The release notes provide information on the features and improvements in the specified version.
Improvements
The issues mentioned under the section improvements are considered as new functionality, user experience improvements and bug fixes.
Several UI fixes - SG-351, SG-362, SG-353, SG-352
Several minor UI fixes have been applied during this release for both the laptop and mobile interface:
- Language switcher will always be available in multi-lingual environments
- Tab width is made consistent over the different tabs to improve usability
- Tables will no longer exceed the maximum defined width
- The active tab will be correctly visually marked active
- Mobile menu is made more accessible
First step towards improved synchronisation of study guide - SG-338
In Curriculum different steps have been made to streamline the publishing process of object updates using a publish and subscribe mechanism. Study guide is currently updating information using a nightly job that retrieves all information from curriculum.
In the near future an improvement in synchronisation will be made to support the pub-sub mechanism for study guide. This means that updates made (and approved) in Curriculum will be published and study guide will receive and process the update. The requirement for the nightly job is in that case no longer required to run on a daily basis and could for instance run weekly. Heavily reducing load by only running a full synchronisation weekly and processing updates right away. This immediate processing of updates will always offer the latest (approved) information to the study guide users.
Security
An integral part of our develop and build processes is automatic scanning for known security vulnerabilities. The vulnerabilities will be fixed based on their impact, which means that in some cases an immediate hot-fix will be applied, and in other cases the vulnerability will be fixed in the current or next Sprint (release). The security section provides an overview of the vulnerabilities mitigated.
This release mitigates the following vulnerabilities:
For more information on reported vulnerabilities, see the central database of vulnerabilities.
For more guidance on configuration and setup of Study Guide, use the relevant Study Guide manual.