Skip to content

Releases: couchbase/couchbase-elasticsearch-connector

v2.2.3.2-update2 with support for JDK 1.7

06 Jun 09:45
Compare
Choose a tag to compare

This version uses an updated CAPI server v1.4.1, which downgrades Jetty to 9.2.17.v20160517, the last version to support JDK 1.7

2.5.0.0-alpha2 release with support for ES 5.0.0-alpha2

18 May 16:33
Compare
Choose a tag to compare

This is a preview release of the plugin for Elasticsearch 5.0.0-alpha2 (https://www.elastic.co/blog/elasticsearch-5-0-0-alpha2-released) with improved setting validation and better security management.

To install the plugin, run:

bin/elasticsearch-plugin install -b https://github.com/couchbaselabs/elasticsearch-transport-couchbase/releases/download/2.5.0.0-alpha2/elasticsearch-transport-couchbase-2.5.0.0-alpha2.zip

v2.2.3.2-update1 with support for ES 2.3.2

17 May 12:17
Compare
Choose a tag to compare

This release uses CAPI server 1.4.0 with Jetty 9.3.8.v20160314, adds support for Elasticsearch 2.3.2 and removes the need for the Java security policy workaround that was required in v2.2.1. When installing the plugin, you will be asked to approve the additional security permissions, please do so. Alternatively, you can install it with the -b flag, which automatically accepts all prompts.

v2.2.3.1 with support for ES 2.3.1

12 Apr 20:57
Compare
Choose a tag to compare

This release adds support for Elasticsearch 2.3.1 and removes the need for the Java security policy workaround that was required in v2.2.1. When installing the plugin, you will be asked to approve the additional security permissions, please do so. Alternatively, you can install it with the -b flag, which automatically accepts all prompts.

v2.2.3.0 with support for ES 2.3.0

12 Apr 20:56
Compare
Choose a tag to compare

This release adds support for Elasticsearch 2.3.0 and removes the need for the Java security policy workaround that was required in v2.2.1. When installing the plugin, you will be asked to approve the additional security permissions, please do so. Alternatively, you can install it with the -b flag, which automatically accepts all prompts.

v2.2.2.2 with support for ES 2.2.2

12 Apr 20:50
Compare
Choose a tag to compare

This release adds support for Elasticsearch 2.2.2 and removes the need for the Java security policy workaround that was required in v2.2.1. When installing the plugin, you will be asked to approve the additional security permissions, please do so. Alternatively, you can install it with the -b flag, which automatically accepts all prompts.

v2.2.2.1 with support for ES 2.2.1

12 Apr 20:49
Compare
Choose a tag to compare

This release adds support for Elasticsearch 2.2.1 and removes the need for the Java security policy workaround that was required in v2.2.1. When installing the plugin, you will be asked to approve the additional security permissions, please do so. Alternatively, you can install it with the -b flag, which automatically accepts all prompts.

v2.2.2.0 with support for ES 2.2.0

12 Apr 20:48
Compare
Choose a tag to compare

This release adds support for Elasticsearch 2.2.0 and removes the need for the Java security policy workaround that was required in v2.2.1. When installing the plugin, you will be asked to approve the additional security permissions, please do so. Alternatively, you can install it with the -b flag, which automatically accepts all prompts.

v2.2.1.2 with Support for Elasticsearch 2.1.1

13 Jan 20:00
Compare
Choose a tag to compare

This release adds support for Elasticsearch 2.1.1, which was generously contributed by Perrin Bignoli (https://github.com/bignolip) to the plugin. Note that due to changes in the security mechanism of Elasticsearch the plugin now requires changes to the Java policy file as follows:

Java Security Policy Permissions

In order to get the plugin to work with ES 2.1.x, it is necessary to edit the system's default java.policy file, which is located in the %JAVA_HOME%/jre/lib/security directory. You can either edit this file directly, or use the policytool utility, which can be found in the %JAVA_HOME/bin directory. Note that editing the policy file requires root permissions.
If you're editing the policy file directly, add the following to the end of the file:

grant codeBase "file://<path to transport-couchbase plugin install directory>/*" {
  permission javax.security.auth.AuthPermission "modifyPrincipals";
  permission javax.security.auth.AuthPermission "modifyPrivateCredentials";
  permission javax.security.auth.AuthPermission "setReadOnly";
  permission java.lang.RuntimePermission "setContextClassLoader";
  permission java.net.SocketPermission "*", "listen,resolve";
  permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
};

Replace file://<path>/* with the directory where you installed the plugin. For example, if you installed Elasticsearch from as a deb/rpm package on Linux, this would be file:///usr/share/elasticsearch/plugins/transport-couchbase/* - note the trailing *, which means that the policy will apply to all files in that directory.

