feat(trino): username/password auth for metabase integration
This commit is contained in:
193
trino/justfile
193
trino/justfile
@@ -5,6 +5,7 @@ export TRINO_CHART_VERSION := env("TRINO_CHART_VERSION", "1.41.0")
|
|||||||
export TRINO_IMAGE_TAG := env("TRINO_IMAGE_TAG", "477")
|
export TRINO_IMAGE_TAG := env("TRINO_IMAGE_TAG", "477")
|
||||||
export TRINO_HOST := env("TRINO_HOST", "")
|
export TRINO_HOST := env("TRINO_HOST", "")
|
||||||
export EXTERNAL_SECRETS_NAMESPACE := env("EXTERNAL_SECRETS_NAMESPACE", "external-secrets")
|
export EXTERNAL_SECRETS_NAMESPACE := env("EXTERNAL_SECRETS_NAMESPACE", "external-secrets")
|
||||||
|
export KEYCLOAK_HOST := env("KEYCLOAK_HOST", "")
|
||||||
export KEYCLOAK_REALM := env("KEYCLOAK_REALM", "buunstack")
|
export KEYCLOAK_REALM := env("KEYCLOAK_REALM", "buunstack")
|
||||||
export TRINO_COORDINATOR_MEMORY := env("TRINO_COORDINATOR_MEMORY", "4Gi")
|
export TRINO_COORDINATOR_MEMORY := env("TRINO_COORDINATOR_MEMORY", "4Gi")
|
||||||
export TRINO_COORDINATOR_CPU := env("TRINO_COORDINATOR_CPU", "2")
|
export TRINO_COORDINATOR_CPU := env("TRINO_COORDINATOR_CPU", "2")
|
||||||
@@ -13,6 +14,8 @@ export TRINO_WORKER_MEMORY := env("TRINO_WORKER_MEMORY", "4Gi")
|
|||||||
export TRINO_WORKER_CPU := env("TRINO_WORKER_CPU", "2")
|
export TRINO_WORKER_CPU := env("TRINO_WORKER_CPU", "2")
|
||||||
export TRINO_WORKER_JVM_HEAP := env("TRINO_WORKER_JVM_HEAP", "4G")
|
export TRINO_WORKER_JVM_HEAP := env("TRINO_WORKER_JVM_HEAP", "4G")
|
||||||
export TRINO_WORKER_COUNT := env("TRINO_WORKER_COUNT", "2")
|
export TRINO_WORKER_COUNT := env("TRINO_WORKER_COUNT", "2")
|
||||||
|
export TRINO_POSTGRES_ENABLED := env("TRINO_POSTGRES_ENABLED", "true")
|
||||||
|
export TRINO_MINIO_ENABLED := env("TRINO_MINIO_ENABLED", "")
|
||||||
export POSTGRES_NAMESPACE := env("POSTGRES_NAMESPACE", "postgres")
|
export POSTGRES_NAMESPACE := env("POSTGRES_NAMESPACE", "postgres")
|
||||||
export MINIO_NAMESPACE := env("MINIO_NAMESPACE", "minio")
|
export MINIO_NAMESPACE := env("MINIO_NAMESPACE", "minio")
|
||||||
|
|
||||||
@@ -85,45 +88,42 @@ delete-oauth-secret:
|
|||||||
@kubectl delete secret trino-oauth-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
@kubectl delete secret trino-oauth-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
||||||
@kubectl delete externalsecret trino-oauth-external-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
@kubectl delete externalsecret trino-oauth-external-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
||||||
|
|
||||||
# Create self-signed certificate for HTTPS
|
# Create password file for basic authentication
|
||||||
create-self-signed-cert:
|
create-password-secret:
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
echo "Creating self-signed certificate for Trino..."
|
echo "Creating password secret for Trino..."
