Downloads:

4,861

Downloads of v 4.0.5:

251

Last Update:

23 Jul 2018

Package Maintainer(s):

Software Author(s):

  • Hibernating Rhinos

Tags:

ravendb4 nosql document database raven ravendb

RavenDB

This is not the latest version of RavenDB available.

4.0.5 | Updated: 23 Jul 2018

Downloads:

4,861

Downloads of v 4.0.5:

251

Software Author(s):

  • Hibernating Rhinos

RavenDB 4.0.5

This is not the latest version of RavenDB available.

All Checks are Passing

2 Passing Test


Validation Testing Passed


Verification Testing Passed

Details

To install RavenDB, run the following command from the command line or from PowerShell:

>

To upgrade RavenDB, run the following command from the command line or from PowerShell:

>

To uninstall RavenDB, run the following command from the command line or from PowerShell:

>

NOTE: This applies to both open source and commercial editions of Chocolatey.

1. Ensure you are set for organizational deployment

Please see the organizational deployment guide

  • Open Source or Commercial:
    • Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://chocolatey.org/api/v2. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
    • You can also just download the package and push it to a repository Download

3. Enter your internal repository url

(this should look similar to https://chocolatey.org/api/v2)

4. Choose your deployment method:


choco upgrade ravendb -y --source="'STEP 3 URL'" [other options]

See options you can pass to upgrade.

See best practices for scripting.

Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.

If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:


choco upgrade ravendb -y --source="'STEP 3 URL'"
$exitCode = $LASTEXITCODE

Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
  Exit 0
}

Exit $exitCode

- name: Ensure ravendb installed
  win_chocolatey:
    name: ravendb
    state: present
    version: 4.0.5
    source: STEP 3 URL

See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.

Coming early 2020! Central Managment Reporting available now! More information...


chocolatey_package 'ravendb' do
  action    :install
  version  '4.0.5'
  source   'STEP 3 URL'
end

See docs at https://docs.chef.io/resource_chocolatey_package.html.


Chocolatey::Ensure-Package
(
    Name: ravendb,
    Version: 4.0.5,
    Source: STEP 3 URL
);

Requires Otter Chocolatey Extension. See docs at https://inedo.com/den/otter/chocolatey.


cChocoPackageInstaller ravendb
{
   Name     = 'ravendb'
   Ensure   = 'Present'
   Version  = '4.0.5'
   Source   = 'STEP 3 URL'
}

Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.


package { 'ravendb':
  provider => 'chocolatey',
  ensure   => '4.0.5',
  source   => 'STEP 3 URL',
}

Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.


salt '*' chocolatey.install ravendb version="4.0.5" source="STEP 3 URL"

See docs at https://docs.saltstack.com/en/latest/ref/modules/all/salt.modules.chocolatey.html.

5. If applicable - Chocolatey configuration/installation

See infrastructure management matrix for Chocolatey configuration elements and examples.

This package was approved by moderator gep13 on 24 Jul 2018.

Description

A NoSQL Document Database that has been Fully Transactional for Over a Decade


tools\chocolateyinstall.ps1

$ErrorActionPreference = 'Stop'; # stop on all errors
$toolsDir   = "$(Split-Path -parent $MyInvocation.MyCommand.Definition)"
$url        = 'https://hibernatingrhinos.com/downloads/RavenDB%20for%20Windows%20x86/40045' # download url, HTTPS preferred
$url64      = 'https://hibernatingrhinos.com/downloads/RavenDB%20for%20Windows%20x64/40045' # 64bit URL here (HTTPS preferred) or remove - if installer contains both (very rare), use $url
$pp = Get-PackageParameters
$unZipDir = Get-ToolsLocation
if (!$pp['port']) { $pp['port'] = 8080 }
$packageArgs = @{
  packageName   = $env:ChocolateyPackageName
  unzipLocation = $unZipDir
  fileType      = 'EXE_MSI_OR_MSU' #only one of these: exe, msi, msu
  url           = $url
  url64bit      = $url64
  #file         = $fileLocation

  softwareName  = 'RavenDB4' #part or all of the Display Name as you see it in Programs and Features. It should be enough to be unique

  checksum      = '4569BE35E2B40A94F8004A7882A225CE61C566CDB83027D55D9CBC16A34D95D2'
  checksumType  = 'sha256' 
  checksum64    = '8C0E6525B6BB6518056676EAA5539E204DC46CF6BCCE19023E906152B7BF99F6'
  checksumType64= 'sha256' 
}