If you prefer to use the GUI applet, run specify the location of the policy file with the -file parameter, for example:

sudo $JAVA_HOME/bin/policytool -file $JAVA_HOME/jre/lib/security/java.policy 

When the applet window appears, verify that the Policy File textbox shows the name of the policy file you're going to edit. To add the required security settings click on the "Add Policy Entry" button. In the new "Policy Entry" window that will appear, fill in the CodeBase textbox with the URL path to the plugin's installation directory, as explained above.
Next, add each of the following permissions by clicking on the "Add Permission" button for each, then selecting the specified options:

1.)  permission javax.security.auth.AuthPermission "modifyPrincipals";

     From the "Permission:" dropdown select:

        AuthPermission

     From the "Target Name:" dropdown select:

        modifyPrincipals

     Click "Ok"

2.)  permission javax.security.auth.AuthPermission "modifyPrivateCredentials";

     From the "Permission:" dropdown select:

        AuthPermission

     From the "Target Name:" dropdown select:

        modifyPrivateCredentials

     Click "Ok"

3.)  permission javax.security.auth.AuthPermission "setReadOnly";

     From the "Permission:" dropdown select:

        AuthPermission

     From the "Target Name:" dropdown select:

        setReadOnly

     Click "Ok"

4.)  permission java.lang.RuntimePermission "setContextClassLoader";

     From the "Permission:" dropdown select:

        RuntimePermission

     From the "Target Name:" dropdown select:

        setContextClassLoader

     Click "Ok"

5.)  permission java.net.SocketPermission "*", "listen,resolve";

     From the "Permission:" dropdown select:

        SocketPermission

     In the "Target Name:" textbox type:

        *

     In the "Actions:" dropdown type:

        listen,resolve

     Click "Ok"

6.)  permission "java.lang.reflect.ReflectPermission" "suppressAccessChecks";

     From the "Permission:" dropdown select:

        ReflectPermission

     From the "Target Name:" dropdown select:

        suppressAccessChecks

     Click "Ok"

At the end of the process, your policy tool should look similar to this:

Policy Tool

v2.2.0.2 with Support for Elasticsearch 2.1.0

13 Jan 19:58
Compare
Choose a tag to compare

This release adds support for Elasticsearch 2.1.0, which was generously contributed by Perrin Bignoli (https://github.com/bignolip) to the plugin. Note that due to changes in the security mechanism of Elasticsearch the plugin now requires changes to the Java policy file as follows:

Java Security Policy Permissions

In order to get the plugin to work with ES 2.1.x, it is necessary to edit the system's default java.policy file, which is located in the %JAVA_HOME%/jre/lib/security directory. You can either edit this file directly, or use the policytool utility, which can be found in the %JAVA_HOME/bin directory. Note that editing the policy file requires root permissions.
If you're editing the policy file directly, add the following to the end of the file:

grant codeBase "file://<path to transport-couchbase plugin install directory>/*" {
  permission javax.security.auth.AuthPermission "modifyPrincipals";
  permission javax.security.auth.AuthPermission "modifyPrivateCredentials";
  permission javax.security.auth.AuthPermission "setReadOnly";
  permission java.lang.RuntimePermission "setContextClassLoader";
  permission java.net.SocketPermission "*", "listen,resolve";
  permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
};

Replace file://<path>/* with the directory where you installed the plugin. For example, if you installed Elasticsearch from as a deb/rpm package on Linux, this would be file:///usr/share/elasticsearch/plugins/transport-couchbase/* - note the trailing *, which means that the policy will apply to all files in that directory.

If you prefer to use the GUI applet, run specify the location of the policy file with the -file parameter, for example:

sudo $JAVA_HOME/bin/policytool -file $JAVA_HOME/jre/lib/security/java.policy 

When the applet window appears, verify that the Policy File textbox shows the name of the policy file you're going to edit. To add the required security settings click on the "Add Policy Entry" button. In the new "Policy Entry" window that will appear, fill in the CodeBase textbox with the URL path to the plugin's installation directory, as explained above.
Next, add each of the following permissions by clicking on the "Add Permission" button for each, then selecting the specified options:

1.)  permission javax.security.auth.AuthPermission "modifyPrincipals";

     From the "Permission:" dropdown select:

        AuthPermission

     From the "Target Name:" dropdown select:

        modifyPrincipals

     Click "Ok"

2.)  permission javax.security.auth.AuthPermission "modifyPrivateCredentials";

     From the "Permission:" dropdown select:

        AuthPermission

     From the "Target Name:" dropdown select:

        modifyPrivateCredentials

     Click "Ok"

3.)  permission javax.security.auth.AuthPermission "setReadOnly";

     From the "Permission:" dropdown select:

        AuthPermission

     From the "Target Name:" dropdown select:

        setReadOnly

     Click "Ok"

4.)  permission java.lang.RuntimePermission "setContextClassLoader";

     From the "Permission:" dropdown select:

        RuntimePermission

     From the "Target Name:" dropdown select:

        setContextClassLoader

     Click "Ok"

5.)  permission java.net.SocketPermission "*", "listen,resolve";

     From the "Permission:" dropdown select:

        SocketPermission

     In the "Target Name:" textbox type:

        *

     In the "Actions:" dropdown type:

        listen,resolve

     Click "Ok"

6.)  permission "java.lang.reflect.ReflectPermission" "suppressAccessChecks";

     From the "Permission:" dropdown select:

        ReflectPermission

     From the "Target Name:" dropdown select:

        suppressAccessChecks

     Click "Ok"

At the end of the process, your policy tool should look similar to this:

Policy Tool