|
||||||
|
|
||||||
CERT_PASSWORD=$(just utils::random-password)
|
admin_password=$(just utils::random-password)
|
||||||
TRINO_HOST=${TRINO_HOST:-trino.local}
|
|
||||||
|
|
||||||
# Create temporary directory
|
temp_dir=$(mktemp -d)
|
||||||
TEMP_DIR=$(mktemp -d)
|
trap "rm -rf ${temp_dir}" EXIT
|
||||||
trap "rm -rf ${TEMP_DIR}" EXIT
|
|
||||||
|
|
||||||
# Generate JKS keystore with self-signed certificate
|
# Generate bcrypt password using htpasswd
|
||||||
keytool -genkeypair \
|
# -B for bcrypt, -C 10 for cost factor 10
|
||||||
-alias trino \
|
htpasswd -B -C 10 -b -c ${temp_dir}/password.db admin "${admin_password}"
|
||||||
-keyalg RSA \
|
|
||||||
-keysize 2048 \
|
|
||||||
-validity 3650 \
|
|
||||||
-keystore ${TEMP_DIR}/keystore.jks \
|
|
||||||
-storepass "${CERT_PASSWORD}" \
|
|
||||||
-keypass "${CERT_PASSWORD}" \
|
|
||||||
-dname "CN=${TRINO_HOST}, OU=Trino, O=BuunStack, L=Local, ST=Local, C=US" \
|
|
||||||
-ext SAN=dns:${TRINO_HOST},dns:trino-coordinator,dns:trino-coordinator.${TRINO_NAMESPACE}.svc.cluster.local
|
|
||||||
|
|
||||||
echo "Certificate created successfully"
|
# Store password in Vault if available
|
||||||
|
if helm status external-secrets -n ${EXTERNAL_SECRETS_NAMESPACE} &>/dev/null; then
|
||||||
|
echo "Storing password in Vault"
|
||||||
|
just vault::put trino/password admin_password="${admin_password}"
|
||||||
|
fi
|
||||||
|
|
||||||
# Create Kubernetes secret
|
# Create Kubernetes secret
|
||||||
kubectl delete secret trino-tls-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
kubectl delete secret trino-password-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
||||||
kubectl create secret generic trino-tls-secret -n ${TRINO_NAMESPACE} \
|
kubectl create secret generic trino-password-secret -n ${TRINO_NAMESPACE} \
|
||||||
--from-file=keystore.jks=${TEMP_DIR}/keystore.jks \
|
--from-file=password.db=${temp_dir}/password.db
|
||||||
--from-literal=keystore-password="${CERT_PASSWORD}"
|
|
||||||
|
|
||||||
echo "TLS secret created in Kubernetes"
|
echo "Password secret created successfully"
|
||||||
echo "Certificate password stored in secret 'trino-tls-secret'"
|
echo "Username: admin"
|
||||||
|
echo "Password: ${admin_password}"
|
||||||
|
echo ""
|
||||||
|
echo "Please save this password. You can also retrieve it from Vault with:"
|
||||||
|
echo " just vault::get trino/password admin_password"
|
||||||
|
|
||||||
# Delete TLS secret
|
# Delete password secret
|
||||||
delete-tls-secret:
|
delete-password-secret:
|
||||||
@kubectl delete secret trino-tls-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
@kubectl delete secret trino-password-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
||||||
|
|
||||||
# Setup PostgreSQL catalog for Trino
|
# Setup PostgreSQL catalog for Trino
|
||||||
setup-postgres-catalog:
|
setup-postgres-catalog:
|
||||||
@@ -141,41 +141,42 @@ setup-postgres-catalog:
|
|||||||
if just postgres::user-exists trino &>/dev/null; then
|
if just postgres::user-exists trino &>/dev/null; then
|
||||||
echo "User 'trino' already exists."
|
echo "User 'trino' already exists."
|
||||||
if helm status external-secrets -n ${EXTERNAL_SECRETS_NAMESPACE} &>/dev/null; then
|
if helm status external-secrets -n ${EXTERNAL_SECRETS_NAMESPACE} &>/dev/null; then
|
||||||
if DB_PASSWORD=$(just vault::get trino/postgres password 2>/dev/null); then
|
if db_password=$(just vault::get trino/postgres password 2>/dev/null); then
|
||||||
echo "Using existing password from Vault."
|
echo "Using existing password from Vault."
|
||||||
else
|
else
|
||||||
echo "Generating new password and updating Vault..."
|
echo "Generating new password and updating Vault..."
|
||||||
DB_PASSWORD=$(just utils::random-password)
|
db_password=$(just utils::random-password)
|
||||||
just postgres::psql -c "ALTER USER trino WITH PASSWORD '$DB_PASSWORD';"
|
just postgres::psql -c "ALTER USER trino WITH PASSWORD '${db_password}';"
|
||||||
fi
|
fi
|
||||||
else
|
else
|
||||||
echo "Generating new password for existing user..."
|
echo "Generating new password for existing user..."
