This is an automated email from the ASF dual-hosted git repository.

madhan pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git


The following commit(s) were added to refs/heads/master by this push:
     new 30913c54f RANGER-5386: Docker setup updated to use latest Trino 
release (#719)
30913c54f is described below

commit 30913c54fc4428a10f6bb8befb1a1cd721bad550
Author: Madhan Neethiraj <[email protected]>
AuthorDate: Mon Oct 27 20:19:45 2025 -0700

    RANGER-5386: Docker setup updated to use latest Trino release (#719)
---
 dev-support/ranger-docker/.env                     |   3 +-
 dev-support/ranger-docker/Dockerfile.ranger-trino  |  54 +------
 .../config/trino/access-control.properties         |   4 +
 .../config/trino/catalog/hive.properties           |   4 +
 .../config/trino/ranger-policymgr-ssl.xml          |  49 ++++++
 .../config/trino/ranger-trino-audit.xml            |  95 ++++++++++++
 .../config/trino/ranger-trino-security.xml         |  89 +++++++++++
 .../ranger-docker/docker-compose.ranger-trino.yml  |   4 +-
 dev-support/ranger-docker/scripts/core-site.xml    |   7 +
 .../scripts/ranger-trino-plugin-install.properties | 169 ---------------------
 .../ranger-docker/scripts/ranger-trino-setup.sh    |  44 ------
 dev-support/ranger-docker/scripts/ranger-trino.sh  |  34 -----
 12 files changed, 251 insertions(+), 305 deletions(-)

diff --git a/dev-support/ranger-docker/.env b/dev-support/ranger-docker/.env
index e8edd5bcd..091ae7452 100644
--- a/dev-support/ranger-docker/.env
+++ b/dev-support/ranger-docker/.env
@@ -66,8 +66,7 @@ OZONE_RUNNER_IMAGE=apache/ozone-runner
 OZONE_RUNNER_VERSION=20230615-1
 
 # Trino Configuration
-TRINO_VERSION=435
-TRINO_PLUGIN_VERSION=3.0.0-SNAPSHOT
+TRINO_VERSION=latest
 
 # Debug Configuration
 DEBUG_ADMIN=false
diff --git a/dev-support/ranger-docker/Dockerfile.ranger-trino 
b/dev-support/ranger-docker/Dockerfile.ranger-trino
index c376b18ba..05e93c898 100644
--- a/dev-support/ranger-docker/Dockerfile.ranger-trino
+++ b/dev-support/ranger-docker/Dockerfile.ranger-trino
@@ -17,58 +17,6 @@
 ARG TRINO_VERSION
 FROM trinodb/trino:${TRINO_VERSION}
 
-# trino base image layer has undergone changes in base os image with time.
-##########################################
-#   Trino Versions  |      OS Layer      #
-#    359 - 369      |     centos 11      #
-#    370 - 389      |       ubi8         #
-#    390 - 391      |    azul openjdk    #
-#       392         |       ubi8         #
-#    393 - 431      |   eclipse-temurin  #
-#    432 - current  |       ubi9         #
-##########################################
-
-USER root
-
-ARG TRINO_VERSION
-ARG TRINO_PLUGIN_VERSION
-ENV PLUGIN_DIR=ranger-${TRINO_PLUGIN_VERSION}-trino-plugin
-
-RUN mkdir -p /home/ranger/dist /home/ranger/scripts /opt/ranger
-
-COPY ./dist/version                                              
/home/ranger/dist
-COPY ./dist/ranger-${TRINO_PLUGIN_VERSION}-trino-plugin.tar.gz   
/home/ranger/dist
-COPY ./scripts/ranger-trino.sh                                   
/home/ranger/scripts
-COPY ./scripts/ranger-trino-setup.sh                             
/home/ranger/scripts
-COPY ./scripts/ranger-trino-plugin-install.properties            
/home/ranger/scripts
-
-RUN if [ $TRINO_VERSION -ge 370 ] && [ $TRINO_VERSION -lt 390 ] || [ 
$TRINO_VERSION -eq 392 ]; then\
-        dnf install -y initscripts;\
