diff --git a/docs/concepts/blueprint/README.md b/docs/concepts/blueprint/README.md index 0f69aa71a..ce34de8ef 100644 --- a/docs/concepts/blueprint/README.md +++ b/docs/concepts/blueprint/README.md @@ -1,5 +1,10 @@ # Blueprint +{% if is_saas() %} +!!! Info + This feature is only available on the Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + There are multiple ways to create [stacks](../stack/README.md) in Spacelift. Our recommended way is to use [our Terraform provider](../../vendors/terraform/terraform-provider.md) and programmatically create stacks using an [administrative](../stack/stack-settings.md#administrative) stack. However, some users might not be comfortable using Terraform code to create stacks, this is where Blueprints come in handy. diff --git a/docs/concepts/policy/README.md b/docs/concepts/policy/README.md index 13e105917..e089dd684 100644 --- a/docs/concepts/policy/README.md +++ b/docs/concepts/policy/README.md @@ -1,5 +1,10 @@ # Policy +{% if is_saas() %} +!!! Info + This feature is only available to paid Spacelift accounts. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + ## Introduction !!! info diff --git a/docs/concepts/policy/push-policy/README.md b/docs/concepts/policy/push-policy/README.md index 2df3c575d..b19aadc9f 100644 --- a/docs/concepts/policy/push-policy/README.md +++ b/docs/concepts/policy/push-policy/README.md @@ -2,8 +2,10 @@ ## Purpose -!!! info - Push policies are only evaluated for the [Cloud or Enterprise plan](https://spacelift.io/pricing){: rel="nofollow"}. +{% if is_saas() %} +!!! hint + This feature is only available to paid Spacelift accounts. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% else %} !!! info Please note, we currently don't support importing rego.v1 diff --git a/docs/concepts/run/task.md b/docs/concepts/run/task.md index 407957f9d..dc44b2654 100644 --- a/docs/concepts/run/task.md +++ b/docs/concepts/run/task.md @@ -1,5 +1,10 @@ # Task +{% if is_saas() %} +!!! Info + This feature is only available to paid Spacelift accounts. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + ![](../../assets/screenshots/run/tasks-list.png) While tasks enjoy the privilege of having their own GUI screen, they're just another type of [run](./README.md). The core difference is that after the common [initialization](./README.md#initializing) phase, a **task will run your custom command** instead of a string of preordained vendor-specific commands. diff --git a/docs/concepts/run/tracked.md b/docs/concepts/run/tracked.md index ec64e99b7..a61e5310d 100644 --- a/docs/concepts/run/tracked.md +++ b/docs/concepts/run/tracked.md @@ -73,6 +73,11 @@ If the user approves (confirms) the plan, the run transitions to the temporary [ ### Targeted replan +{% if is_saas() %} +!!! Info + This feature is only available to Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + When a run is in the [Unconfirmed](tracked.md#unconfirmed) state it's also possible to replan it. When replanning, a user is able to generate a new plan to apply by only picking specific changes from the current plan. This is working similarly to how passing the `-target` option to a terraform plan command does, without giving you the headache of writing the name of each resource you want to add to your targeted run. To get to the replan screen after the run reaches the unconfirmed state, click on the Changes button in the left corner, select the resources you would like to have a targeted plan for, and then, the replan option will pop out, similar to the screenshot below. diff --git a/docs/concepts/stack/drift-detection.md b/docs/concepts/stack/drift-detection.md index 477f9c773..899a2f6b8 100644 --- a/docs/concepts/stack/drift-detection.md +++ b/docs/concepts/stack/drift-detection.md @@ -1,7 +1,9 @@ # Drift detection -!!! info - Note that drift detection only works on private workers, which is an Enterprise plan feature. +{% if is_saas() %} +!!! Info + This feature is only available on the Starter+ plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} ## Drift happens diff --git a/docs/concepts/stack/scheduling.md b/docs/concepts/stack/scheduling.md index 1975cb095..b32db1956 100644 --- a/docs/concepts/stack/scheduling.md +++ b/docs/concepts/stack/scheduling.md @@ -2,8 +2,10 @@ ## What is scheduling? -!!! info - Note that scheduling only works on private workers, which is an