# bluesky-pds-docker A self-contained Docker image for the [Bluesky PDS (Personal Data Server) ](https://github.com/bluesky-social/pds). This image is pinned to v0.4.74. It is required to run the instance behind a proxy (like traefik) to generate SSL certificates. This will not work otherwise. The standard pds install includes caddy to handle this. I can confirm it works behind Cloudflare's DNS Proxy with Full (strict). ## Deployment ```bash # Generate secret environment variables echo PDS_ADMIN_PASSWORD: $(openssl rand --hex 16) echo PDS_JWT_SECRET: $(openssl rand --hex 16) echo PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX: $(openssl ecparam --name secp256k1 --genkey --noout --outform DER | tail --bytes=+8 | head --bytes=32 | xxd --plain --cols 32) # pull and run the container docker pull forgejo.gravityfargo.dev/gravityfargo/bluesky-pds docker-compose up -d # Create an account docker exec -it bluesky-pds bash pdsadmin account create pdsadmin account list pdsadmin request-crawl bsky.network # useful if you re-deploy the same instance multiple times ``` In your browser: - Go to https://bsky-debug.app/handle and enter your new user, "HTTP Verification Method" needs to pass. - [websocket-tester](https://piehost.com/websocket-tester) "wss://example.com/xrpc/com.atproto.sync.subscribeRepos?cursor=0" needs to display "Connection Established" - https://boat.kelinci.net/ has a helpful tool to export your data. - Log in with your new user and go to https://bsky.app/ ### Example Docker Compose Full list of additional Environment Variables can be found in the [packages/pds/src/config/env.ts](https://github.com/bluesky-social/atproto/blob/main/packages/pds/src/config/env.ts) ```yaml services: bluesky-pds: container_name: bluesky-pds image: forgejo.gravityfargo.dev/gravityfargo/bluesky-pds environment: PDS_JWT_SECRET: ... PDS_ADMIN_PASSWORD: ... PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX: ... PDS_HOSTNAME: ... PDS_EMAIL_SMTP_URL: "" PDS_EMAIL_FROM_ADDRESS: "" volumes: - ./bluesky-pds:/pds ``` ### Example Docker Compose with Traefik ```yaml services: bluesky-pds: container_name: bluesky-pds image: forgejo.gravityfargo.dev/gravityfargo/bluesky-pds:latest networks: - proxy env_file: PDS_ADMIN_PASSWORD: "" PDS_JWT_SECRET: "" PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX: "" PDS_HOSTNAME: example.com PDS_EMAIL_SMTP_URL: "" PDS_EMAIL_FROM_ADDRESS: "" volumes: - ./bluesky-pds:/pds labels: traefik.enable: "true" traefik.http.routers.bluesky-pds-insecure.entrypoints: http traefik.http.routers.bluesky-pds-insecure.rule: HostRegexp(`^.+\.example\.com$`) || Host(`example.social`) traefik.http.routers.bluesky-pds-secure.entrypoints: https traefik.http.routers.bluesky-pds-secure.rule: HostRegexp(`^.+\.example\.com$`) || Host(`example.social`) traefik.http.routers.bluesky-pds-secure.tls: "true" traefik.http.services.bluesky-pds.loadbalancer.server.scheme: http traefik.http.services.bluesky-pds.loadbalancer.server.port: 3000 traefik.http.routers.bluesky-pds-secure.middlewares: BlueskyHeaders@file traefik.http.routers.bluesky-pds-insecure.middlewares: BlueskyHeaders@file ``` #### Middleware I think file configs are cleaner than having a billion labels. ```yaml http: middlewares: BlueskyHeaders: headers: accessControlAllowMethods: - GET - OPTIONS - PUT - POST - DELETE accessControlAllowHeaders: "*" accessControlAllowOriginList: "*" addVaryHeader: true stsSeconds: 63072000 ``` ## Development Notes ```bash pamac install jq ```