Skip to content

Commit d9d64f9

Browse files
committed
Merge remote-tracking branch 'es/main' into runtime_fields_synthetic_source
2 parents b7d0d0a + 1ff6608 commit d9d64f9

File tree

74 files changed

+1908
-228
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

74 files changed

+1908
-228
lines changed

docs/changelog/132967.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 132967
2+
summary: ES-11331 streams params restriction
3+
area: Data streams
4+
type: enhancement
5+
issues: []

docs/changelog/133848.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 133848
2+
summary: Delay S3 repo warning if default region absent
3+
area: Snapshot/Restore
4+
type: bug
5+
issues: []

docs/changelog/133952.yaml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
pr: 133952
2+
summary: Fix warning when creating an OTel data stream
3+
area: TSDB
4+
type: bug
5+
issues:
6+
- 132918

docs/reference/elasticsearch/elasticsearch-audit-events.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Certain audit events require the `security_config_change` event type to log the
3131
$$$event-access-denied$$$
3232

3333
`access_denied`
34-
: Logged when an authenticated user attempts to execute an action they do not have the necessary [privilege](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/elasticsearch-privileges.md) to perform.
34+
: Logged when an authenticated user attempts to execute an action they do not have the necessary [privilege](/reference/elasticsearch/security-privileges.md) to perform.
3535

3636
::::{dropdown} Example
3737
```js
@@ -510,7 +510,7 @@ $$$event-realm-auth-failed$$$
510510
$$$event-runas-denied$$$
511511

512512
`run_as_denied`
513-
: Logged when an authenticated user attempts to [run as](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/submitting-requests-on-behalf-of-other-users.md) another user that they do not have the necessary [privileges](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/elasticsearch-privileges.md) to do so.
513+
: Logged when an authenticated user attempts to [run as](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/submitting-requests-on-behalf-of-other-users.md) another user that they do not have the necessary [privileges](/reference/elasticsearch/security-privileges.md) to do so.
514514

515515
::::{dropdown} Example
516516
```js

docs/reference/elasticsearch/rest-apis/create-index-from-source.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ For the most up-to-date API details, refer to [Index APIs](https://www.elastic.c
2626

2727
## {{api-prereq-title}} [indices-create-index-from-source-api-prereqs]
2828

29-
* If the {{es}} {{security-features}} are enabled, you must have the `manage` [index privilege](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/elasticsearch-privileges.md#privileges-list-indices) for the index.
29+
* If the {{es}} {{security-features}} are enabled, you must have the `manage` [index privilege](/reference/elasticsearch/security-privileges.md#privileges-list-indices) for the index.
3030

3131

3232
## {{api-description-title}} [indices-create-index-from-source-api-desc]

docs/reference/elasticsearch/rest-apis/reindex-data-stream.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This api runs in the background because reindexing all indices in a large data s
3333

3434
## {{api-prereq-title}} [data-stream-reindex-api-prereqs]
3535

36-
* If the {{es}} {{security-features}} are enabled, you must have the `manage` [index privilege](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/elasticsearch-privileges.md#privileges-list-indices) for the data stream.
36+
* If the {{es}} {{security-features}} are enabled, you must have the `manage` [index privilege](/reference/elasticsearch/security-privileges.md#privileges-list-indices) for the data stream.
3737

3838

3939
## {{api-request-body-title}} [data-stream-reindex-body]

docs/reference/search-connectors/release-notes.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ If you are an Enterprise Search user and want to upgrade to Elastic 9.0, refer t
1313
It includes detailed steps, tooling, and resources to help you transition to supported alternatives in 9.x, such as Elasticsearch, the Open Web Crawler, and self-managed connectors.
1414
:::
1515

16+
## 9.1.3 [connectors-9.1.3-release-notes]
17+
There are no new features, enhancements, fixes, known issues, or deprecations associated with this release.
18+
1619
## 9.1.2 [connectors-9.1.2-release-notes]
1720
There are no new features, enhancements, fixes, known issues, or deprecations associated with this release.
1821

@@ -29,6 +32,9 @@ Permissions granted to the `Everyone Except External Users` group were previousl
2932
## 9.1.0 [connectors-9.1.0-release-notes]
3033
There are no new features, enhancements, fixes, known issues, or deprecations associated with this release.
3134

35+
## 9.0.6 [connectors-9.0.6-release-notes]
36+
No changes since 9.0.5
37+
3238
## 9.0.5 [connectors-9.0.5-release-notes]
3339

3440
### Fixes [connectors-9.0.5-fixes]

libs/entitlement/bridge/src/main/java/org/elasticsearch/entitlement/bridge/EntitlementChecker.java

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,10 @@ public interface EntitlementChecker {
136136

137137
void check$java_net_URLClassLoader$(Class<?> callerClass, String name, URL[] urls, ClassLoader parent, URLStreamHandlerFactory factory);
138138

139+
void check$java_net_URLClassLoader$$newInstance(Class<?> callerClass, URL[] urls, ClassLoader parent);
140+
141+
void check$java_net_URLClassLoader$$newInstance(Class<?> callerClass, URL[] urls);
142+
139143
void check$java_security_SecureClassLoader$(Class<?> callerClass);
140144

141145
void check$java_security_SecureClassLoader$(Class<?> callerClass, ClassLoader parent);

libs/entitlement/qa/entitlement-test-plugin/src/main/java/org/elasticsearch/entitlement/qa/test/JvmActions.java

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,20 @@ static void createClassLoader() throws IOException {
7272
}
7373
}
7474

75+
@EntitlementTest(expectedAccess = PLUGINS)
76+
static void createClassLoaderNewInstance1() throws IOException {
77+
try (var classLoader = URLClassLoader.newInstance(new URL[0])) {
78+
// intentionally empty, just let the loader close
79+
}
80+
}
81+
82+
@EntitlementTest(expectedAccess = PLUGINS)
83+
static void createClassLoaderNewInstance2() throws IOException {
84+
try (var classLoader = URLClassLoader.newInstance(new URL[0], RestEntitlementsCheckAction.class.getClassLoader())) {
85+
// intentionally empty, just let the loader close
86+
}
87+
}
88+
7589
@EntitlementTest(expectedAccess = ALWAYS_DENIED)
7690
static void createLogManager() {
7791
new java.util.logging.LogManager() {

libs/entitlement/src/main/java/org/elasticsearch/entitlement/runtime/policy/ElasticsearchEntitlementChecker.java

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,16 @@ public ElasticsearchEntitlementChecker(PolicyChecker policyChecker) {
194194
policyChecker.checkCreateClassLoader(callerClass);
195195
}
196196

197+
@Override
198+
public void check$java_net_URLClassLoader$$newInstance(Class<?> callerClass, URL[] urls) {
199+
policyChecker.checkCreateClassLoader(callerClass);
200+
}
201+
202+
@Override
203+
public void check$java_net_URLClassLoader$$newInstance(Class<?> callerClass, URL[] urls, ClassLoader parent) {
204+
policyChecker.checkCreateClassLoader(callerClass);
205+
}
206+
197207
@Override
198208
public void check$java_security_SecureClassLoader$(Class<?> callerClass) {
199209
policyChecker.checkCreateClassLoader(callerClass);

0 commit comments

Comments
 (0)