Releases: ascorbic/cirrus
@getcirrus/pds@0.5.0
@getcirrus/oauth-provider@0.2.1
@getcirrus/pds@0.4.1
@getcirrus/pds@0.4.0
Minor Changes
-
#74
0d4813eThanks @ascorbic! - Add pre-activation checks and emit-identity commandactivate command improvements:
- Run identity checks before activation (handle resolution, DID document, repo status)
- Display clear results table with pass/fail status
- Require confirmation if checks fail (skip with
--yes) - Verify activation succeeded after calling the endpoint
- Offer to emit identity event if all checks passed
- Add
--yes/-yflag to skip confirmation prompts
deactivate command improvements:
- Run identity checks to inform user of current state before deactivating
- Add
--yes/-yflag to skip confirmation prompts
New emit-identity command:
- Standalone
pds emit-identitycommand to notify relays to refresh handle verification - Useful after migration or handle changes
Internal changes:
- Moved emit identity endpoint from
/admin/emit-identityto XRPC namespacegg.mk.experimental.emitIdentityEvent
Patch Changes
-
#67
a633fb7Thanks @JackDallas! - Create user's bsky profile as part of the activate script -
#76
d6c2eb5Thanks @ascorbic! - Add relay status check topds statuscommand- Added
getRelayHostStatusmethod to PDSClient that callscom.atproto.sync.getHostStatuson the relay - Status command now shows relay status (active/idle/offline/throttled/banned) and account count
- Shows relay seq number when available
- Suggests running
emit-identityor requesting crawl when relay shows idle/offline
- Added
@getcirrus/oauth-provider@0.2.0
Minor Changes
- #77
2ea70ceThanks @ascorbic! - Add private_key_jwt client authentication and fix response_mode default- Implement RFC 7523 JWT Bearer client authentication for confidential OAuth clients
- Add
private_key_jwttotoken_endpoint_auth_methods_supportedin metadata - Support inline JWKS and remote JWKS URI for client public keys
- Fix default
response_modefromfragmenttoqueryfor authorization code flow - Add
userinfo_endpointto OAuth server metadata
@getcirrus/pds@0.3.1
Patch Changes
-
#71
a696032Thanks @ascorbic! - Fix foreign DID requests returning 404 for repo endpointsPreviously,
getRecord,listRecords, anddescribeReporeturned 404 when the requested repo DID didn't match the local PDS DID. Now these endpoints proxy foreign DID requests to the Bluesky AppView, enabling clients to fetch records from other users' repositories.
@getcirrus/pds@0.3.0
Minor Changes
-
#57
20ca34dThanks @ascorbic! - Addpds statusCLI command for comprehensive PDS health and configuration checks- Enhanced
/xrpc/_healthendpoint to verify Durable Object and SQLite storage health - New
pds statuscommand checks connectivity, repository state, identity resolution, blob import progress, federation status, and account activation - Shows DID resolution method (plc.directory or well-known) and handle verification method (DNS TXT and/or HTTP well-known)
- Added authenticated
/xrpc/gg.mk.experimental.getFirehoseStatusendpoint for firehose subscriber info
- Enhanced
-
#62
af0fde8Thanks @ascorbic! - Ping the Bluesky relay on account activation. Thepds activatecommand now callscom.atproto.sync.requestCrawlon bsky.network to notify the relay that the PDS is ready for federation. If the account is already active, runningpds activateagain will offer to retry notifying the relay.
Patch Changes
-
#56
fed94a4Thanks @JackDallas! - Add custom domain routing topds init- sets uprouteswithcustom_domain: truesowrangler deployconfigures DNS automatically -
#65
30910f7Thanks @ascorbic! - Switch to atcute for most internal protocol handling -
#68
a537cc6Thanks @ascorbic! - fix: correctly encode identity events -
#56
fed94a4Thanks @JackDallas! - Add multi-account selection topds init- detects multiple Cloudflare accounts viawrangler whoamiand prompts user to select one -
#58
adedb2bThanks @ascorbic! - Respect user's package manager choice in CLI commands. All CLI commands (init, migrate, activate, deactivate) now detect and use the user's package manager consistently. Changedwrangler deployreferences to use the appropriate package manager command (e.g.,pnpm run deploy). -
Updated dependencies [
95ffff6,30910f7]:- @getcirrus/oauth-provider@0.1.3
@getcirrus/oauth-provider@0.1.3
Patch Changes
-
#63
95ffff6Thanks @ascorbic! - Fix CSP blocking OAuth authorization flow in ChromeRemove
form-actionfrom CSP due to inconsistent browser behavior with redirects. Chrome blocks redirects after form submission if the redirect URL isn't inform-action, while Firefox does not. Since OAuth requires redirecting to the client's callback URL after consent,form-actioncannot be used without breaking the flow in Chrome. -
#65
30910f7Thanks @ascorbic! - Switch to atcute for most internal protocol handling