-        dnf install -y openssh-clients;\
-        dnf install -y openssh-server;\
-        dnf install -y sudo;\
-    elif [ $TRINO_VERSION -ge 432 ]; then\
-        microdnf install -y gzip;\
-        microdnf install -y initscripts;\
-        microdnf install -y openssh-clients;\
-        microdnf install -y openssh-server;\
-        microdnf install -y sudo;\
-    else\
-        apt-get update; DEBIAN_FRONTEND="noninteractive" apt-get -y install 
ssh sudo;\
-    fi
-
-RUN tar xvfz /home/ranger/dist/${PLUGIN_DIR}.tar.gz --directory=/opt/ranger && 
\
-    ln -s /opt/ranger/${PLUGIN_DIR} /opt/ranger/ranger-trino-plugin && \
-    rm -f /home/ranger/dist/${PLUGIN_DIR}.tar.gz && \
-    cp -f /home/ranger/scripts/ranger-trino-plugin-install.properties 
/opt/ranger/ranger-trino-plugin/install.properties && \
-    chown -R trino:trino /home/ranger /opt/ranger && \
-    chown root:root /home/ranger/scripts 
/home/ranger/scripts/ranger-trino-setup.sh && \
-    chmod 744 /home/ranger/scripts/ranger-trino-setup.sh 
/home/ranger/scripts/ranger-trino.sh
-
-# enable trino user to execute setup script as root
-RUN echo "trino  ALL=(ALL) 
NOPASSWD:/home/ranger/scripts/ranger-trino-setup.sh" > /etc/sudoers.d/trino
-
-
 USER trino
 
-ENTRYPOINT ["/home/ranger/scripts/ranger-trino.sh"]
+COPY ./config/trino/*  /etc/trino/
diff --git a/dev-support/ranger-docker/config/trino/access-control.properties 
b/dev-support/ranger-docker/config/trino/access-control.properties
new file mode 100644
index 000000000..edaad8f9b
--- /dev/null
+++ b/dev-support/ranger-docker/config/trino/access-control.properties
@@ -0,0 +1,4 @@
+access-control.name=ranger
+
+ranger.service.name=dev_trino
+ranger.plugin.config.resource=/etc/trino/ranger-trino-security.xml,/etc/trino/ranger-trino-audit.xml,/etc/trino/ranger-policymgr-ssl.xml
diff --git a/dev-support/ranger-docker/config/trino/catalog/hive.properties 
b/dev-support/ranger-docker/config/trino/catalog/hive.properties
new file mode 100644
index 000000000..b5206d0f6
--- /dev/null
+++ b/dev-support/ranger-docker/config/trino/catalog/hive.properties
@@ -0,0 +1,4 @@
+connector.name=hive
+hive.metastore.uri=thrift://ranger-hive.rangernw:9083
+fs.hadoop.enabled=true
+hive.config.resources=/etc/trino/core-site.xml
diff --git a/dev-support/ranger-docker/config/trino/ranger-policymgr-ssl.xml 
b/dev-support/ranger-docker/config/trino/ranger-policymgr-ssl.xml
new file mode 100644
index 000000000..3baf7725c
--- /dev/null
+++ b/dev-support/ranger-docker/config/trino/ranger-policymgr-ssl.xml
@@ -0,0 +1,49 @@
+<?xml version="1.0"?>
+<!--
+  Licensed to the Apache Software Foundation (ASF) under one or more
+  contributor license agreements.  See the NOTICE file distributed with
+  this work for additional information regarding copyright ownership.
+  The ASF licenses this file to You under the Apache License, Version 2.0
+  (the "License"); you may not use this file except in compliance with
+  the License.  You may obtain a copy of the License at
+
+      http://www.apache.org/licenses/LICENSE-2.0
+
+  Unless required by applicable law or agreed to in writing, software
+  distributed under the License is distributed on an "AS IS" BASIS,
+  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  See the License for the specific language governing permissions and
+  limitations under the License.
