|
1 | 1 | --- |
2 | 2 | apiVersion: trino.stackable.tech/v1alpha1 |
| 3 | +kind: TrinoCatalog |
| 4 | +metadata: |
| 5 | + name: iceberg |
| 6 | + labels: |
| 7 | + trino: trino |
| 8 | +spec: |
| 9 | + connector: |
| 10 | + iceberg: |
| 11 | + metastore: |
| 12 | + configMap: hive |
| 13 | + s3: |
| 14 | + reference: minio |
| 15 | + hdfs: |
| 16 | + configMap: hdfs |
| 17 | +{% if test_scenario['values']['iceberg-use-kerberos'] == 'true' %} |
| 18 | + configOverrides: |
| 19 | + # HDFS configuration |
| 20 | + hive.hdfs.authentication.type: KERBEROS |
| 21 | + hive.hdfs.trino.principal: trino/trino.$NAMESPACE.svc.cluster.local@{{ test_scenario['values']['kerberos-realm'] }} |
| 22 | + hive.hdfs.trino.keytab: /stackable/kerberos/keytab |
| 23 | + hive.hdfs.impersonation.enabled: "false" |
| 24 | + hive.hdfs.wire-encryption.enabled: "true" |
| 25 | + # HMS configuration |
| 26 | + hive.metastore.authentication.type: KERBEROS |
| 27 | + hive.metastore.client.principal: trino/trino.$NAMESPACE.svc.cluster.local@{{ test_scenario['values']['kerberos-realm'] }} |
| 28 | + hive.metastore.client.keytab: /stackable/kerberos/keytab |
| 29 | + hive.metastore.service.principal: hive/hive.$NAMESPACE.svc.cluster.local@{{ test_scenario['values']['kerberos-realm'] }} |
| 30 | + hive.metastore.thrift.impersonation.enabled: "false" |
| 31 | + # By default, Hive views are executed with the RUN AS DEFINER security mode. Set the hive.hive-views.run-as-invoker catalog configuration property to true to use RUN AS INVOKER semantics. |
| 32 | + # However, this does *not* work for Iceberg catalogs :/ (I asked on the Trino slack: https://trinodb.slack.com/archives/CJ6UC075E/p1711449384648869) |
| 33 | + # hive.hive-views.run-as-invoker: "true" |
| 34 | +{% endif %} |
| 35 | +--- |
| 36 | +apiVersion: trino.stackable.tech/v1alpha1 |
3 | 37 | kind: TrinoCluster |
4 | 38 | metadata: |
5 | 39 | name: trino |
@@ -71,37 +105,3 @@ spec: |
71 | 105 | default: |
72 | 106 | replicas: 1 |
73 | 107 | config: {} |
74 | | ---- |
75 | | -apiVersion: trino.stackable.tech/v1alpha1 |
76 | | -kind: TrinoCatalog |
77 | | -metadata: |
78 | | - name: iceberg |
79 | | - labels: |
80 | | - trino: trino |
81 | | -spec: |
82 | | - connector: |
83 | | - iceberg: |
84 | | - metastore: |
85 | | - configMap: hive |
86 | | - s3: |
87 | | - reference: minio |
88 | | - hdfs: |
89 | | - configMap: hdfs |
90 | | -{% if test_scenario['values']['iceberg-use-kerberos'] == 'true' %} |
91 | | - configOverrides: |
92 | | - # HDFS configuration |
93 | | - hive.hdfs.authentication.type: KERBEROS |
94 | | - hive.hdfs.trino.principal: trino/trino.$NAMESPACE.svc.cluster.local@{{ test_scenario['values']['kerberos-realm'] }} |
95 | | - hive.hdfs.trino.keytab: /stackable/kerberos/keytab |
96 | | - hive.hdfs.impersonation.enabled: "false" |
97 | | - hive.hdfs.wire-encryption.enabled: "true" |
98 | | - # HMS configuration |
99 | | - hive.metastore.authentication.type: KERBEROS |
100 | | - hive.metastore.client.principal: trino/trino.$NAMESPACE.svc.cluster.local@{{ test_scenario['values']['kerberos-realm'] }} |
101 | | - hive.metastore.client.keytab: /stackable/kerberos/keytab |
102 | | - hive.metastore.service.principal: hive/hive.$NAMESPACE.svc.cluster.local@{{ test_scenario['values']['kerberos-realm'] }} |
103 | | - hive.metastore.thrift.impersonation.enabled: "false" |
104 | | - # By default, Hive views are executed with the RUN AS DEFINER security mode. Set the hive.hive-views.run-as-invoker catalog configuration property to true to use RUN AS INVOKER semantics. |
105 | | - # However, this does *not* work for Iceberg catalogs :/ (I asked on the Trino slack: https://trinodb.slack.com/archives/CJ6UC075E/p1711449384648869) |
106 | | - # hive.hive-views.run-as-invoker: "true" |
107 | | -{% endif %} |
0 commit comments