Important Notice for ReadyAPI Customers |
ReadyAPI has moved to SmartBear License Management. From September 2023, all licenses issued for your subscription term will be ID-based licenses by default. If you are not currently on ID-based licensing, it's time to migrate immediately. File-based licensing will no longer be supported as of October 2023. This means that technical support requests related to file-based licensing will not be accommodated. If you encounter technical issues that you're unable to resolve, it could lead to service interruption. For customers still in the process of migration, we recommend reaching out to your Account Manager to discuss your migration plan. Alternatively, you can log a support request with our Customer Care Team for assistance.
ReadyAPI 3.49.0 includes a few changes compared to the previous product version – ReadyAPI 3.48.0. For information on the changes made to other versions, see Version History.
Note: | SmartBear License Management's license authentication and request flows were revised in November 2023. Authentication using the username and password is no longer supported for test execution via TestRunners, Jenkins or Azure plugins, and SmartBear-hosted licenses. Username and password are limited to on-prem-hosted licenses only. Access Key is the required option for authentication if using SmartBear-hosted licenses headlessly. |
GraphQL API from Introspection Query
We implemented the capability to import GraphQL APIs from Introspection Query.
Improvements
-
In ReadyAPI, transaction logs can be downloaded from REST, SOAP, TCP, JDBC and JMS virtual services hosted in VirtServer.
-
Enhanced privacy by concealing sensitive information under
sun.java.command
.
General Updates
-
We have fixed a few blocker vulnerabilities javasecurity:S6096 reported by Sonarqube
-
We updated the Postman Plugin to 3.0.0.
-
ReadyAPI 3.49.0 includes newer versions of some libraries that version 3.48.0 used. If your scripts refer to classes from these libraries, you might need to update the scripts.
Please see here for a list of fixes and security vulnerabilities included in this patch.