Enterprise plan feature. +{% if is_saas() %} +!!! Info + This feature is only available on the Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} Scheduling allows you to trigger a stack deletion or task at a specific time or periodically based on the cron rules defined. diff --git a/docs/concepts/vcs-agent-pools.md b/docs/concepts/vcs-agent-pools.md index 286d58254..f6de1241a 100644 --- a/docs/concepts/vcs-agent-pools.md +++ b/docs/concepts/vcs-agent-pools.md @@ -4,8 +4,10 @@ description: This article explains how you can set up and use on-premise VCS Age # VCS Agent Pools -!!! info - Note that private self-hosted VCS integration is an Enterprise plan feature. +{% if is_saas() %} +!!! Info + This feature is only available to Enterprise plan. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} By default, Spacelift communicates with your VCS provider directly. This is usually sufficient, but some users may have special requirements regarding infrastructure, security or compliance, and need to host their VCS system in a way that's only accessible internally, where Spacelift can't reach it. This is where VCS Agent Pools come into play. diff --git a/docs/concepts/worker-pools/README.md b/docs/concepts/worker-pools/README.md index bf86a07fe..6dddf2720 100644 --- a/docs/concepts/worker-pools/README.md +++ b/docs/concepts/worker-pools/README.md @@ -6,8 +6,8 @@ description: >- # Worker Pools {% if is_saas() %} -!!! info - Note that private workers are an Enterprise plan feature. +!!! Info + This feature is only available on the Starter+ plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. By default, Spacelift uses a managed worker pool hosted and operated by us. This is very convenient, but often you may have special requirements regarding infrastructure, security or compliance, which aren't served by the public worker pool. This is why Spacelift also supports private worker pools, which you can use to host the workers which execute Spacelift workflows on your end. diff --git a/docs/integrations/api.md b/docs/integrations/api.md index 569b683b0..bd234f4fa 100644 --- a/docs/integrations/api.md +++ b/docs/integrations/api.md @@ -168,6 +168,11 @@ Once you obtain the token, you can use it to authenticate your requests to the S #### OIDC-based API keys +{% if is_saas() %} +!!! Info + This feature is only available to Enterprise plan. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + OIDC-based API keys are a more secure alternative to secret-based API keys. They're based on the OpenID Connect protocol and are more secure because they don't involve static credentials. They're also more flexible because they can be used to authenticate with Spacelift using any OIDC identity provider. The creation of OIDC-based API keys is similar to the creation of secret-based API keys but once you choose "OIDC" as the key type, there are a few more settings. Thread carefully, as the settings are more complex and require a good understanding of OIDC and the identity provider you're using:

diff --git a/docs/integrations/audit-trail.md b/docs/integrations/audit-trail.md index b81e4705e..43146c9aa 100644 --- a/docs/integrations/audit-trail.md +++ b/docs/integrations/audit-trail.md @@ -1,7 +1,9 @@ # Audit trail -!!! info - Note that Audit Trail is an Enterprise plan feature. +{% if is_saas() %} +!!! Info + This feature is only available to Enterprise plan. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} Spacelift optionally supports auditing all operations that change Spacelift resources. This is handled by asynchronously sending webhooks to a user-supplied endpoint. diff --git a/docs/integrations/single-sign-on/README.md b/docs/integrations/single-sign-on/README.md index b96731b2e..4aee3915e 100644 --- a/docs/integrations/single-sign-on/README.md +++ b/docs/integrations/single-sign-on/README.md @@ -34,6 +34,11 @@ In order to manage Single Sign-On integrations on your Spacelift account, please ## Setting up SAML +{% if is_saas() %} +!!! Info + This feature is only available to Enterprise plan. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + When setting up Spacelift on your identity provider, you may want to add three attribute mappings: - `FirstName` is used to build human-friendly user name; @@ -70,6 +75,11 @@ If you can't find your SAML provider in the list above, don't worry - we do supp ## Setting up OIDC +{% if is_saas() %} +!!! Info + This feature is only available to paid Spacelift accounts. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + When setting up Spacelift on your identity provider, you must make sure it supports the `email` scope and returns the corresponding `email` ### Additional claims diff --git a/docs/integrations/source-control/azure-devops.md b/docs/integrations/source-control/azure-devops.md index 2bc297c00..ff72289f6 100644 --- a/docs/integrations/source-control/azure-devops.md +++ b/docs/integrations/source-control/azure-devops.md @@ -123,6 +123,11 @@ You can use commit statuses to protect your branches tracked by Spacelift stacks #### Aggregated checks +{% if is_saas() %} +!!! info + This feature is only available to Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + If you have multiple stacks tracking the same repository, you can enable the _Aggregate VCS checks_ feature in the integration's settings. This will group all the checks from the same commit into a predefined set of checks, making it easier to see the overall status of the commit. diff --git a/docs/integrations/source-control/bitbucket-cloud.md b/docs/integrations/source-control/bitbucket-cloud.md index 50c564375..0e0eac53e 100644 --- a/docs/integrations/source-control/bitbucket-cloud.md +++ b/docs/integrations/source-control/bitbucket-cloud.md @@ -91,6 +91,11 @@ You can use commit statuses to protect your branches tracked by Spacelift stacks ### Aggregated checks +{% if is_saas() %} +!!! info + This feature is only available to Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + If you have multiple stacks tracking the same repository, you can enable the _Aggregate VCS checks_ feature in the integration's settings. This will group all the checks from the same commit into a predefined set of checks, making it easier to see the overall status of the commit. diff --git a/docs/integrations/source-control/bitbucket-datacenter-server.md b/docs/integrations/source-control/bitbucket-datacenter-server.md index a9be129b1..4b15c2712 100644 --- a/docs/integrations/source-control/bitbucket-datacenter-server.md +++ b/docs/integrations/source-control/bitbucket-datacenter-server.md @@ -93,6 +93,11 @@ You can use commit statuses to protect your branches tracked by Spacelift stacks #### Aggregated checks +{% if is_saas() %} +!!! info + This feature is only available to Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + If you have multiple stacks tracking the same repository, you can enable the _Aggregate VCS checks_ feature in the integration's settings. This will group all the checks from the same commit into a predefined set of checks, making it easier to see the overall status of the commit. diff --git a/docs/integrations/source-control/github.md b/docs/integrations/source-control/github.md index 4825e3a33..6243e1240 100644 --- a/docs/integrations/source-control/github.md +++ b/docs/integrations/source-control/github.md @@ -192,6 +192,11 @@ The rest of the process is exactly the same as with [creating a GitHub-backed st ### Space-level integrations +{% if is_saas() %} +!!! hint + This feature is only available to Enterprise plan. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + If you're using Space-level integrations, you can use the [Spaces](../../concepts/spaces/README.md) to control the access of your GitHub integrations. For example, if you have a Space called `Rideshare`, you can create a GitHub integration in that Space, and that can only be attached to those stacks and modules that are in the same Space (or [inherit](../../concepts/spaces/access-control.md#inheritance) permissions through a parent Space). #### Integration details visibility @@ -268,6 +273,11 @@ This is an important part of our proposed workflow - please refer to [this secti ##### Aggregated checks +{% if is_saas() %} +!!! info + This feature is only available to Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + If you have multiple stacks tracking the same repository, you can enable the _Aggregate VCS checks_ feature in the integration's settings. This will group all the checks from the same commit into a predefined set of checks, making it easier to see the overall status of the commit. diff --git a/docs/integrations/source-control/gitlab.md b/docs/integrations/source-control/gitlab.md index a6f26d12f..d824b48af 