|
||||||
DB_PASSWORD=$(just utils::random-password)
|
db_password=$(just utils::random-password)
|
||||||
just postgres::psql -c "ALTER USER trino WITH PASSWORD '$DB_PASSWORD';"
|
just postgres::psql -c "ALTER USER trino WITH PASSWORD '${db_password}';"
|
||||||
fi
|
fi
|
||||||
else
|
else
|
||||||
echo "Creating new user 'trino'..."
|
echo "Creating new user 'trino'..."
|
||||||
DB_PASSWORD=$(just utils::random-password)
|
db_password=$(just utils::random-password)
|
||||||
just postgres::create-user trino "$DB_PASSWORD"
|
just postgres::create-user trino "${db_password}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "Ensuring database permissions..."
|
echo "Ensuring database permissions..."
|
||||||
just postgres::grant trino trino
|
just postgres::grant trino trino
|
||||||
|
|
||||||
if helm status external-secrets -n ${EXTERNAL_SECRETS_NAMESPACE} &>/dev/null; then
|
if helm status external-secrets -n ${EXTERNAL_SECRETS_NAMESPACE} &>/dev/null; then
|
||||||
echo "External Secrets available. Storing credentials in Vault and creating ExternalSecret..."
|
echo "External Secrets available. Storing credentials in Vault"
|
||||||
just vault::put trino/postgres username=trino password="$DB_PASSWORD"
|
just vault::put trino/postgres username=trino password="${db_password}"
|
||||||
gomplate -f trino-postgres-external-secret.gomplate.yaml -o trino-postgres-external-secret.yaml
|
gomplate -f trino-postgres-external-secret.gomplate.yaml \
|
||||||
|
-o trino-postgres-external-secret.yaml
|
||||||
kubectl apply -f trino-postgres-external-secret.yaml
|
kubectl apply -f trino-postgres-external-secret.yaml
|
||||||
echo "Waiting for PostgreSQL secret to be ready..."
|
echo "Waiting for PostgreSQL secret to be ready..."
|
||||||
kubectl wait --for=condition=Ready externalsecret/trino-postgres-external-secret \
|
kubectl wait --for=condition=Ready externalsecret/trino-postgres-external-secret \
|
||||||
-n ${TRINO_NAMESPACE} --timeout=60s
|
-n ${TRINO_NAMESPACE} --timeout=60s
|
||||||
else
|
else
|
||||||
echo "External Secrets not available. Creating Kubernetes Secret directly..."
|
echo "External Secrets not available. Creating Kubernetes Secret directly"
|
||||||
kubectl delete secret trino-postgres-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
kubectl delete secret trino-postgres-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
||||||
kubectl create secret generic trino-postgres-secret -n ${TRINO_NAMESPACE} \
|
kubectl create secret generic trino-postgres-secret -n ${TRINO_NAMESPACE} \
|
||||||
--from-literal=username=trino \
|
--from-literal=username=trino \
|
||||||
--from-literal=password="$DB_PASSWORD"
|
--from-literal=password="${db_password}"
|
||||||
echo "PostgreSQL secret created directly in Kubernetes"
|
echo "PostgreSQL secret created directly in Kubernetes"
|
||||||
fi
|
fi
|
||||||
echo "PostgreSQL catalog setup completed"
|
echo "PostgreSQL catalog setup completed"
|
||||||
@@ -183,7 +184,8 @@ setup-postgres-catalog:
|
|||||||
# Delete PostgreSQL secret
|
# Delete PostgreSQL secret
|
||||||
delete-postgres-secret:
|
delete-postgres-secret:
|
||||||
@kubectl delete secret trino-postgres-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
@kubectl delete secret trino-postgres-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
||||||
@kubectl delete externalsecret trino-postgres-external-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
@kubectl delete externalsecret trino-postgres-external-secret -n ${TRINO_NAMESPACE} \
|
||||||
|
--ignore-not-found
|
||||||
|
|
||||||
# Setup MinIO storage for Trino (optional)
|
# Setup MinIO storage for Trino (optional)
|
||||||
setup-minio-storage:
|
setup-minio-storage:
|
||||||
@@ -225,13 +227,13 @@ setup-minio-storage:
|
|||||||
# Delete MinIO secret
|
# Delete MinIO secret
|
||||||
delete-minio-secret:
|
delete-minio-secret:
|
||||||
@kubectl delete secret trino-minio-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
@kubectl delete secret trino-minio-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
||||||
@kubectl delete externalsecret trino-minio-external-secret -n ${TRINO_NAMESPACE} --ignore-not-found
|
@kubectl delete externalsecret trino-minio-external-secret -n ${TRINO_NAMESPACE} \
|
||||||
|
--ignore-not-found
|
||||||
|
|
||||||
# Install Trino
|
# Install Trino
|
||||||
install:
|
install:
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
export TRINO_HOST=${TRINO_HOST:-}
|
|
||||||
while [ -z "${TRINO_HOST}" ]; do
|
while [ -z "${TRINO_HOST}" ]; do
|
||||||
TRINO_HOST=$(
|
TRINO_HOST=$(
|
||||||
gum input --prompt="Trino host (FQDN): " --width=100 \
|
gum input --prompt="Trino host (FQDN): " --width=100 \
|
||||||
@@ -241,35 +243,28 @@ install:
|
|||||||
echo "Installing Trino..."
