Skip to content

Commit

Permalink
Merge branch 'main' into empty-input
Browse files Browse the repository at this point in the history
  • Loading branch information
davidkyle authored Dec 12, 2024
2 parents 71c1012 + c30ba12 commit 2a98904
Show file tree
Hide file tree
Showing 229 changed files with 6,994 additions and 3,210 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ public void setup() throws IOException {
);
includesSet = Set.of(fetchContext.includes());
excludesSet = Set.of(fetchContext.excludes());
parserConfig = XContentParserConfiguration.EMPTY.withFiltering(includesSet, excludesSet, false);
parserConfig = XContentParserConfiguration.EMPTY.withFiltering(null, includesSet, excludesSet, false);
}

private BytesReference read300BytesExample() throws IOException {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ private XContentParserConfiguration buildParseConfig(boolean matchDotsInFieldNam
includes = null;
excludes = filters;
}
return XContentParserConfiguration.EMPTY.withFiltering(includes, excludes, matchDotsInFieldNames);
return XContentParserConfiguration.EMPTY.withFiltering(null, includes, excludes, matchDotsInFieldNames);
}

private BytesReference filter(XContentParserConfiguration contentParserConfiguration) throws IOException {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -252,6 +252,20 @@ private List<Version> getReleased() {
.toList();
}

public List<Version> getReadOnlyIndexCompatible() {
// Lucene can read indices in version N-2
int compatibleMajor = currentVersion.getMajor() - 2;
return versions.stream().filter(v -> v.getMajor() == compatibleMajor).sorted(Comparator.naturalOrder()).toList();
}

public void withLatestReadOnlyIndexCompatible(Consumer<Version> versionAction) {
var compatibleVersions = getReadOnlyIndexCompatible();
if (compatibleVersions == null || compatibleVersions.isEmpty()) {
throw new IllegalStateException("No read-only compatible version found.");
}
versionAction.accept(compatibleVersions.getLast());
}

/**
* Return versions of Elasticsearch which are index compatible with the current version.
*/
Expand Down
5 changes: 5 additions & 0 deletions docs/changelog/113827.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 113827
summary: Add Optional Source Filtering to Source Loaders
area: Mapping
type: enhancement
issues: []
17 changes: 17 additions & 0 deletions docs/changelog/117583.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
pr: 117583
summary: Removing index alias creation for deprecated transforms notification index
area: Machine Learning
type: deprecation
issues: []
deprecation:
title: Removing index alias creation for deprecated transforms notification index
area: Transform
details: >-
As part of the migration from 7.x to 8.x, the `.data-frame-notifications-1` index
was deprecated and replaced with the `.transform-notifications-000002` index.
The index is no longer created by default, all writes are directed to the new index,
and any clusters with the deprecated index will have an alias created to ensure that
reads are still retrieving data that was written to the index before the migration to 8.x.
This change removes the alias from the deprecated index in 9.x. Any clusters with the alias present
will retain it, but it will not be created on new clusters.
impact: No known end user impact.
5 changes: 5 additions & 0 deletions docs/changelog/117939.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 117939
summary: Adding default endpoint for Elastic Rerank
area: Machine Learning
type: enhancement
issues: []
11 changes: 11 additions & 0 deletions docs/changelog/118103.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
pr: 118103
summary: "Remove any references to org.elasticsearch.core.RestApiVersion#V_7"
area: Infra/Core
type: breaking
issues: []
breaking:
title: "Remove any references to org.elasticsearch.core.RestApiVersion#V_7"
area: REST API
details: "This PR removes all references to V_7 in the Rest API. V7 features marked for deprecation have been removed."
impact: "This change is breaking for any external plugins/clients that rely on the V_7 enum or deprecated version 7 functionality"
notable: false
5 changes: 5 additions & 0 deletions docs/changelog/118375.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 118375
summary: Check for presence of error object when validating streaming responses from integrations in the inference API
area: Machine Learning
type: enhancement
issues: []
5 changes: 5 additions & 0 deletions docs/changelog/118380.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 118380
summary: Restore original "is within leaf" value in `SparseVectorFieldMapper`
area: Mapping
type: bug
issues: []
6 changes: 6 additions & 0 deletions docs/changelog/118435.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
pr: 118435
summary: '`_score` should not be a reserved attribute in ES|QL'
area: ES|QL
type: enhancement
issues:
- 118460
28 changes: 20 additions & 8 deletions docs/reference/connector/docs/connectors-salesforce.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,7 @@ Once the permissions are set, assign the Profiles, Permission Set or Permission
Follow these steps in Salesforce:
1. Navigate to `Administration` under the `Users` section.
2. Select `Users` and choose the user to set the permissions to.
2. Select `Users` and choose the user to set the permissions to.
3. Set the `Profile`, `Permission Set` or `Permission Set Groups` created in the earlier steps.
[discrete#es-connectors-salesforce-sync-rules]
Expand Down Expand Up @@ -249,7 +249,7 @@ Allowed values are *SOQL* and *SOSL*.
[
{
"query": "FIND {Salesforce} IN ALL FIELDS",
"language": "SOSL"
"language": "SOSL"
}
]
----
Expand Down Expand Up @@ -381,7 +381,13 @@ See <<es-connectors-content-extraction,content extraction>> for more specifics o
[discrete#es-connectors-salesforce-known-issues]
===== Known issues
There are currently no known issues for this connector.
* *DLS feature is "type-level" not "document-level"*
+
Salesforce DLS, added in 8.13.0, does not accomodate specific access controls to specific Salesforce Objects.
Instead, if a given user/group can have access to _any_ Objects of a given type (`Case`, `Lead`, `Opportunity`, etc), that user/group will appear in the `\_allow_access_control` list for _all_ of the Objects of that type.
See https://github.com/elastic/connectors/issues/3028 for more details.
+
Refer to <<es-connectors-known-issues,connector known issues>> for a list of known issues for all connectors.
[discrete#es-connectors-salesforce-security]
Expand All @@ -396,7 +402,7 @@ This connector is built with the {connectors-python}[Elastic connector framework
View the {connectors-python}/connectors/sources/salesforce.py[source code for this connector^] (branch _{connectors-branch}_, compatible with Elastic _{minor-version}_).
// Closing the collapsible section
// Closing the collapsible section
===============


