Page MenuHomePhabricator

[Docs] Document how to deploy identity service
ClosedPublic

Authored by jon on Jul 19 2023, 7:08 PM.
Tags
None
Referenced Files
F2711526: D8581.id29021.diff
Mon, Sep 16, 12:31 AM
F2711523: D8581.id28876.diff
Mon, Sep 16, 12:29 AM
F2711518: D8581.id29137.diff
Mon, Sep 16, 12:26 AM
Unknown Object (File)
Fri, Sep 6, 3:21 AM
Unknown Object (File)
Sat, Aug 31, 11:06 AM
Unknown Object (File)
Tue, Aug 27, 1:10 PM
Unknown Object (File)
Mon, Aug 26, 6:21 PM
Unknown Object (File)
Wed, Aug 21, 12:09 PM
Subscribers

Details

Summary

Document how to deploy identity service, so that if another member
needs to address the deployment, they don't need to reverse engineer the actions.

https://linear.app/comm/issue/ENG-4420

Depends on D8580

Test Plan

N/A. documentation

Diff Detail

Repository
rCOMM Comm
Lint
No Lint Coverage
Unit
No Test Coverage

Event Timeline

varun requested changes to this revision.Jul 23 2023, 8:40 AM
varun added inline comments.
docs/nix_services_deployment.md
5
7
9
23
25
27
This revision now requires changes to proceed.Jul 23 2023, 8:40 AM
jon marked 6 inline comments as done.

Address feedback

This revision is now accepted and ready to land.Jul 25 2023, 12:36 PM
This revision was landed with ongoing or failed builds.Jul 27 2023, 7:50 AM
This revision was automatically updated to reflect the committed changes.

Going forward, please make sure I do a final review of docs diffs before they're landed. It's unfortunately the case that my review is still required to get things right...

docs/nix_services_deployment.md
17 ↗(On Diff #29137)
  1. Typo here ("Passwor" should be "Password")
  2. "without requiring the password credentials to be stored on the server" this is a weird statement. Standard password hashing doesn't "store" passwords directly on the server either. Both OPAQUE and standard password hashing store something derived from a password on the server. The point of OPAQUE isn't about preventing a server from STORING plaintext credentials, but rather from preventing a server from ACCESSING plaintext credentials.
jon added inline comments.
docs/nix_services_deployment.md
17 ↗(On Diff #29137)