diff --git a/docs/.vuepress/components/Redirect.vue b/docs/.vuepress/components/Redirect.vue
new file mode 100644
index 000000000..a6e4ba6b5
--- /dev/null
+++ b/docs/.vuepress/components/Redirect.vue
@@ -0,0 +1,17 @@
+
+
+
diff --git a/docs/.vuepress/config.js b/docs/.vuepress/config.js
index 5f5bf87d3..2c57a7d95 100644
--- a/docs/.vuepress/config.js
+++ b/docs/.vuepress/config.js
@@ -7,37 +7,18 @@ module.exports = {
"check-md": {
pattern: "**/*.md",
},
-
sitemap: {
hostname: "https://www.pomerium.io",
},
"@vuepress/google-analytics": {
ga: "UA-129872447-2",
},
- "@vuepress/blog": {
- directories: [
- {
- id: "post",
- dirname: "_posts",
- path: "/posts/",
- itemPermalink: "/posts/:year/:month/:day/:slug",
- },
- ],
- },
- "vuepress-plugin-mailchimp": {
- title: "Sign up to be notified of new features and updates",
- content: " ",
- endpoint:
- "https://pomerium.us19.list-manage.com/subscribe/post?u=76f0996a737c138396687fd6b&id=2f4f70cf07",
- sitemap: {
- hostname: "https://www.pomerium.io",
- },
- },
},
markdown: {
externalLinkSymbol: false,
},
themeConfig: {
+ home: false,
logo: "/logo-long-civez.png",
repo: "pomerium/pomerium",
editLinks: true,
@@ -48,7 +29,7 @@ module.exports = {
{ text: "Documentation", link: "/docs/" },
{ text: "Reference", link: "/reference/" },
{ text: "Guides", link: "/guides/" },
- { text: "Enterprise", link: "/enterprise/" },
+ { text: "Enterprise", link: "/", target: "_self", rel: "" },
{
text: "v0.10.x", // current tagged version
ariaLabel: "Version menu",
@@ -173,15 +154,6 @@ module.exports = {
],
},
],
- "/enterprise/": [
- {
- title: "Enterprise",
- type: "group",
- collapsable: false,
- sidebarDepth: 1,
- children: [""],
- },
- ],
"/reference/": [
{
title: "",
diff --git a/docs/.vuepress/public/_redirects b/docs/.vuepress/public/_redirects
index ca88707e0..0db3134d3 100644
--- a/docs/.vuepress/public/_redirects
+++ b/docs/.vuepress/public/_redirects
@@ -43,3 +43,13 @@
/docs/reference/programmatic-access.html /docs/topics/programmatic-access.html
/docs/reference/examples.html /configuration/examples.html
+
+/posts/2020/06/01/release-0-9/ /blog/posts-2020-06-01-release-0-9/
+/posts/2020/05/11/release-0-8/ /blog/announcing-pomerium-0-8/
+/posts/2020/04/16/release-0-7/ /blog/announcing-pomerium-0-7/
+
+/jobs/ /careers/
+/jobs/Frontend-Engineer.html /careers/frontend-engineer/
+/jobs/Backend-Engineer.html /careers/backend-engineer/
+
+/enterprise/ /
\ No newline at end of file
diff --git a/docs/.vuepress/public/account.svg b/docs/.vuepress/public/account.svg
deleted file mode 100644
index 555dcc538..000000000
--- a/docs/.vuepress/public/account.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/docs/.vuepress/public/easier-to-manage.svg b/docs/.vuepress/public/easier-to-manage.svg
deleted file mode 100644
index 7ab605ec6..000000000
--- a/docs/.vuepress/public/easier-to-manage.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/docs/.vuepress/public/pomerium-in-action-800-600.mp4 b/docs/.vuepress/public/pomerium-in-action-800-600.mp4
deleted file mode 100644
index 2042ca7e1..000000000
Binary files a/docs/.vuepress/public/pomerium-in-action-800-600.mp4 and /dev/null differ
diff --git a/docs/.vuepress/public/remote.svg b/docs/.vuepress/public/remote.svg
deleted file mode 100644
index 9765d1abe..000000000
--- a/docs/.vuepress/public/remote.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/docs/.vuepress/public/secure-server.svg b/docs/.vuepress/public/secure-server.svg
deleted file mode 100644
index a59520606..000000000
--- a/docs/.vuepress/public/secure-server.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/docs/.vuepress/public/security-in-depth.svg b/docs/.vuepress/public/security-in-depth.svg
deleted file mode 100644
index 5b3282b8d..000000000
--- a/docs/.vuepress/public/security-in-depth.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/docs/.vuepress/theme/index.js b/docs/.vuepress/theme/index.js
index b91b8a576..0fe3d63fe 100644
--- a/docs/.vuepress/theme/index.js
+++ b/docs/.vuepress/theme/index.js
@@ -1,3 +1,3 @@
module.exports = {
- extend: '@vuepress/theme-default'
-}
+ extend: "@vuepress/theme-default",
+};
diff --git a/docs/_posts/2020-04-16-release-0-7.md b/docs/_posts/2020-04-16-release-0-7.md
deleted file mode 100644
index 17fedd9fb..000000000
--- a/docs/_posts/2020-04-16-release-0-7.md
+++ /dev/null
@@ -1,30 +0,0 @@
----
-title: Announcing Pomerium 0.7
-date: 2020-4-16
-tags:
- - release
- - pomerium
- - announcement
-author: "Bobby DeSimone"
----
-
-# Announcing Pomerium 0.7
-
-The 0.7 release of Pomerium lays the groundwork to support rich, dynamic access policies capable of making authorization decisions based on external data-sources from outside your identity provider.