|
echo "Installing Trino..."
|
||||||
just create-namespace
|
just create-namespace
|
||||||
just create-oauth-client
|
just create-oauth-client
|
||||||
export TRINO_HOST="${TRINO_HOST}"
|
just create-password-secret
|
||||||
just create-self-signed-cert
|
|
||||||
|
|
||||||
if gum confirm "Setup PostgreSQL catalog?"; then
|
just setup-postgres-catalog
|
||||||
just setup-postgres-catalog
|
|
||||||
export TRINO_POSTGRES_ENABLED="true"
|
|
||||||
else
|
|
||||||
export TRINO_POSTGRES_ENABLED="false"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if gum confirm "Setup MinIO storage (for Hive/Iceberg catalogs)?"; then
|
if [ -z "${TRINO_MINIO_ENABLED}" ]; then
|
||||||
just setup-minio-storage
|
if gum confirm "Setup MinIO storage (for Iceberg catalogs)?"; then
|
||||||
export TRINO_MINIO_ENABLED="true"
|
just setup-minio-storage
|
||||||
else
|
TRINO_MINIO_ENABLED="true"
|
||||||
export TRINO_MINIO_ENABLED="false"
|
else
|
||||||
|
TRINO_MINIO_ENABLED="false"
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
just add-helm-repo
|
just add-helm-repo
|
||||||
|
|
||||||
SHARED_SECRET=$(just utils::random-password)
|
shared_secret=$(just utils::random-password)
|
||||||
export TRINO_SHARED_SECRET="$SHARED_SECRET"
|
export TRINO_SHARED_SECRET="${shared_secret}"
|
||||||
|
|
||||||
gomplate -f trino-values.gomplate.yaml -o trino-values.yaml
|
gomplate -f trino-values.gomplate.yaml -o trino-values.yaml
|
||||||
|
|
||||||
helm upgrade --install trino trino/trino \
|
helm upgrade --install trino trino/trino --namespace ${TRINO_NAMESPACE} \
|
||||||
--namespace ${TRINO_NAMESPACE} \
|
--version ${TRINO_CHART_VERSION} -f trino-values.yaml --wait --timeout=10m
|
||||||
--version ${TRINO_CHART_VERSION} \
|
|
||||||
-f trino-values.yaml \
|
|
||||||
--wait --timeout=10m
|
|
||||||
|
|
||||||
echo "Trino installed successfully"
|
echo "Trino installed successfully"
|
||||||
echo "Access Trino at: https://${TRINO_HOST}"
|
echo "Access Trino at: https://${TRINO_HOST}"
|
||||||
@@ -278,48 +273,40 @@ install:
|
|||||||
upgrade:
|
upgrade:
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
while [ -z "${TRINO_HOST}" ]; do
|
||||||
|
TRINO_HOST=$(
|
||||||
|
gum input --prompt="Trino host (FQDN): " --width=100 \
|
||||||
|
--placeholder="e.g., trino.example.com"
|
||||||
|
)
|
||||||
|
done
|
||||||
|
|
||||||
echo "Upgrading Trino..."
|
echo "Upgrading Trino..."