+-->
+<?xml-stylesheet type="text/xsl" href="configuration.xsl"?>
+<configuration xmlns:xi="http://www.w3.org/2001/XInclude";>
+       <!--  The following properties are used for 2-way SSL client server 
validation -->
+       <property>
+               <name>xasecure.policymgr.clientssl.keystore</name>
+               <value>hadoopdev-clientcert.jks</value>
+               <description> 
+                       Java Keystore files 
+               </description>
+       </property>
+       <property>
+               <name>xasecure.policymgr.clientssl.truststore</name>
+               <value>cacerts-xasecure.jks</value>
+               <description> 
+                       java truststore file
+               </description>
+       </property>
+    <property>
+               
<name>xasecure.policymgr.clientssl.keystore.credential.file</name>
+               <value>jceks://file/tmp/keystore-hadoopdev-ssl.jceks</value>
+               <description> 
+                       java  keystore credential file
+               </description>
+       </property>
+       <property>
+               
<name>xasecure.policymgr.clientssl.truststore.credential.file</name>
+               <value>jceks://file/tmp/truststore-hadoopdev-ssl.jceks</value>
+               <description> 
+                       java  truststore credential file
+               </description>
+       </property>
+</configuration>
\ No newline at end of file
diff --git a/dev-support/ranger-docker/config/trino/ranger-trino-audit.xml 
b/dev-support/ranger-docker/config/trino/ranger-trino-audit.xml
new file mode 100644
index 000000000..9a0b234fe
--- /dev/null
+++ b/dev-support/ranger-docker/config/trino/ranger-trino-audit.xml
@@ -0,0 +1,95 @@
+<?xml version="1.0"?>
+<!--
+  Licensed to the Apache Software Foundation (ASF) under one or more
+  contributor license agreements.  See the NOTICE file distributed with
+  this work for additional information regarding copyright ownership.
+  The ASF licenses this file to You under the Apache License, Version 2.0
+  (the "License"); you may not use this file except in compliance with
+  the License.  You may obtain a copy of the License at
+
+      http://www.apache.org/licenses/LICENSE-2.0
+
+  Unless required by applicable law or agreed to in writing, software
+  distributed under the License is distributed on an "AS IS" BASIS,
+  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  See the License for the specific language governing permissions and
+  limitations under the License.
+-->
+<?xml-stylesheet type="text/xsl" href="configuration.xsl"?>
+<configuration xmlns:xi="http://www.w3.org/2001/XInclude";>
+    <property>
+        <name>xasecure.audit.is.enabled</name>
+        <value>true</value>
+    </property>
+
+    <!-- Log4j audit provider configuration -->
+    <property>
+        <name>xasecure.audit.destination.log4j</name>
+        <value>false</value>
+    </property>
+
+
+    <!-- Solr audit provider configuration -->
+    <property>
+        <name>xasecure.audit.destination.solr</name>
+        <value>true</value>
+    </property>
+
+    <property>
+        <name>xasecure.audit.destination.solr.urls</name>
+        <value>http://ranger-solr.rangernw:8983/solr/ranger_audits</value>
+    </property>
+
+    <property>
+        <name>xasecure.audit.destination.solr.user</name>
+        <value>NONE</value>
+    </property>
+
+    <property>
+        <name>xasecure.audit.destination.solr.password</name>
+        <value>NONE</value>
+    </property>
+
+    <property>
+        <name>xasecure.audit.destination.solr.batch.filespool.dir</name>
+        <value>/var/log/hive/audit/solr/spool</value>
+    </property>
+
+    <property>
+        
<name>xasecure.audit.destination.solr.force.use.inmemory.jaas.config</name>
+        <value>false</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.loginModuleName</name>
+        <value>com.sun.security.auth.module.Krb5LoginModule</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.loginModuleControlFlag</name>
+        <value>required</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.option.useKeyTab</name>
+        <value>true</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.option.storeKey</name>
+        <value>true</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.option.useTicketCache</name>
+        <value>false</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.option.serviceName</name>
+        <value>trino</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.option.keyTab</name>
+        <value>/usr/lib/trino/plugin/ranger/trino.keytab</value>
+    </property>
+    <property>
+        <name>xasecure.audit.jaas.Client.option.principal</name>
+        <value>trino/[email protected]</value>
+    </property>
+</configuration>
+
diff --git a/dev-support/ranger-docker/config/trino/ranger-trino-security.xml 
b/dev-support/ranger-docker/config/trino/ranger-trino-security.xml
new file mode 100644
index 000000000..ee3a18865
--- /dev/null
+++ b/dev-support/ranger-docker/config/trino/ranger-trino-security.xml
@@ -0,0 +1,89 @@
+<?xml-stylesheet type="text/xsl" href="configuration.xsl"?>
+<!--
+  Licensed to the Apache Software Foundation (ASF) under one or more
+  contributor license agreements.  See the NOTICE file distributed with
+  this work for additional information regarding copyright ownership.