-
-This release includes the following features:
-
-- **Open Policy Agent**: Pomerium now leverages Cloud Native Computing Foundation's [Open Policy Agent](https://www.openpolicyagent.org/) (OPA) as the default policy engine. OPA support in this version unlocks future capabilities for writing authorization policy in the rego policy language. This will promote safe, performant, fine-grained controls to incorporate data from external records of account. Access policies will continue to work as before, but will now be backed by an even faster evaluation engine.
-
-- [**Service Account Generator**](https://www.pomerium.io/docs/reference/impersonation.html#using-the-command-line-interface): Pomerium now includes a command line interface for generating arbitrary route-based service account sessions. Generated service accounts can be used to impersonate users, perform service-to-service communication, and facilitate end-to-end testing for applications managed by Pomerium.
-
-- **JWT-based sessions**: Pomerium now uses standard [JSON Web Tokens](https://en.wikipedia.org/wiki/JSON_Web_Token) (RFC 7519) across all routes and associated user sessions. Cryptographically signed JWT sessions are also made available to downstream applications so that internal app developers can spend less time reinventing SSO, and more time on their apps.
-
-This release includes 62 commits from 11 authors across 7 organizations and includes additional new features, secure workflow enhancements, general improvements, and bug fixes! A complete list of the changes in this release can be found in Pomerium's 0.7 [changelog].
-
-As always, we recommend upgrading and testing this release in an isolated environment. If you experience any issues, please report them on the Pomerium GitHub [issue tracker].
-
-
-
-[changelog]: ../docs/CHANGELOG.md
-[issue tracker]: https://github.com/pomerium/pomerium/issues
diff --git a/docs/_posts/2020-05-11-release-0-8.md b/docs/_posts/2020-05-11-release-0-8.md
deleted file mode 100644
index 5e293bc2b..000000000
--- a/docs/_posts/2020-05-11-release-0-8.md
+++ /dev/null
@@ -1,34 +0,0 @@
----
-title: Announcing Pomerium 0.8
-date: 2020-5-11
-tags:
- - release
- - pomerium
- - announcement
-author: Bobby DeSimone
----
-
-# Announcing Pomerium 0.8
-
-We are excited to announce the [0.8 release] of Pomerium which adds support for some of our most requested features including:
-
-- [**Automatic Certificate Management**] — Pomerium can now be configured to automatically retrieve and renew certificates, adding HTTPS to all Pomerium managed routes. In addition, Pomerium will do [OCSP stapling](https://en.wikipedia.org/wiki/OCSP_stapling) for automatic and custom certificates alike.
-- [**Advanced Route Matching**] — Operators can now write access policy that supports route matching based on [regex], [prefix], and [path] settings. Pomerium now has the flexibility to support multiple and layered authorization policies across a single managed route.
-- And finally, this release adds [**Github**](https://github.com/) as a supported identity provider.
-
-Pomerium had 95 commits from 8 authors across 5 organizations in this release. This release also includes additional new features, general improvements, and bug fixes, a complete list of which can be found in the [changelog].
-
-As always, we recommend upgrading and testing this release in an isolated environment. If you experience any issues, please report them on the Pomerium GitHub [issue tracker].
