From 4e34d3138ec949d5f736ef3428ff145f71715212 Mon Sep 17 00:00:00 2001 From: Muhammad A <56032207+muali14@users.noreply.github.com> Date: Fri, 12 May 2023 18:59:46 -0400 Subject: [PATCH] 121 new reana patch (#122) * updated subchart config * updated subchart config --- charts/reana/Chart.yaml | 2 +- charts/reana/charts/traefik/values.yaml | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/charts/reana/Chart.yaml b/charts/reana/Chart.yaml index f90ec9f..f7ace2e 100644 --- a/charts/reana/Chart.yaml +++ b/charts/reana/Chart.yaml @@ -34,5 +34,5 @@ sources: - https://github.com/reanahub/pytest-reana - https://github.com/reanahub/www.reana.io type: application -version: 0.9.2 +version: 0.9.3 appVersion: 0.9.1 diff --git a/charts/reana/charts/traefik/values.yaml b/charts/reana/charts/traefik/values.yaml index f54f5fe..5700d82 100644 --- a/charts/reana/charts/traefik/values.yaml +++ b/charts/reana/charts/traefik/values.yaml @@ -390,11 +390,11 @@ hostNetwork: false # Whether Role Based Access Control objects like roles and rolebindings should be created rbac: - enabled: true + enabled: false # If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces. # If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace - namespaced: false + namespaced: true # Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding podSecurityPolicy: