The release notes provide information on the features and improvements in the specified version.
The release dates that are related to the version of the release are published in the Study guide release schedule
Improvements
The issues in release mentioned under the section improvements are considered as new functionality, user experience improvements or bug fixes. Issues marked as hotfix are developed in this sprint but applied to the previous release or directly to production, depending on impact.
Import should not fail on usage of symbols - SG-494
The import of Study guide from Curriculum failed in case symbols were used in a code. The request to get the data based on the code failed as did the import. A fix is applied to support importing data from Curriculum with codes having symbol (characters).
The definition of a new field should not select the first reference type - SG-495
When configuring a new field in a widget, the ‘reference type’ selector always selected the first reference option. This was caused by the fact there was no empty option. A fix is applied to add the empty option to the list and no longer select a reference option.
The selection between table or list view in structure should be global - SG-325
The Table/List switcher on the structure page was shown for each top-level or nested group, which creates a busy interface and duplication of code. From a usability perspective the change is made to move the toggle to the the top of the page (similar to already used in overview pages).
Security
An integral part of our development and build process is automatic scanning for known security vulnerabilities. The vulnerabilities will be fixed based on their impact, which means that in some cases an immediate hot-fix will be applied, and in other cases the vulnerability will be fixed in the current or next Sprint (release). The security section provides an overview of the vulnerabilities mitigated.
For more information on reported vulnerabilities, see the central database of vulnerabilities.
During this release no vulnerabilities were reported that require mitigation.
For more guidance on configuration and setup of Study Guide, use the relevant Study Guide manual.