Skip to content

Commit f626974

Browse files
authored
Merge branch 'main' into esql-delete-spec
2 parents f33e19c + a268dee commit f626974

File tree

77 files changed

+1941
-449
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+1941
-449
lines changed

docs/changelog/119054.yaml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
pr: 119054
2+
summary: "[Security Solution] allows `kibana_system` user to manage .reindexed-v8-*\
3+
\ Security Solution indices"
4+
area: Authorization
5+
type: enhancement
6+
issues: []

docs/changelog/119233.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 119233
2+
summary: Fixing `GetDatabaseConfigurationAction` response serialization
3+
area: Ingest Node
4+
type: bug
5+
issues: []

docs/changelog/119474.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 119474
2+
summary: "Add ES|QL cross-cluster query telemetry collection"
3+
area: ES|QL
4+
type: enhancement
5+
issues: []

docs/changelog/119495.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 119495
2+
summary: Add mapping for `event_name` for OTel logs
3+
area: Data streams
4+
type: enhancement
5+
issues: []

docs/reference/cluster/stats.asciidoc

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@ Returns cluster statistics.
2525

2626
* If the {es} {security-features} are enabled, you must have the `monitor` or
2727
`manage` <<privileges-list-cluster,cluster privilege>> to use this API.
28-
2928
[[cluster-stats-api-desc]]
3029
==== {api-description-title}
3130

@@ -1397,7 +1396,7 @@ as a human-readable string.
13971396
13981397
13991398
`_search`:::
1400-
(object) Contains the information about the <<modules-cross-cluster-search, {ccs}>> usage in the cluster.
1399+
(object) Contains information about <<modules-cross-cluster-search, {ccs}>> usage.
14011400
+
14021401
.Properties of `_search`
14031402
[%collapsible%open]
@@ -1528,7 +1527,11 @@ This may include requests where partial results were returned, but not requests
15281527
15291528
=======
15301529

1530+
15311531
======
1532+
`_esql`:::
1533+
(object) Contains information about <<esql-cross-clusters,{esql} {ccs}>> usage.
1534+
The structure of the object is the same as the `_search` object above.
15321535
15331536
=====
15341537

docs/reference/indices/index-templates.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ applying the templates, do one or more of the following:
6161
6262
- Use a non-overlapping index pattern.
6363
64-
- Assign templates with an overlapping pattern a `priority` higher than `200`.
64+
- Assign templates with an overlapping pattern a `priority` higher than `500`.
6565
For example, if you don't use {fleet} or {agent} and want to create a template
6666
for the `logs-*` index pattern, assign your template a priority of `500`. This
6767
ensures your template is applied instead of the built-in template for

docs/reference/inference/service-elasticsearch.asciidoc

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,11 @@ For the most up-to-date API details, refer to {api-es}/group/endpoint-inference[
99

1010
Creates an {infer} endpoint to perform an {infer} task with the `elasticsearch` service.
1111

12-
NOTE: If you use the ELSER or the E5 model through the `elasticsearch` service, the API request will automatically download and deploy the model if it isn't downloaded yet.
13-
12+
[NOTE]
13+
====
14+
* Your {es} deployment contains <<default-enpoints,preconfigured ELSER and E5 {infer} endpoints>>, you only need to create the enpoints using the API if you want to customize the settings.
15+
* If you use the ELSER or the E5 model through the `elasticsearch` service, the API request will automatically download and deploy the model if it isn't downloaded yet.
16+
====
1417

1518
[discrete]
1619
[[infer-service-elasticsearch-api-request]]

docs/reference/inference/service-elser.asciidoc

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,17 @@ For the most up-to-date API details, refer to {api-es}/group/endpoint-inference[
1010
Creates an {infer} endpoint to perform an {infer} task with the `elser` service.
1111
You can also deploy ELSER by using the <<infer-service-elasticsearch>>.
1212

13-
NOTE: The API request will automatically download and deploy the ELSER model if
14-
it isn't already downloaded.
13+
[NOTE]
14+
====
15+
* Your {es} deployment contains <<default-enpoints,a preconfigured ELSER {infer} endpoint>>, you only need to create the enpoint using the API if you want to customize the settings.
16+
* The API request will automatically download and deploy the ELSER model if it isn't already downloaded.
17+
====
1518

