitLab audit events with other data streams you have, maintain a backup of audit events, or build out your own automation to take action when a specific audit event happens.
+
+ You can specify an HTTPS endpoint with our new GraphQL API and events are sent to it as webhooks. These messages contain the same information as the Audit Events UI about what type of change happened, when it happened, who was involved, as well as some additional metadata.
+
+ After you receive those messages, you can filter based on person, type, or inject that data into another third-party tool. This is a great way to trigger any custom automation you have built if, for example, a new user is created or a key setting is changed. We're excited to see what you use streaming audit events for and would love to hear from you about it! Let us know by commenting on the [epic](https://gitlab.com/groups/gitlab-org/-/epics/5925).
+ stage: Manage
+ self-managed: true
+ gitlab-com: true
+ packages: [Ultimate]
+ url: 'https://docs.gitlab.com/ee/administration/audit_event_streaming.html'
+ image_url: https://about.gitlab.com/images/growth/manage.jpg
+ published_at: 2022-01-22
+ release: 14.7
+- title: Group access tokens
+ body: |
+ With group access tokens, you can use a single token to perform actions for groups, manage the projects within the group, and, in GitLab 14.2 and later, authenticate with Git over HTTPS.
+
+ Previously, group access tokens were limited to self-managed instances only, and could only be generated using the Rails console. Now, you can create group access tokens using the UI and API. You can define token name, expiration date, and scope. You can also revoke an existing group access token.
+
+ Thank you [Fabio Huser](https://gitlab.com/fh1ch) for your contribution!
+ stage: Manage
+ self-managed: true
+ gitlab-com: true
+ packages: [Free, Premium, Ultimate]
+ url: 'https://docs.gitlab.com/ee/user/group/settings/group_access_tokens.html'
+ image_url: https://about.gitlab.com/images/14_7/group_access_token.png
+ published_at: 2022-01-22
+ release: 14.7
+