X-Git-Url: http://git.shadowcat.co.uk/gitweb/gitweb.cgi?a=blobdiff_plain;f=Changes;h=928442f204267bda9cac9c94c1f108b79fb60134;hb=0129447958279047f2088788a9cc1c4971e1c453;hp=a1b4d27c96cde7fef96e45bdf9e70b7a8d02b488;hpb=0810283f5e3c710d09ab56ceb8fb0b6bfbe3bbe9;p=catagits%2FCatalyst-Runtime.git diff --git a/Changes b/Changes index a1b4d27..928442f 100644 --- a/Changes +++ b/Changes @@ -1,5 +1,26 @@ # This file documents the revision history for Perl extension Catalyst. +5.90078 - 2014-12-30 + - POD corrections (sergey++) + - New configuration option to disable the HTTP Exception passthru feature + introduced in 5.90060. You can use this if that feature is causing you + trouble. (davewood++); + - Some additional helper methods for dealing with errors. + - More clear exception when $request->body_data tries to parse malformed POSTed + data. Added documentation and tests around this. + +5.90077 - 2014-11-18 + - We store the PSGI $env in Catalyst::Engine for backcompat reasons. Changed + this so that the storage is a weak reference, so that it goes out of scope + with the request. This solves an issue where items in the stash (now in the + PSGI env) would not get closed at the end of the request. This caused some + regression, primarily in custom testing classes. + +5.90076 - 2014-11-13 + - If throwing an exception object that does the code method, make sure that + method returns an expected HTTP status code before passing it on to the + HTTP Exception middleware. + 5.90075 - 2014-10-06 - Documentation patch for $c->req->param to point out the recently discovered potential security issues: http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/