+  The ASF licenses this file to You under the Apache License, Version 2.0
+  (the "License"); you may not use this file except in compliance with
+  the License.  You may obtain a copy of the License at
+
+      http://www.apache.org/licenses/LICENSE-2.0
+
+  Unless required by applicable law or agreed to in writing, software
+  distributed under the License is distributed on an "AS IS" BASIS,
+  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  See the License for the specific language governing permissions and
+  limitations under the License.
+-->
+<configuration>
+  <property>
+    <name>ranger.plugin.trino.service.name</name>
+    <value>dev_trino</value>
+    <description>
+      Name of the Ranger service containing policies for this Trino instance
+    </description>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.policy.source.impl</name>
+    <value>org.apache.ranger.admin.client.RangerAdminRESTClient</value>
+    <description>
+      Class to retrieve policies from the source
+    </description>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.policy.rest.url</name>
+    <value>http://ranger:6080</value>
+    <description>
+      URL to Ranger Admin
+    </description>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.policy.rest.ssl.config.file</name>
+    <value>/etc/hadoop/conf/ranger-policymgr-ssl.xml</value>
+    <description>
+      Path to the file containing SSL details to contact Ranger Admin
+    </description>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.policy.pollIntervalMs</name>
+    <value>30000</value>
+    <description>
+      How often to poll for changes in policies?
+    </description>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.policy.rest.client.connection.timeoutMs</name>
+    <value>30000</value>
+    <description>
+      RangerRestClient Connection Timeout in Milli Seconds
+    </description>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.policy.rest.client.read.timeoutMs</name>
+    <value>30000</value>
+    <description>
+      RangerRestClient read Timeout in Milli Seconds
+    </description>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.policy.cache.dir</name>
+    <value>/tmp</value>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.use.rangerGroups</name>
+    <value>true</value>
+  </property>
+
+  <property>
+    <name>ranger.plugin.trino.use.only.rangerGroups</name>
+    <value>true</value>
+  </property>
+</configuration>
diff --git a/dev-support/ranger-docker/docker-compose.ranger-trino.yml 
b/dev-support/ranger-docker/docker-compose.ranger-trino.yml
index 5a899b99a..2439c4101 100644
--- a/dev-support/ranger-docker/docker-compose.ranger-trino.yml
+++ b/dev-support/ranger-docker/docker-compose.ranger-trino.yml
@@ -4,10 +4,9 @@ services:
       context: .
       dockerfile: Dockerfile.ranger-trino
       args:
-        - TRINO_PLUGIN_VERSION=${TRINO_PLUGIN_VERSION}
         - TRINO_VERSION=${TRINO_VERSION}
     image: ranger-trino
-    hostname: ranger-trino
+    hostname: trino
     container_name: ranger-trino
     stdin_open: true
     tty: true
@@ -19,7 +18,6 @@ services:
       ranger:
         condition: service_started
     environment:
-      - TRINO_PLUGIN_VERSION
       - TRINO_VERSION
 
 networks:
diff --git a/dev-support/ranger-docker/scripts/core-site.xml 
b/dev-support/ranger-docker/scripts/core-site.xml
new file mode 100644
index 000000000..2cce9dd9e
--- /dev/null
+++ b/dev-support/ranger-docker/scripts/core-site.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<configuration>
+  <property>
+    <name>fs.defaultFS</name>
+    <value>hdfs://ranger-hadoop.rangernw:9000</value>
+  </property>
+</configuration>
diff --git 
a/dev-support/ranger-docker/scripts/ranger-trino-plugin-install.properties 
b/dev-support/ranger-docker/scripts/ranger-trino-plugin-install.properties
deleted file mode 100644
index 8446f9383..000000000
--- a/dev-support/ranger-docker/scripts/ranger-trino-plugin-install.properties
+++ /dev/null
@@ -1,169 +0,0 @@
-# Licensed to the Apache Software Foundation (ASF) under one or more
-# contributor license agreements.  See the NOTICE file distributed with
-# this work for additional information regarding copyright ownership.
