| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: lighttpd-mod_vhostdb_pgsql | Distribution: openSUSE Tumbleweed |
| Version: 1.4.82 | Vendor: openSUSE |
| Release: 1.3 | Build date: Fri Sep 12 22:14:47 2025 |
| Group: Productivity/Networking/Web/Servers | Build host: reproducible |
| Size: 15911 | Source RPM: lighttpd-1.4.82-1.3.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: https://www.lighttpd.net/ | |
| Summary: PostgreSQL based virtual hosts module for Lighttpd | |
With PostgreSQL based vhosting you can put the information where to look for the document-root of a given host into a PostgreSQL database.
BSD-3-Clause
* Fri Sep 12 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.82:
* restrict request trailers to configured list:
trailers in request headers will be ignored unless allowed
field names are explicitly configured in a comma-separated list
containing no spaces:
server.feature-flags += (“request.trailer-whitelist” => “…”)
This changes behavior from lighttpd 1.4.80, which added support
for request trailers and header merging, but did not restrict
request trailers.
* bug fixes
* Thu Aug 14 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.80:
* detect and issue error trace for HTTP/2 MadeYouReset
CVE-2025-8671 (boo#1243888)
* stricter HTTP request/response header, trailer, and chunked
validation/parsing
* support HTTP response trailers
* support HTTP request trailers merge to headers (if not
streaming request body)
* extend TLS error log messages to include client addr if error
caused by client
* extend TLS error log messages for HTTP/2 attack detection
* reject path info on static files by default
(static-file.disable-pathinfo)
* Mon Jul 21 2025 Stefan Bühler <source@stbuehler.de>
- update upstream keys (uids / expiry)
- split some modules into separate packages, but require them in the
main package for now:
* mod_openssl
* mod_deflate
* mod_authn_dbi
- add alternative tls modules:
* mod_gnutls
* mod_mbedtls
* mod_nss
- suggest DBI drivers with dbi modules
- suggest some geoip packages for mod_maxminddb
- kTLS offloading support (boo#1240669):
* autoload tls kernel module with mod_openssl and mod_gnutls
- use lua5.4 (upgrade from lua5.1) for mod_magnet
- require libxcrypt-devel explicitly (for crypt_r)
* Sun May 18 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.79:
* bug fix for mod_openssl using both ECDSA and RSA certs
* hardened systemd lighttpd.service
- drop harden_lighttpd.service.patch
* Wed Mar 26 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.78:
* option to reload TLS certs and CRLs
* bug fixes
* Sun Mar 23 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.77:
* stronger TLS defaults: TLSv1.3
* defaults t limit TLSv1.3 Groups to the IANA “Recommended” set:
“X25519:P-256:P-384:X448”
* server.error-handler-404 operates only on 404
* lighttpd.conf renamed lighttpd.annotated.conf, lighttpd.conf is
now a simpler header which includes lighttpd.annotated.conf.
* Sat Apr 13 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.76:
* detect VU#421644 HTTP/2 CONTINUATION Flood
* issue trace and send GO_AWAY
* tarball is now more reproducible and verifiable
* Sat Mar 23 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.75:
* incrementally stronger TLS cipher defaults
* fix a regression in mod_dirlisting in lighttpd 1.4.74
* add missing file src/compat/sys/queue.h to the release tarball
- packaging changes upon notes by the upstream developers:
* drop usage of lightytest.sh and PHP dependencies
* drop unneeeded build dependencies and build options
* drop non-default BZIP2 support
* update description of -mod_webdav
* Fri Mar 01 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.74:
* Some messages sent to syslog() (if enabled in lighttpd config)
have been changed to use different priorities (e.g.
LOG_WARNING, LOG_DEBUG) instead of everything being sent with
LOG_ERROR priority. The change affects only lighttpd configs
which set server.errorlog-use-syslog = “enable” (not default)
* Other bug fixes
* Mon Feb 05 2024 Andreas Stieger <andreas.stieger@gmx.de>
- fix user/group with rpm 4.19 (boo#1219549)
* Tue Oct 31 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.73:
* CVE-2023-44487: HTTP/2 detect and log rapid reset attack
(boo#1216123)
* Sat Oct 07 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.72:
* a number of buf fixes and developer visible changes
* Sun May 28 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.71:
* HTTP/2 support separated to mod_h2 module
* Fri May 12 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.70:
* speed up CGI spawning
* support HTTP/2 downstream proxy serving multiple clients on
single connection (mod_extforward, mod_maxminddb)
* no longer building separate modules for built-in modules
lighttpd omits building separate (unused) modules for:
mod_access mod_alias mod_evhost mod_expire mod_fastcgi
mod_indexfile mod_redirect mod_rewrite mod_scgi mod_setenv
mod_simple_vhost mod_staticfile
* Sat Feb 11 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.69:
* bug fixes and portability fixes
* Sat Jan 21 2023 Andreas Stieger <andreas.stieger@gmx.de>
- update to 1.4.68:
* TLS modules now default to using stronger, modern ciphers and
will default to allow client preference in selecting ciphers.
Allowing client preference in selecting ciphers is safe to do along
with restrictions to use modern ciphers supporting PFS, and is
better for mobile users without AES hardware acceleration.
Legacy ciphers can still be configured in lighttpd.conf using
`ssl.openssl.ssl-conf-cmd`, as long as the ciphers are supported by
the underlying TLS libraries. https://wiki.lighttpd.net/Docs_SSL
new defaults:
“CipherString” => “EECDH+AESGCM:AES256+EECDH:CHACHA20:SHA256:!SHA384”,
“Options” => “-ServerPreference”
old defaults:
“CipherString” => “HIGH”,
“Options” => “ServerPreference”
* Deprecated TLS options have been removed.
– ssl.honor-cipher-order
– ssl.dh-file
– ssl.ec-curve
– ssl.disable-client-renegotiation
– ssl.use-sslv2
– ssl.use-sslv3
See https://wiki.lighttpd.net/Docs_SSL for replacements with
`ssl.openssl.ssl-conf-cmd`, but prefer lighttpd defaults instead.
* Deprecated: mod_evasive has been removed
* Deprecated: mod_secdownload has been removed
* Deprecated: mod_uploadprogress has been removed
* Deprecated: mod_usertrack has been removed
These four modules can be replaced with a few lines of LUA.
/usr/lib64/lighttpd/mod_vhostdb_pgsql.so /usr/share/licenses/lighttpd-mod_vhostdb_pgsql /usr/share/licenses/lighttpd-mod_vhostdb_pgsql/COPYING
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Mar 18 23:51:43 2026