From 31810a97e167001dec997e417c6a1fa1200b6f8a Mon Sep 17 00:00:00 2001
From: Rajat Goyal <404rajat@gmail.com>
Date: Sun, 22 Nov 2020 20:14:02 +0530
Subject: [PATCH] Remove duplicate docs from the repo and change all links to
point to the Hugo site
---
CONTRIBUTING.md | 2 +-
README.md | 4 +-
deploy/local-user-authenticator/README.md | 2 +-
doc/architecture.md | 75 --------
doc/demo.md | 198 ----------------------
doc/scope.md | 32 ----
site/themes/pinniped/layouts/index.html | 2 +-
7 files changed, 5 insertions(+), 310 deletions(-)
delete mode 100644 doc/architecture.md
delete mode 100644 doc/demo.md
delete mode 100644 doc/scope.md
diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md
index 1868a9ce..5cf94085 100644
--- a/CONTRIBUTING.md
+++ b/CONTRIBUTING.md
@@ -8,7 +8,7 @@ Please see the [Code of Conduct](./CODE_OF_CONDUCT.md).
## Project Scope
-Learn about the [scope](doc/scope.md) of the project.
+Learn about the [scope](https://pinniped.dev/docs/scope/) of the project.
## Meeting with the Maintainers
diff --git a/README.md b/README.md
index 727a3f3c..0b7e0a7f 100644
--- a/README.md
+++ b/README.md
@@ -28,13 +28,13 @@ credential for a short-lived, cluster-specific credential. Pinniped supports var
IDP types and implements different integration strategies for various Kubernetes
distributions to make authentication possible.
-To learn more, see [doc/architecture.md](doc/architecture.md).
+To learn more, see [architecture](https://pinniped.dev/docs/architecture/).
## Trying Pinniped
-Care to kick the tires? It's easy to [install and try Pinniped](doc/demo.md).
+Care to kick the tires? It's easy to [install and try Pinniped](https://pinniped.dev/docs/demo/).
## Discussion
diff --git a/deploy/local-user-authenticator/README.md b/deploy/local-user-authenticator/README.md
index 44334af9..1b30119d 100644
--- a/deploy/local-user-authenticator/README.md
+++ b/deploy/local-user-authenticator/README.md
@@ -79,7 +79,7 @@ kubectl get secret local-user-authenticator-tls-serving-certificate --namespace
When installing Pinniped on the same cluster, configure local-user-authenticator as an Identity Provider for Pinniped
using the webhook URL `https://local-user-authenticator.local-user-authenticator.svc/authenticate`
-along with the CA bundle fetched by the above command. See [doc/demo.md](../../doc/demo.md) for an example.
+along with the CA bundle fetched by the above command. See [demo](https://pinniped.dev/docs/demo/) for an example.
## Optional: Manually Testing the Webhook Endpoint After Installing
diff --git a/doc/architecture.md b/doc/architecture.md
deleted file mode 100644
index d7b7dc0d..00000000
--- a/doc/architecture.md
+++ /dev/null
@@ -1,75 +0,0 @@
-# Architecture
-
-The principal purpose of Pinniped is to allow users to access Kubernetes
-clusters. Pinniped hopes to enable this access across a wide range of Kubernetes
-environments with zero configuration.
-
-This integration is implemented using a credential exchange API which takes as
-input a credential from the external IDP and returns a credential which is understood by the host
-Kubernetes cluster.
-
-
-
-Pinniped supports various IDP types and implements different integration strategies
-for various Kubernetes distributions to make authentication possible.
-
-## Supported Kubernetes Cluster Types
-
-Pinniped supports the following types of Kubernetes clusters:
-
-- Clusters where the Kube Controller Manager pod is accessible from Pinniped's pods.
-
-Support for other types of Kubernetes distributions is coming soon.
-
-## External Identity Provider Integrations
-
-Pinniped will consume identity from one or more external identity providers
-(IDPs). Administrators will configure external IDPs via Kubernetes custom
-resources allowing Pinniped to be managed using GitOps and standard Kubernetes tools.
-
-Pinniped supports the following external IDP types.
-
-1. Any webhook which implements the
- [Kubernetes TokenReview API](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#webhook-token-authentication).