-# The ASF licenses this file to You under the Apache License, Version 2.0
-# (the "License"); you may not use this file except in compliance with
-# the License.  You may obtain a copy of the License at
-#
-#     http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-#
-# Location of Policy Manager URL
-#
-POLICY_MGR_URL=http://ranger:6080
-#
-# This is the repository name created within policy manager
-#
-# Example:
-# REPOSITORY_NAME=trinodev
-#
-REPOSITORY_NAME=dev_trino
-# Custom added property to correctly configure ranger plugin for docker 
environment. This is required because trino uses different directories
-# for plugin and configuration for docker environment
-INSTALL_ENV=docker
-
-# Custom added property to correctly configure ranger plugin for docker 
environment. This is required because trino uses different directories
-# for plugin and configuration for docker environment
-COMPONENT_PLUGIN_DIR_NAME=/usr/lib/trino/plugin/ranger
-
-# Configure INSTALL_ENV=docker if running trino in docker environment
-#INSTALL_ENV=docker
-#
-# Name of the directory where the component's lib and conf directory exist.
-# This location should be relative to the parent of the directory containing
-# the plugin installation files.
-#
-COMPONENT_INSTALL_DIR_NAME=/etc/trino
-
-# Enable audit logs to Solr
-XAAUDIT.SOLR.ENABLE=true
-XAAUDIT.SOLR.URL=http://ranger-solr:8983/solr/ranger_audits
-XAAUDIT.SOLR.USER=solr
-XAAUDIT.SOLR.PASSWORD=NONE
-XAAUDIT.SOLR.ZOOKEEPER=NONE
-XAAUDIT.SOLR.FILE_SPOOL_DIR=/var/log/trino/audit/solr/spool
-
-# Enable audit logs to ElasticSearch
-XAAUDIT.ELASTICSEARCH.ENABLE=false
-XAAUDIT.ELASTICSEARCH.URL=http://ranger-es:9200
-XAAUDIT.ELASTICSEARCH.USER=elastic
-XAAUDIT.ELASTICSEARCH.PASSWORD=elasticsearch
-XAAUDIT.ELASTICSEARCH.INDEX=ranger_audits
-XAAUDIT.ELASTICSEARCH.PORT=9200
-XAAUDIT.ELASTICSEARCH.PROTOCOL=http
-
-# Enable audit logs to HDFS
-#Example
-#XAAUDIT.HDFS.ENABLE=true
-#XAAUDIT.HDFS.HDFS_DIR=hdfs://node-1.example.com:8020/ranger/audit
-#  If using Azure Blob Storage
-#XAAUDIT.HDFS.HDFS_DIR=wasb[s]://<containername>@<accountname>.blob.core.windows.net/<path>
-#XAAUDIT.HDFS.HDFS_DIR=wasb://[email protected]/ranger/audit
-#XAAUDIT.HDFS.FILE_SPOOL_DIR=/var/log/trino/audit/hdfs/spool
-
-XAAUDIT.HDFS.ENABLE=false
-XAAUDIT.HDFS.HDFS_DIR=hdfs://__REPLACE__NAME_NODE_HOST:8020/ranger/audit
-XAAUDIT.HDFS.FILE_SPOOL_DIR=/var/log/trino/audit/hdfs/spool
-
-# Following additional propertis are needed When auditing to Azure Blob 
Storage via HDFS
-# Get these values from your /etc/hadoop/conf/core-site.xml
-#XAAUDIT.HDFS.HDFS_DIR=wasb[s]://<containername>@<accountname>.blob.core.windows.net/<path>
-XAAUDIT.HDFS.AZURE_ACCOUNTNAME=__REPLACE_AZURE_ACCOUNT_NAME
-XAAUDIT.HDFS.AZURE_ACCOUNTKEY=__REPLACE_AZURE_ACCOUNT_KEY
-XAAUDIT.HDFS.AZURE_SHELL_KEY_PROVIDER=__REPLACE_AZURE_SHELL_KEY_PROVIDER
-XAAUDIT.HDFS.AZURE_ACCOUNTKEY_PROVIDER=__REPLACE_AZURE_ACCOUNT_KEY_PROVIDER