Expand Down Expand Up @@ -598,7 +604,7 @@ Once the permissions are set, assign the Profiles, Permission Set or Permission
Follow these steps in Salesforce:
1. Navigate to `Administration` under the `Users` section.
2. Select `Users` and choose the user to set the permissions to.
2. Select `Users` and choose the user to set the permissions to.
3. Set the `Profile`, `Permission Set` or `Permission Set Groups` created in the earlier steps.
[discrete#es-connectors-salesforce-client-sync-rules]
Expand Down Expand Up @@ -648,7 +654,7 @@ Allowed values are *SOQL* and *SOSL*.
[
{
"query": "FIND {Salesforce} IN ALL FIELDS",
"language": "SOSL"
"language": "SOSL"
}
]
----
Expand Down Expand Up @@ -781,7 +787,13 @@ See <<es-connectors-content-extraction,content extraction>> for more specifics o
[discrete#es-connectors-salesforce-client-known-issues]
===== Known issues
There are currently no known issues for this connector.
* *DLS feature is "type-level" not "document-level"*
+
Salesforce DLS, added in 8.13.0, does not accomodate specific access controls to specific Salesforce Objects.
Instead, if a given user/group can have access to _any_ Objects of a given type (`Case`, `Lead`, `Opportunity`, etc), that user/group will appear in the `\_allow_access_control` list for _all_ of the Objects of that type.
See https://github.com/elastic/connectors/issues/3028 for more details.
+
Refer to <<es-connectors-known-issues,connector known issues>> for a list of known issues for all connectors.
[discrete#es-connectors-salesforce-client-security]
Expand All @@ -797,5 +809,5 @@ This connector is built with the {connectors-python}[Elastic connector framework
View the {connectors-python}/connectors/sources/salesforce.py[source code for this connector^] (branch _{connectors-branch}_, compatible with Elastic _{minor-version}_).
// Closing the collapsible section
// Closing the collapsible section
===============
Loading

0 comments on commit 2a98904

Please sign in to comment.