100644 --- a/docs/integrations/source-control/gitlab.md +++ b/docs/integrations/source-control/gitlab.md @@ -112,6 +112,11 @@ You can use commit statuses to protect your branches tracked by Spacelift stacks #### Aggregated checks +{% if is_saas() %} +!!! info + This feature is only available to Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + If you have multiple stacks tracking the same repository, you can enable the _Aggregate VCS checks_ feature in the integration's settings. This will group all the checks from the same commit into a predefined set of checks, making it easier to see the overall status of the commit. diff --git a/docs/integrations/webhooks.md b/docs/integrations/webhooks.md index 6b5a78c52..75392b9c7 100644 --- a/docs/integrations/webhooks.md +++ b/docs/integrations/webhooks.md @@ -4,6 +4,11 @@ description: Receiving Spacelift notifications using webhooks # Webhooks +{% if is_saas() %} +!!! Info + This feature is only available to paid Spacelift accounts. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + Spacelift can be configured to send webhook notifications for various events to an HTTP endpoint of your choice. ## Setting up webhooks diff --git a/docs/product/notifications.md b/docs/product/notifications.md index c284b3118..9c2990497 100644 --- a/docs/product/notifications.md +++ b/docs/product/notifications.md @@ -1,5 +1,10 @@ # Notifications +{% if is_saas() %} +!!! hint + This feature is only available to paid Spacelift accounts. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + As nicely stated by [Murphy's law](https://en.wikipedia.org/wiki/Murphy%27s_law){: rel="nofollow"}: "Anything that can go wrong will go wrong.". Some issues will blow in your face and be obvious, and others will be sneakier. In the background, Spacelift interacts with different systems (VCS providers, cloud providers, Slack, etc.), which can fail in various ways. The Notification Inbox section gives you visibility into issues arising from those interactions. diff --git a/docs/product/security/mfa.md b/docs/product/security/mfa.md index 09aa95d9a..909354a32 100644 --- a/docs/product/security/mfa.md +++ b/docs/product/security/mfa.md @@ -1,7 +1,9 @@ # Multi-Factor Authentication (MFA) -!!! info - Note that Multi-Factor Authentication is an Enterprise plan feature and is available only when SSO is enabled. +{% if is_saas() %} +!!! Info + This feature is only available to Enterprise plan. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. It is available only when SSO is enabled. +{% endif %} With the introduction of IdP independent Multi-Factor Authentication (MFA), we extend our security capabilities to provide a robust and flexible authentication system. MFA at Spacelift is designed to protect your account and sensitive resources by requiring a second form of verification, adding a critical layer of security against unauthorized access. diff --git a/docs/vendors/terraform/module-registry.md b/docs/vendors/terraform/module-registry.md index 2d1fb68bd..6767e2748 100644 --- a/docs/vendors/terraform/module-registry.md +++ b/docs/vendors/terraform/module-registry.md @@ -4,6 +4,11 @@ description: This article shows how Spacelift can help you manage Terraform Modu # Module registry +{% if is_saas() %} +!!! Info + This feature is only available to paid Spacelift accounts. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} + ## Intro In Terraform, [modules](https://www.terraform.io/docs/configuration/modules.html){: rel="nofollow"} help you abstract away common functionality in your infrastructure. diff --git a/docs/vendors/terraform/provider-registry.md b/docs/vendors/terraform/provider-registry.md index 9733a73db..265e4d56e 100644 --- a/docs/vendors/terraform/provider-registry.md +++ b/docs/vendors/terraform/provider-registry.md @@ -4,8 +4,10 @@ description: This article shows how Spacelift can help you manage Terraform prov # Provider registry -!!! warning - This feature is currently in open public beta and is free to use regardless of your pricing plan. Once GA, it will be available as part of our [Enterprise plan](https://spacelift.io/pricing){: rel="nofollow"}. +{% if is_saas() %} +!!! info + This feature is only available to Business plan and above. Please check out our [pricing page](https://spacelift.io/pricing){: rel="nofollow"} for more information. +{% endif %} ## Intro