-
-#Log4j Audit Provider
-XAAUDIT.LOG4J.ENABLE=false
-XAAUDIT.LOG4J.IS_ASYNC=false
-XAAUDIT.LOG4J.ASYNC.MAX.QUEUE.SIZE=10240
-XAAUDIT.LOG4J.ASYNC.MAX.FLUSH.INTERVAL.MS=30000
-XAAUDIT.LOG4J.DESTINATION.LOG4J=true
-XAAUDIT.LOG4J.DESTINATION.LOG4J.LOGGER=xaaudit
-
-# Enable audit logs to Amazon CloudWatch Logs
-#Example
-#XAAUDIT.AMAZON_CLOUDWATCH.ENABLE=true
-#XAAUDIT.AMAZON_CLOUDWATCH.LOG_GROUP=ranger_audits
-#XAAUDIT.AMAZON_CLOUDWATCH.LOG_STREAM={instance_id}
-#XAAUDIT.AMAZON_CLOUDWATCH.FILE_SPOOL_DIR=/var/log/hive/audit/amazon_cloudwatch/spool
-
-XAAUDIT.AMAZON_CLOUDWATCH.ENABLE=false
-XAAUDIT.AMAZON_CLOUDWATCH.LOG_GROUP=NONE
-XAAUDIT.AMAZON_CLOUDWATCH.LOG_STREAM_PREFIX=NONE
-XAAUDIT.AMAZON_CLOUDWATCH.FILE_SPOOL_DIR=NONE
-XAAUDIT.AMAZON_CLOUDWATCH.REGION=NONE
-
-# End of V3 properties
-#
-#  Audit to HDFS Configuration
-#
-# If XAAUDIT.HDFS.IS_ENABLED is set to true, please replace tokens
-# that start with __REPLACE__ with appropriate values
-#  XAAUDIT.HDFS.IS_ENABLED=true
-#  
XAAUDIT.HDFS.DESTINATION_DIRECTORY=hdfs://__REPLACE__NAME_NODE_HOST:8020/ranger/audit/%app-type%/%time:yyyyMMdd%
-#  XAAUDIT.HDFS.LOCAL_BUFFER_DIRECTORY=__REPLACE__LOG_DIR/trino/audit
-#  XAAUDIT.HDFS.LOCAL_ARCHIVE_DIRECTORY=__REPLACE__LOG_DIR/trino/audit/archive
-#
-# Example:
-#  XAAUDIT.HDFS.IS_ENABLED=true
-#  
XAAUDIT.HDFS.DESTINATION_DIRECTORY=hdfs://namenode.example.com:8020/ranger/audit/%app-type%/%time:yyyyMMdd%
-#  XAAUDIT.HDFS.LOCAL_BUFFER_DIRECTORY=/var/log/trino/audit
-#  XAAUDIT.HDFS.LOCAL_ARCHIVE_DIRECTORY=/var/log/trino/audit/archive
-#
-XAAUDIT.HDFS.IS_ENABLED=false
-XAAUDIT.HDFS.DESTINATION_DIRECTORY=hdfs://__REPLACE__NAME_NODE_HOST:8020/ranger/audit/%app-type%/%time:yyyyMMdd%
-XAAUDIT.HDFS.LOCAL_BUFFER_DIRECTORY=__REPLACE__LOG_DIR/trino/audit
-XAAUDIT.HDFS.LOCAL_ARCHIVE_DIRECTORY=__REPLACE__LOG_DIR/trino/audit/archive
-
-XAAUDIT.HDFS.DESTINTATION_FILE=%hostname%-audit.log
-XAAUDIT.HDFS.DESTINTATION_FLUSH_INTERVAL_SECONDS=900
-XAAUDIT.HDFS.DESTINTATION_ROLLOVER_INTERVAL_SECONDS=86400
-XAAUDIT.HDFS.DESTINTATION_OPEN_RETRY_INTERVAL_SECONDS=60
-XAAUDIT.HDFS.LOCAL_BUFFER_FILE=%time:yyyyMMdd-HHmm.ss%.log
-XAAUDIT.HDFS.LOCAL_BUFFER_FLUSH_INTERVAL_SECONDS=60
-XAAUDIT.HDFS.LOCAL_BUFFER_ROLLOVER_INTERVAL_SECONDS=600
-XAAUDIT.HDFS.LOCAL_ARCHIVE_MAX_FILE_COUNT=10
-
-#Solr Audit Provider
-XAAUDIT.SOLR.IS_ENABLED=true
-XAAUDIT.SOLR.MAX_QUEUE_SIZE=1
-XAAUDIT.SOLR.MAX_FLUSH_INTERVAL_MS=1000
-XAAUDIT.SOLR.SOLR_URL=http://ranger-solr:6083/solr/ranger_audits
-
-# End of V2 properties
-
-#
-# SSL Client Certificate Information
-#
-# Example:
-# SSL_KEYSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-keystore.jks
-# SSL_KEYSTORE_PASSWORD=none
-# SSL_TRUSTSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-truststore.jks
-# SSL_TRUSTSTORE_PASSWORD=none
-#
-# You do not need use SSL between agent and security admin tool, please leave 
these sample value as it is.