-
- In addition to allowing the integration of any existing IDP which implements this API, webhooks also
- serve as an extension point for Pinniped by allowing for integration of arbitrary custom authenticators.
- While a custom implementation may be in any language or framework, this project provides a
- sample implementation in Golang. See the `ServeHTTP` method of
- [cmd/local-user-authenticator/main.go](../cmd/local-user-authenticator/main.go).
-
-More IDP types are coming soon.
-
-## Cluster Integration Strategies
-
-Pinniped will issue a cluster credential by leveraging cluster-specific
-functionality. In the near term, cluster integrations will happen via different
-cluster-specific flows depending on the type of cluster. In the longer term,
-Pinniped hopes to contribute and leverage upstream Kubernetes extension points that
-cleanly enable this integration.
-
-Pinniped supports the following cluster integration strategies.
-
-1. Pinniped hosts a credential exchange API endpoint via a Kubernetes aggregated API server.
-This API returns a new cluster-specific credential using the cluster's signing keypair to
-issue short-lived cluster certificates. (In the future, when the Kubernetes CSR API
-provides a way to issue short-lived certificates, then the Pinniped credential exchange API
-will use that instead of using the cluster's signing keypair.)
-
-More cluster integration strategies are coming soon, which will allow Pinniped to
-support more Kubernetes cluster types.
-
-## `kubectl` Integration
-
-With any of the above IDPs and integration strategies, `kubectl` commands receive the
-cluster-specific credential via a
-[Kubernetes client-go credential plugin](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins).
-Users may use the Pinniped CLI as the credential plugin, or they may use any proprietary CLI
-built with the [Pinniped Go client library](../generated).
-
-## Example Cluster Authentication Sequence Diagram
-
-This diagram demonstrates using `kubectl get pods` with the Pinniped CLI configured as the credential plugin,
-and with a webhook IDP configured as the identity provider for the Pinniped server.
-
-
diff --git a/doc/demo.md b/doc/demo.md
deleted file mode 100644
index 3032bb3a..00000000
--- a/doc/demo.md
+++ /dev/null
@@ -1,198 +0,0 @@
-# Trying Pinniped
-
-## Prerequisites
-
-1. A Kubernetes cluster of a type supported by Pinniped as described in [doc/architecture.md](../doc/architecture.md).
-
- Don't have a cluster handy? Consider using [kind](https://kind.sigs.k8s.io/) on your local machine.
- See below for an example of using kind.
-
-1. An identity provider of a type supported by Pinniped as described in [doc/architecture.md](../doc/architecture.md).
-
- Don't have an identity provider of a type supported by Pinniped handy? No problem, there is a demo identity provider
- available. Start by installing local-user-authenticator on the same cluster where you would like to try Pinniped
- by following the directions in [deploy/local-user-authenticator/README.md](../deploy/local-user-authenticator/README.md).
- See below for an example of deploying this on kind.
-
-1. A kubeconfig where the current context points to the cluster and has admin-like
- privileges on that cluster.
-
-## Overview
-
-Installing and trying Pinniped on any cluster will consist of the following general steps. See the next section below
-for a more specific example of installing onto a local kind cluster, including the exact commands to use for that case.
-
-1. Install Pinniped. See [deploy/concierge/README.md](../deploy/concierge/README.md).
-1. Download the Pinniped CLI from [Pinniped's github Releases page](https://github.com/vmware-tanzu/pinniped/releases/latest).
-1. Generate a kubeconfig using the Pinniped CLI. Run `pinniped get-kubeconfig --help` for more information.
-1. Run `kubectl` commands using the generated kubeconfig. Pinniped will automatically be used for authentication during those commands.
-
-## Example of Deploying on kind
-
-[kind](https://kind.sigs.k8s.io) is a tool for creating and managing Kubernetes clusters on your local machine
-which uses Docker containers as the cluster's "nodes". This is a convenient way to try out Pinniped on a local
-non-production cluster.
-
-The following steps will deploy the latest release of Pinniped on kind using the local-user-authenticator component
-as the identity provider.
-
-
-
-
-
Introduction to Pinniped
-Learn how Pinniped provides identity services to Kubernetes
+Learn how Pinniped provides identity services to Kubernetes
How do you use Pinniped?