1619
[WARNING]
1720
.Deprecated in 8.16
1821
====
19-
The elser service is deprecated and will be removed in a future release.
20-
Use the <<infer-service-elasticsearch>> instead, with model_id included in the service_settings.
22+
The `elser` service is deprecated and will be removed in a future release.
23+
Use the <<infer-service-elasticsearch>> instead, with `model_id` included in the `service_settings`.
2124
====
2225

2326
[discrete]

libs/entitlement/bridge/src/main/java/org/elasticsearch/entitlement/bridge/EntitlementChecker.java

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,20 @@ public interface EntitlementChecker {
2626

2727
void check$java_lang_Runtime$halt(Class<?> callerClass, Runtime runtime, int status);
2828

29+
// ClassLoader ctor
30+
void check$java_lang_ClassLoader$(Class<?> callerClass);
31+
32+
void check$java_lang_ClassLoader$(Class<?> callerClass, ClassLoader parent);
33+
34+
void check$java_lang_ClassLoader$(Class<?> callerClass, String name, ClassLoader parent);
35+
36+
// SecureClassLoader ctor
37+
void check$java_security_SecureClassLoader$(Class<?> callerClass);
38+
39+
void check$java_security_SecureClassLoader$(Class<?> callerClass, ClassLoader parent);
40+
41+
void check$java_security_SecureClassLoader$(Class<?> callerClass, String name, ClassLoader parent);
42+
2943
// URLClassLoader constructors
3044
void check$java_net_URLClassLoader$(Class<?> callerClass, URL[] urls);
3145

libs/entitlement/src/main/java/org/elasticsearch/entitlement/initialization/EntitlementInitialization.java

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
import org.elasticsearch.entitlement.instrumentation.Transformer;
2121
import org.elasticsearch.entitlement.runtime.api.ElasticsearchEntitlementChecker;
2222
import org.elasticsearch.entitlement.runtime.policy.CreateClassLoaderEntitlement;
23+
import org.elasticsearch.entitlement.runtime.policy.Entitlement;
2324
import org.elasticsearch.entitlement.runtime.policy.ExitVMEntitlement;
2425
import org.elasticsearch.entitlement.runtime.policy.Policy;
2526
import org.elasticsearch.entitlement.runtime.policy.PolicyManager;
@@ -93,9 +94,17 @@ private static PolicyManager createPolicyManager() throws IOException {
9394
// TODO(ES-10031): Decide what goes in the elasticsearch default policy and extend it
9495
var serverPolicy = new Policy(
9596
"server",
96-
List.of(new Scope("org.elasticsearch.server", List.of(new ExitVMEntitlement(), new CreateClassLoaderEntitlement())))
97+
List.of(
98+
new Scope("org.elasticsearch.base", List.of(new CreateClassLoaderEntitlement())),
99+
new Scope("org.elasticsearch.xcontent", List.of(new CreateClassLoaderEntitlement())),
100+
new Scope("org.elasticsearch.server", List.of(new ExitVMEntitlement(), new CreateClassLoaderEntitlement()))
101+
)
97102
);
98-
return new PolicyManager(serverPolicy, pluginPolicies, EntitlementBootstrap.bootstrapArgs().pluginResolver(), ENTITLEMENTS_MODULE);
103+
// agents run without a module, so this is a special hack for the apm agent
104+
// this should be removed once https://github.com/elastic/elasticsearch/issues/109335 is completed
105+
List<Entitlement> agentEntitlements = List.of(new CreateClassLoaderEntitlement());
106+
var resolver = EntitlementBootstrap.bootstrapArgs().pluginResolver();
107+
return new PolicyManager(serverPolicy, agentEntitlements, pluginPolicies, resolver, ENTITLEMENTS_MODULE);
99108
}
100109

101110
private static Map<String, Policy> createPluginPolicies(Collection<EntitlementBootstrap.PluginData> pluginData) throws IOException {
@@ -120,12 +129,12 @@ private static Policy loadPluginPolicy(Path pluginRoot, boolean isModular, Strin
120129

121130
// TODO: should this check actually be part of the parser?
122131
for (Scope scope : policy.scopes) {
123-
if (moduleNames.contains(scope.name) == false) {
132+
if (moduleNames.contains(scope.moduleName) == false) {
124133
throw new IllegalStateException(
125134
Strings.format(
126135
"Invalid module name in policy: plugin [%s] does not have module [%s]; available modules [%s]; policy file [%s]",
127136
pluginName,
128-
scope.name,
137+
scope.moduleName,
129138
String.join(", ", moduleNames),
130139
policyFile
131140
)

0 commit comments

Comments
 (0)