-#
-SSL_KEYSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-keystore.jks
-SSL_KEYSTORE_PASSWORD=myKeyFilePassword
-SSL_TRUSTSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-truststore.jks
-SSL_TRUSTSTORE_PASSWORD=changeit
-
-#
-# Custom component user
-# CUSTOM_COMPONENT_USER=<custom-user>
-# keep blank if component user is default
-CUSTOM_USER=
-
-
-#
-# Custom component group
-# CUSTOM_COMPONENT_GROUP=<custom-group>
-# keep blank if component group is default
-CUSTOM_GROUP=
-XAAUDIT.SUMMARY.ENABLE=false
diff --git a/dev-support/ranger-docker/scripts/ranger-trino-setup.sh 
b/dev-support/ranger-docker/scripts/ranger-trino-setup.sh
deleted file mode 100755
index c3ac73a1b..000000000
--- a/dev-support/ranger-docker/scripts/ranger-trino-setup.sh
+++ /dev/null
@@ -1,44 +0,0 @@
-#!/bin/bash
-
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements.  See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership.  The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License.  You may obtain a copy of the License at
-#
-#     http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-
-source /tmp/trino-setup-env.sh
-
-TRINO_PLUGIN_HOME=/opt/ranger/ranger-trino-plugin
-
-ssh-keygen -A
-/usr/sbin/sshd
-
-if [ ! -e ${TRINO_PLUGIN_HOME}/.setupDone ]
-then
-  su -c "ssh-keygen -t rsa -P '' -f ~/.ssh/id_rsa" trino
-  su -c "cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys" trino
-  su -c "chmod 0600 ~/.ssh/authorized_keys" trino
-
-  cat <<EOF > /etc/ssh/ssh_config
-Host *
-   StrictHostKeyChecking no
-   UserKnownHostsFile=/dev/null
-EOF
-
-  cd ${TRINO_PLUGIN_HOME} || exit
-  ./enable-trino-plugin.sh
-
-  touch ${TRINO_PLUGIN_HOME}/.setupDone
-  echo "Ranger Trino Plugin Installation is complete!"
-fi
diff --git a/dev-support/ranger-docker/scripts/ranger-trino.sh 
b/dev-support/ranger-docker/scripts/ranger-trino.sh
deleted file mode 100644
index e41bb0249..000000000
--- a/dev-support/ranger-docker/scripts/ranger-trino.sh
+++ /dev/null
@@ -1,34 +0,0 @@
-#!/bin/bash
-
-# Licensed to the Apache Software Foundation (ASF) under one
-# or more contributor license agreements.  See the NOTICE file
-# distributed with this work for additional information
-# regarding copyright ownership.  The ASF licenses this file
-# to you under the Apache License, Version 2.0 (the
-# "License"); you may not use this file except in compliance
-# with the License.  You may obtain a copy of the License at
-#
-#     http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-
-echo "export JAVA_HOME=${JAVA_HOME}" >> /tmp/trino-setup-env.sh
-
-sudo /home/ranger/scripts/ranger-trino-setup.sh
-
-/usr/lib/trino/bin/run-trino
-
-TRINO_PID=$(ps -ef  | grep -v grep | grep -i "io.trino.server.TrinoServer" | 
awk '{print $2}')
-
-# prevent the container from exiting
-if [ -z "$TRINO_PID" ]
-then
-  echo "The Trino process probably exited, no process id found!"
-else
-  tail --pid="$TRINO_PID" -f /dev/null
-fi

Reply via email to