|
||||||
|
|
||||||
# Detect current configuration from existing secrets
|
if [ -z "${TRINO_MINIO_ENABLED}" ]; then
|
||||||
if kubectl get secret trino-postgres-secret -n ${TRINO_NAMESPACE} &>/dev/null; then
|
if kubectl get secret trino-minio-secret -n ${TRINO_NAMESPACE} &>/dev/null; then
|
||||||
export TRINO_POSTGRES_ENABLED="true"
|
TRINO_MINIO_ENABLED="true"
|
||||||
echo "PostgreSQL catalog: enabled"
|
echo "MinIO storage: enabled"
|
||||||
else
|
else
|
||||||
export TRINO_POSTGRES_ENABLED="false"
|
TRINO_MINIO_ENABLED="false"
|
||||||
echo "PostgreSQL catalog: disabled"
|
echo "MinIO storage: disabled"
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if kubectl get secret trino-minio-secret -n ${TRINO_NAMESPACE} &>/dev/null; then
|
shared_secret=$(
|
||||||
export TRINO_MINIO_ENABLED="true"
|
kubectl get configmap trino-coordinator -n ${TRINO_NAMESPACE} \
|
||||||
echo "MinIO storage: enabled"
|
-o jsonpath='{.data.config\.properties}' 2>/dev/null |
|
||||||
else
|
grep "internal-communication.shared-secret=" | cut -d'=' -f2 || echo ""
|
||||||
export TRINO_MINIO_ENABLED="false"
|
)
|
||||||
echo "MinIO storage: disabled"
|
if [ -z "${shared_secret}" ]; then
|
||||||
fi
|
|
||||||
|
|
||||||
# Get TRINO_HOST from existing ingress
|
|
||||||
export TRINO_HOST=$(kubectl get ingress -n ${TRINO_NAMESPACE} trino-coordinator -o jsonpath='{.spec.rules[0].host}' 2>/dev/null || echo "")
|
|
||||||
if [ -z "${TRINO_HOST}" ]; then
|
|
||||||
echo "Error: Could not determine TRINO_HOST from existing ingress"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
echo "Trino host: ${TRINO_HOST}"
|
|
||||||
|
|
||||||
# Get existing shared secret from config
|
|
||||||
SHARED_SECRET=$(kubectl get configmap trino-coordinator -n ${TRINO_NAMESPACE} -o jsonpath='{.data.config\.properties}' 2>/dev/null | grep "internal-communication.shared-secret=" | cut -d'=' -f2 || echo "")
|
|
||||||
if [ -z "${SHARED_SECRET}" ]; then
|
|
||||||
echo "Error: Could not retrieve existing shared secret"
|
echo "Error: Could not retrieve existing shared secret"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
export TRINO_SHARED_SECRET="${SHARED_SECRET}"
|
export TRINO_SHARED_SECRET="${shared_secret}"
|
||||||
|
|
||||||
gomplate -f trino-values.gomplate.yaml -o trino-values.yaml
|
gomplate -f trino-values.gomplate.yaml -o trino-values.yaml
|
||||||
|
|
||||||
helm upgrade trino trino/trino \
|
helm upgrade trino trino/trino --namespace ${TRINO_NAMESPACE} --version ${TRINO_CHART_VERSION} \
|
||||||
--namespace ${TRINO_NAMESPACE} \
|
-f trino-values.yaml --wait --timeout=10m
|
||||||
--version ${TRINO_CHART_VERSION} \
|
|
||||||
-f trino-values.yaml \
|
|
||||||
--wait --timeout=10m
|
|
||||||
|
|
||||||
echo "Trino upgraded successfully"
|
echo "Trino upgraded successfully"
|
||||||
echo "Access Trino at: https://${TRINO_HOST}"
|
echo "Access Trino at: https://${TRINO_HOST}"
|
||||||
@@ -333,7 +320,7 @@ uninstall delete-db='true':
|
|||||||
just delete-oauth-secret
|
just delete-oauth-secret
|
||||||
just delete-postgres-secret
|
just delete-postgres-secret
|
||||||
just delete-minio-secret
|
just delete-minio-secret
|
||||||
just delete-tls-secret
|
just delete-password-secret
|
||||||
just delete-namespace
|
just delete-namespace
|
||||||
if [ "{{ delete-db }}" = "true" ]; then
|
if [ "{{ delete-db }}" = "true" ]; then
|
||||||
just postgres::delete-db trino || true
|
just postgres::delete-db trino || true
|
||||||
@@ -352,8 +339,20 @@ cleanup:
|
|||||||
just vault::delete trino/oauth || true
|