-
-
-
-[**advanced route matching**]: ../reference/readme.md#policy
-[**automatic certificate management**]: ../docs/topics/certificates.md#per-route-automatic-certificates
-[0.8 release]: https://github.com/pomerium/pomerium/releases/tag/v8.0.0
-[changelog]: ../docs/CHANGELOG.md
-[**github**]: ../docs/identity-providers/github.md
-[issue tracker]: https://github.com/pomerium/pomerium/issues
-[let's encrypt]: https://letsencrypt.org/
-[path]: ../reference/readme.md#path
-[prefix]: ../reference/readme.md#prefix
-[regex]: ../reference/readme.md#regex
diff --git a/docs/_posts/2020-06-01-release-0-9.md b/docs/_posts/2020-06-01-release-0-9.md
deleted file mode 100644
index e5e20f25b..000000000
--- a/docs/_posts/2020-06-01-release-0-9.md
+++ /dev/null
@@ -1,23 +0,0 @@
----
-title: Announcing Pomerium 0.9
-date: 2020-6-1
-tags:
- - release
- - pomerium
- - announcement
-author: Bobby DeSimone
----
-
-# Announcing Pomerium 0.9
-
-We are excited to announce the [0.9 release](https://github.com/pomerium/pomerium/releases/tag/v0.9.0) of Pomerium which includes a complete refactor of the proxy service and several security-enhancing features. Those features include:
-
-- [Envoy](https://www.envoyproxy.io/)-based data plane — Pomerium now leverages Envoy for request proxying rather than the previous custom-built proxy. This change gives operators confidence that Pomerium will be able to handle any workload.
-- [Client Certificate Support](https://www.pomerium.io/configuration/#tls-client-certificate) — A [core principle](https://www.pomerium.io/docs/background.html#zero-trust-security-behind-the-gates) of the zero-trust security model is that every request should be not only authenticated and authorized, but also mutually authenticated and encrypted. With this release, Pomerium adds support for [mutually authenticated encryption](https://www.pomerium.io/recipes/mtls.html) (mTLS) starting with the user's device itself.
-- [JWKS Endpoint](https://www.pomerium.io/configuration/#signing-key) — Pomerium now surfaces a JWKS endpoint that can be used by upstream applications as well as other services such as [Istio](https://www.pomerium.io/configuration/examples.html#istio) to [verify](https://www.pomerium.io/docs/reference/getting-users-identity.html#verification) the authenticity of a Pomerium managed request.
-
-Pomerium had 99 commits from 9 authors across 6 organizations [in this release](https://github.com/pomerium/pomerium/releases/tag/v0.9.0). This release also includes additional new features, general improvements, and bug fixes, a complete list of which can be found in the [changelog](https://www.pomerium.io/docs/CHANGELOG.html).
-
-As always, we recommend upgrading and testing this release in an isolated environment. If you experience any issues, please report them on the Pomerium GitHub [issue tracker](https://github.com/pomerium/pomerium/issues).
-
-
diff --git a/docs/enterprise/readme.md b/docs/enterprise/readme.md
deleted file mode 100644
index 514a3353e..000000000
--- a/docs/enterprise/readme.md
+++ /dev/null
@@ -1,7 +0,0 @@
----
-
-home: true
-heroText: Pomerium Enterprise
-tagline: Governance, reporting, compliance, and policy features built for organizations.
-search: false
-contactForm: true
diff --git a/docs/jobs/Backend-Engineer.md b/docs/jobs/Backend-Engineer.md
deleted file mode 100644
index 13f4c2523..000000000
--- a/docs/jobs/Backend-Engineer.md
+++ /dev/null
@@ -1,40 +0,0 @@
-# Backend Engineer
-
-Job Posted: May 12, 2020 9:59 AM Languages: Go Location: Remote US/CA
-
-# Backend Engineer
-
-Hi there! We're looking for a Backend Software Engineer to join the team!
-
-## Responsibilities:
-
-- Write robust, maintainable code
-- Work with product and design to iterate on customer needs
-- Review code and participate in group discussions
-
-## Qualifications:
-
-- 3+ years experience building web applications at scale
-- Go (Golang)
-- Experience with relational databases
-- Knowledge of standard methodologies: monitoring, alerting, metrics
-- Strong written communication and collaboration skills
-- Experience with AWS, GCP, or Azure environments
-
-## Preferred Qualifications:
-
-- Remote work experience
-- Experience with OAuth2, OIDC, SAML, and other IAM technologies
-- Experience building gRPC and REST based services
-- Familiarity with Kubernetes, Helm, and other Cloud Native applications
-
-## About Pomerium:
-
-Pomerium helps companies manage and secure internal access. We
-
-- are a fast growing, well funded, venture backed startup.
-- are a fully remote team. While prior experience working remotely isn't required, we are looking for team members who perform well given a high level of independence and autonomy.
-- offer competitive salaries
-- are committed to building a team that represents a variety of backgrounds, perspectives, and skills. We believe the more inclusive we are, the better our company will be.
-
-Check out our [github](https://github.com/pomerium/pomerium) and [site](http://www.pomerium.com/) to learn more about us!
diff --git a/docs/jobs/Frontend-Engineer.md b/docs/jobs/Frontend-Engineer.md
deleted file mode 100644
index a12ca2424..000000000
--- a/docs/jobs/Frontend-Engineer.md
+++ /dev/null
@@ -1,36 +0,0 @@
-# Frontend Engineer
-
-Job Posted: May 12, 2020 10:04 AM Languages: Javascript, React Location: Remote US/CA
-
-Hi there! We're looking for a Frontend Software Engineer to join the team.
-
-## Responsibilities:
-
-- Write robust, maintainable code
-- Work with product and design to iterate on customer needs
-- Review code and participate in group discussions
-
-## Qualifications:
-
-- 3+ years experience building web applications at scale
-- 3+ years of javascript, css, typescript, or other
-- React, React Native, or similar framework experience
-- Experience with relational databases
-- Knowledge of standard methodologies: monitoring, alerting, metrics
-- Strong written communication and collaboration skills
-- Experience with AWS, GCP, or Azure environments
-
-## Preferred Qualifications:
-
-- Remote work experience
-- Experience with OAuth2, OIDC, SAML, and other IAM technologies
-- Familiarity with Kubernetes, Helm, and other Cloud Native applications
-
-## About Pomerium:
-
-Pomerium helps companies manage and secure internal access. We
-
-- are a fast growing, well funded, venture backed startup.
-- are a fully remote team. While prior experience working remotely isn't required, we are looking for team members who perform well given a high level of independence and autonomy.
-- offer competitive salaries
-- are committed to building a team that represents a variety of backgrounds, perspectives, and skills. We believe the more inclusive we are, the better our company will be
diff --git a/docs/jobs/readme.md b/docs/jobs/readme.md
deleted file mode 100644
index 4b9eedb02..000000000
--- a/docs/jobs/readme.md
+++ /dev/null
@@ -1,12 +0,0 @@
-# Careers at Pomerium
-
-## Help us build the future secure application access
-
-Pomerium builds identity and access management infrastructure for the internet. We're helping small startups and the world's biggest companies improve their security posture, facilitate distributed remote work, and scale their efforts globally. And we'd like your help.
-
-Interested in joining our all-remote team? Check out some of our open positions.
-
-# Open Positions
-
-- [Frontend Engineer](./Frontend-Engineer.md)
-- [Backend Engineer](./Backend-Engineer.md)
diff --git a/docs/readme.md b/docs/readme.md
index b83ebdc95..bce08b424 100644
--- a/docs/readme.md
+++ b/docs/readme.md
@@ -1,35 +1,2 @@
----
-home: true
-footer: true
-heroImage: /pomerium-in-action-800-600.mp4
-heroText: Secure Application Access
-tagline: Authenticate, authorize, monitor, and secure user access to any application without a VPN.
-search: false
-
-triples:
- - title: "Security in-depth"
- text: "Stop depending on the unblemished security of the corporate perimeter. Pomerium can mutually authenticate, and encrypt every request."
- src: /security-in-depth.svg
- alt: "Security in-depth key icon"
- - title: "Simpler for end-users"
- text: "No more clunky VPNs. Both remote and on-premise users can just use their browser to access the resources they need."
- src: /remote.svg
- alt: "Simpler for end-users business traveler remote worker"
- - title: "Easier to implement"
- text: "Pomerium is quicker to configure, and is easier to manage than network segmentation policies needed for a VPN."
- src: /easier-to-manage.svg
- alt: "Sysadmin managing remote connection"
-
-features:
- - src: /account.svg
- title: Access driven by identity and context.
- text: Use your existing identity provider, such as Okta, Active Directory, Google, Gsuite, or OneLogin to add single-sign-on authentication to any application with Pomerium.
-
- - src: /pomerium-diagram.svg
- title: Add access control to any app.
- text: Pomerium provides a standardized interface to add access control whether an application itself has authorization or authentication baked-in. Let developers focus on their apps, not reinventing access control.
-
- - src: /secure-server.svg
- title: Your apps. Your data. Deployed anywhere.
- text: BeyondCorp-style access shouldn't come at the cost of cloud vendor lock-in or control over data tenancy. Pomerium supports a wide array of deployment options. Whether you are on-prem, hybrid, or multi-cloud, we’ve got you covered.
----
+
+
diff --git a/package.json b/package.json
index fc22e8da4..e08689e8c 100644
--- a/package.json
+++ b/package.json
@@ -1,10 +1,8 @@
{
"devDependencies": {
- "@vuepress/plugin-blog": "1.9.2",
"@vuepress/plugin-google-analytics": "1.5.2",
- "vuepress": "1.5.2",
- "vuepress-plugin-check-md": "^0.0.2",
- "vuepress-plugin-mailchimp": "1.4.2",
+ "vuepress": "1.5.3",
+ "vuepress-plugin-check-md": "0.0.2",
"vuepress-plugin-sitemap": "2.3.1"
},
"scripts": {