Add latest changes from gitlab-org/gitlab@master

This commit is contained in:
GitLab Bot
2025-06-18 00:11:53 +00:00
parent ca0ea54efa
commit a921a968be
3 changed files with 54 additions and 16 deletions

View File

@ -88,10 +88,12 @@ Advanced search follows the [Elasticsearch end-of-life policy](https://www.elast
| GitLab version | OpenSearch version |
|-------------------------|--------------------------------|
| GitLab 18.1 and later | OpenSearch 1.x and later |
| GitLab 17.6.3 and later | OpenSearch 1.x and 2.x |
| GitLab 17.6.3 to 18.0 | OpenSearch 1.x and 2.x |
| GitLab 15.5.3 to 17.6.2 | OpenSearch 1.x, 2.0 to 2.17 |
| GitLab 15.0 to 15.5.2 | OpenSearch 1.x |
OpenSearch 3.x is supported starting from GitLab 18.1. See [merge request 192197](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192197) for details.
If your version of Elasticsearch or OpenSearch is incompatible, to prevent data loss, indexing pauses and
a message is logged in the
[`elasticsearch.log`](../../administration/logs/_index.md#elasticsearchlog) file.

View File

@ -30,6 +30,9 @@ Secret push protection
Merge request approval policies
: Enforce an additional approval on merge requests that would introduce vulnerabilities.
For a click-through demo, see [Integrating security to the pipeline](https://gitlab.navattic.com/gitlab-scans).
<!-- Demo published on 2024-01-15 -->
## How application security testing works
GitLab detects security vulnerabilities throughout your code, dependencies, containers, and
@ -46,7 +49,7 @@ During development
created.
Outside development
: Security testing can be run manually on-demand or scheduled to run at regular intervals.
: Security testing can be run manually on demand or scheduled to run at regular intervals.
## Vulnerability management lifecycle

View File

@ -19,22 +19,55 @@ title: Client-side secret detection
{{< /history >}}
When you create an issue, propose a merge request, or write a comment, you might accidentally post a
When you create an issue, add a description to a merge request, or write a comment, you might accidentally post a
secret. For example, you might paste in the details of an API request or an environment variable
that contains an authentication token. If a secret is leaked it could be used to do harm.
that contains an authentication token. If a secret is leaked, an adversary can use it to impersonate a legitimate user.
Client-side secret detection helps to minimize the risk of that happening. When you edit the
description or comment in an issue or merge request, GitLab checks if it contains a secret. If a
secret is found, a warning message is displayed. You can then edit the description or comment to
remove the secret before posting your message, or add the description or comment as it is. This
check occurs in your browser, so the secret is not revealed to anyone else unless you add it to
GitLab. The check is always on; you don't have to set it up.
Client-side secret detection helps minimize the risk of accidental secret exposure. When you edit a
description, or comment in an issue or merge request, GitLab automatically scans the content for secrets.
Client-side secret detection checks only the following for secrets:
## Secret detection workflow
- Comments in issues or merge requests.
- Descriptions of issues or merge requests.
Client-side secret detection operates entirely within your browser using pattern matching. This approach ensures that:
Secrets with custom prefixes are supported only for GitLab personal access tokens.
For more information about which types of secrets are covered by client-side secret detection, see
[Detected secrets](../detected_secrets.md).
- Secrets are detected before they are submitted to GitLab.
- No sensitive information is transmitted during the detection process.
- The feature works seamlessly without requiring additional configuration.
## Getting started
Client-side secret detection is enabled by default for all GitLab tiers. No setup or configuration is required.
To test this feature:
1. Navigate to any issue or merge request
1. Add a comment containing a test secret pattern, such as `glpat-xxxxxxxxxxxxxxxxxxxx`
1. Observe the warning message that appears before you submit
Always use placeholder values when you test to avoid exposing real secrets.
## Coverage
Client-side secret detection analyzes the following content:
- Issue descriptions and comments
- Merge request descriptions and comments
For detailed information about the specific types of secrets detected, see the [Detected secrets](../detected_secrets.md) documentation.
## Understanding the results
When client-side secret detection identifies a potential secret, GitLab displays a warning that highlights the detected secret.
You can either:
- **Edit** the content of the comment or description to remove the secret.
- **Add** content without making any changes. Exercise caution before you add content that contains a potential secret.
The detection occurs entirely in your browser. No information is transmitted unless you select **Add**.
## Optimization
To maximize the effectiveness of client-side secret detection:
- Review warnings carefully. Always investigate flagged content before proceeding.
- Use placeholders. Replace actual secrets with placeholder text like `[REDACTED]` or `<API_KEY>`.