Apache Tika 1.3 is now available. See the CHANGES.txt file for more information on the list of updates in this initial release.
- apache-tika-1.3-src.zip (source archive, PGP signature)
- tika-app-1.3.jar (runnable jar, PGP signature)
Apache Tika releases are available under the Apache License, Version 2.0. See the NOTICE.txt file contained in each release artifact for applicable copyright attribution notices.
If you are looking for previous releases of Apache Tika, have a look in the archives.
If you are looking for releases of Apache Tika from the Apache Lucene project (pre-0.8 releases), have a look in the lucene archives. If you are looking for releases of ApacheTika from the Apache Incubator (pre-0.2 releases), have a look in the incubator archives.
Apache Tika includes cryptographic software. The country in which you currently reside may have restrictions on the import, possession, use, and/or re-export to another country, of encryption software. BEFORE using any encryption software, please check your country's laws, regulations and policies concerning the import, possession, or use, and re-export of encryption software, to see if this is permitted. See <http://www.wassenaar.org/> for more information.
The U.S. Government Department of Commerce, Bureau of Industry and Security (BIS), has classified this software as Export Commodity Control Number (ECCN) 5D002.C.1, which includes information security software using or performing cryptographic functions with asymmetric algorithms. The form and manner of this Apache Software Foundation distribution makes it eligible for export under the License Exception ENC Technology Software Unrestricted (TSU) exception (see the BIS Export Administration Regulations, Section 740.13) for both object code and source code.
The following provides more details on the included cryptographic software:
- Apache Tika uses the Bouncy Castle generic encryption libraries for extracting text content and metadata from encrypted PDF files. See http://www.bouncycastle.org/ for more details on Bouncy Castle.
It is essential that you verify the integrity of the downloaded files using the PGP signatures. Please read Verifying Apache HTTP Server Releases for more information on why you should verify our releases.
The PGP signatures can be verified using PGP or GPG. First download the KEYS file as well as the .asc signature files for the relevant release packages. Make sure you get these files from the main distribution directory, rather than from a mirror. Then verify the signatures using
% pgpk -a KEYS % pgpv apache-tika-X.Y.Z.tar.gz.asc
% pgp -ka KEYS % pgp apache-tika-X.Y.Z.tar.gz.asc
% gpg --import KEYS % gpg --verify apache-tika-X.Y.Z.tar.gz.asc