Install-ChocolateyZipPackage @packageArgs 

function CheckPortIsClosed($port) {
    $result = Test-NetConnection -Port $port -ComputerName 127.0.0.1 -InformationLevel Quiet 3> $null
    return $result -eq $false
}

function SetAclOnServerDirectory($dir) {
    $acl = Get-Acl $dir
    $permissions = "LocalService", "FullControl", "ContainerInherit, ObjectInherit", "None", "Allow"
    $rule = New-Object -TypeName System.Security.AccessControl.FileSystemAccessRule -ArgumentList $permissions
    $acl.SetAccessRuleProtection($False, $False)
    $acl.AddAccessRule($rule)
    Set-Acl -Path $dir -AclObject $acl
}

$scriptDirectory = $unZipDir;
$settingsTemplateJson = "settings.default.json";
$settingsJson = "settings.json";
$rvn = "rvn.exe";
$serverDir = Join-Path $scriptDirectory "Server"

SetAclOnServerDirectory $(Join-Path -Path $scriptDirectory -ChildPath "Server")

$settingsJsonPath = Join-Path $serverDir $settingsJson
$settingsTemplateJsonPath = Join-Path $serverDir $settingsTemplateJson;

$name = 'RavenDB'
 
$isAlreadyConfigured = Test-Path $settingsJsonPath

if ($isAlreadyConfigured) {
    write-host "Server was run before - attempt to use existing configuration."
    $serverUrl = $(Get-Content $settingsJsonPath -raw | ConvertFrom-Json).ServerUrl
} else {
    write-host "Server run for the first time."
	write-host "Installing on port $($pp['port'])"
	$port = $pp['port']

    if ($port -lt 0 -Or $port -gt 65535) {
        throw "Error. Port must be in the range 0-65535."
    }

    if ((CheckPortIsClosed $port) -eq $false) {
        throw "Port $port is not available.";
    }

    $json = Get-Content $settingsTemplateJsonPath -raw | ConvertFrom-Json
    $serverUrl = $json.ServerUrl = "http://127.0.0.1:$port"
    $json | ConvertTo-Json  | Set-Content $settingsTemplateJsonPath
}

Push-Location $serverDir;

Try
{
    Invoke-Expression -Command ".\$rvn windows-service register --service-name $name";
    Start-Service -Name $name
}
catch
{
    write-error $_.Exception
	throw $_.Exception
}
finally
{
    Pop-Location;
}

Write-Host "Service started, server listening on $serverUrl."
Write-Host "You can now finish setting up the RavenDB service in the browser."

Start-Sleep -Seconds 3
Start-Process $serverUrl 
tools\chocolateyuninstall.ps1
$unZipDir = Get-ToolsLocation
$scriptDirectory = $unZipDir;
$rvn = "rvn.exe";
$serverDir = Join-Path $scriptDirectory "Server"
$name = 'RavenDB'
 
Push-Location $serverDir;

Try
{
    Invoke-Expression -Command ".\$rvn windows-service unregister --service-name $name";
    Start-Service -Name $name
}
catch
{
    write-error $_.Exception
	throw $_.Exception
}
finally
{
    Pop-Location;
}

Log in or click on link to see number of positives.

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Version Downloads Last Updated Status
RavenDB 5.0.0 22 Friday, July 24, 2020 Approved
RavenDB 4.2.105 17 Tuesday, August 18, 2020 Approved
RavenDB 4.2.104 20 Thursday, July 23, 2020 Approved
RavenDB 4.2.103 59 Tuesday, May 26, 2020 Approved
RavenDB 4.2.102 93 Thursday, April 16, 2020 Approved
RavenDB 4.2.101 88 Wednesday, March 4, 2020 Approved
RavenDB 4.2.100 30 Tuesday, March 3, 2020 Approved
RavenDB 4.2.8 78 Wednesday, January 22, 2020 Approved

RavenDB 4.0.5 release


This package has no dependencies.

Discussion for the RavenDB Package

Ground Rules:

  • This discussion is only about RavenDB and the RavenDB package. If you have feedback for Chocolatey, please contact the Google Group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or RavenDB, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
comments powered by Disqus