just vault::delete trino/oauth || true
|
||||||
just vault::delete trino/postgres || true
|
just vault::delete trino/postgres || true
|
||||||
just vault::delete trino/minio || true
|
just vault::delete trino/minio || true
|
||||||
|
just vault::delete trino/password || true
|
||||||
just keycloak::delete-client ${KEYCLOAK_REALM} trino || true
|
just keycloak::delete-client ${KEYCLOAK_REALM} trino || true
|
||||||
echo "Cleanup completed"
|
echo "Cleanup completed"
|
||||||
else
|
else
|
||||||
echo "Cleanup cancelled"
|
echo "Cleanup cancelled"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# Print Trino admin password
|
||||||
|
admin-password:
|
||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
if helm status external-secrets -n ${EXTERNAL_SECRETS_NAMESPACE} &>/dev/null; then
|
||||||
|
just vault::get trino/password admin_password
|
||||||
|
else
|
||||||
|
echo "Cannot retrieve password: External Secrets not installed"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ server:
|
|||||||
https:
|
https:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
authenticationType: "OAUTH2"
|
authenticationType: "PASSWORD,OAUTH2"
|
||||||
|
|
||||||
exchangeManager:
|
exchangeManager:
|
||||||
name: "filesystem"
|
name: "filesystem"
|
||||||
@@ -59,7 +59,7 @@ accessControl: {}
|
|||||||
|
|
||||||
resourceGroups: {}
|
resourceGroups: {}
|
||||||
|
|
||||||
{{- if eq (.Env.TRINO_POSTGRES_ENABLED | default "false") "true" }}
|
{{- if .Env.TRINO_POSTGRES_ENABLED }}
|
||||||
catalogs:
|
catalogs:
|
||||||
postgresql: |
|
postgresql: |
|
||||||
connector.name=postgresql
|
connector.name=postgresql
|
||||||
@@ -71,7 +71,7 @@ catalogs:
|
|||||||
connector.name=tpch
|
connector.name=tpch
|
||||||
tpch.splits-per-node=4
|
tpch.splits-per-node=4
|
||||||
|
|
||||||
{{- if eq (.Env.TRINO_MINIO_ENABLED | default "false") "true" }}
|
{{- if .Env.TRINO_MINIO_ENABLED }}
|
||||||
iceberg: |
|
iceberg: |
|
||||||
connector.name=iceberg
|
connector.name=iceberg
|
||||||
iceberg.catalog.type=rest
|
iceberg.catalog.type=rest
|
||||||
@@ -106,10 +106,7 @@ ingress:
|
|||||||
paths:
|
paths:
|
||||||
- path: /
|
- path: /
|
||||||
pathType: ImplementationSpecific
|
pathType: ImplementationSpecific
|
||||||
tls:
|
tls: []
|
||||||
- secretName: trino-tls
|
|
||||||
hosts:
|
|
||||||
- {{ .Env.TRINO_HOST }}
|
|
||||||
|
|
||||||
auth: {}
|
auth: {}
|
||||||
|
|
||||||
@@ -166,7 +163,10 @@ coordinator:
|
|||||||
|
|
||||||
affinity: {}
|
affinity: {}
|
||||||
|
|
||||||
additionalConfigFiles: {}
|
additionalConfigFiles:
|
||||||
|
password-authenticator.properties: |
|
||||||
|
password-authenticator.name=file
|
||||||
|
file.password-file=/etc/trino/password/password.db
|
||||||
|
|
||||||
additionalVolumes: []
|
additionalVolumes: []
|
||||||
|
|
||||||
@@ -176,7 +176,10 @@ coordinator:
|
|||||||
|
|
||||||
labels: {}
|
labels: {}
|
||||||
|
|
||||||
secretMounts: []
|
secretMounts:
|
||||||
|
- name: trino-password
|
||||||
|
secretName: trino-password-secret
|
||||||
|
path: /etc/trino/password
|
||||||
|
|
||||||
worker:
|
worker:
|
||||||
jvm:
|
jvm:
|
||||||
@@ -268,7 +271,7 @@ env:
|
|||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: trino-oauth-secret
|
name: trino-oauth-secret
|
||||||
key: client_secret
|
key: client_secret
|
||||||
{{- if eq (.Env.TRINO_POSTGRES_ENABLED | default "false") "true" }}
|
{{- if .Env.TRINO_POSTGRES_ENABLED }}
|
||||||
- name: POSTGRES_USER
|
- name: POSTGRES_USER
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
|
|||||||
Reference in New Issue
Block a user