Skip to content

Commit

Permalink
Merge branch 'main' into kderusso/semantic-text-match-query-support
Browse files Browse the repository at this point in the history
  • Loading branch information
kderusso authored Dec 11, 2024
2 parents f4c26ae + 2c5efd2 commit 5d13449
Show file tree
Hide file tree
Showing 307 changed files with 13,562 additions and 6,717 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ public void setup() throws IOException {
);
includesSet = Set.of(fetchContext.includes());
excludesSet = Set.of(fetchContext.excludes());
parserConfig = XContentParserConfiguration.EMPTY.withFiltering(includesSet, excludesSet, false);
parserConfig = XContentParserConfiguration.EMPTY.withFiltering(null, includesSet, excludesSet, false);
}

private BytesReference read300BytesExample() throws IOException {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ private XContentParserConfiguration buildParseConfig(boolean matchDotsInFieldNam
includes = null;
excludes = filters;
}
return XContentParserConfiguration.EMPTY.withFiltering(includes, excludes, matchDotsInFieldNames);
return XContentParserConfiguration.EMPTY.withFiltering(null, includes, excludes, matchDotsInFieldNames);
}

private BytesReference filter(XContentParserConfiguration contentParserConfiguration) throws IOException {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -252,6 +252,20 @@ private List<Version> getReleased() {
.toList();
}

public List<Version> getReadOnlyIndexCompatible() {
// Lucene can read indices in version N-2
int compatibleMajor = currentVersion.getMajor() - 2;
return versions.stream().filter(v -> v.getMajor() == compatibleMajor).sorted(Comparator.naturalOrder()).toList();
}

public void withLatestReadOnlyIndexCompatible(Consumer<Version> versionAction) {
var compatibleVersions = getReadOnlyIndexCompatible();
if (compatibleVersions == null || compatibleVersions.isEmpty()) {
throw new IllegalStateException("No read-only compatible version found.");
}
versionAction.accept(compatibleVersions.getLast());
}

/**
* Return versions of Elasticsearch which are index compatible with the current version.
*/
Expand Down
5 changes: 5 additions & 0 deletions docs/changelog/113827.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 113827
summary: Add Optional Source Filtering to Source Loaders
area: Mapping
type: enhancement
issues: []
5 changes: 5 additions & 0 deletions docs/changelog/114618.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 114618
summary: Add a new index setting to skip recovery source when synthetic source is enabled
area: Logs
type: enhancement
issues: []
5 changes: 5 additions & 0 deletions docs/changelog/116663.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 116663
summary: KNN vector rescoring for quantized vectors
area: Vector Search
type: feature
issues: []
6 changes: 6 additions & 0 deletions docs/changelog/117469.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
pr: 117469
summary: Handle exceptions in query phase can match
area: Search
type: bug
issues:
- 104994
17 changes: 17 additions & 0 deletions docs/changelog/117583.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
pr: 117583
summary: Removing index alias creation for deprecated transforms notification index
area: Machine Learning
type: deprecation
issues: []
deprecation:
title: Removing index alias creation for deprecated transforms notification index
area: Transform
details: >-
As part of the migration from 7.x to 8.x, the `.data-frame-notifications-1` index
was deprecated and replaced with the `.transform-notifications-000002` index.
The index is no longer created by default, all writes are directed to the new index,
and any clusters with the deprecated index will have an alias created to ensure that
reads are still retrieving data that was written to the index before the migration to 8.x.
This change removes the alias from the deprecated index in 9.x. Any clusters with the alias present
will retain it, but it will not be created on new clusters.
impact: No known end user impact.
5 changes: 5 additions & 0 deletions docs/changelog/117939.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 117939
summary: Adding default endpoint for Elastic Rerank
area: Machine Learning
type: enhancement
issues: []
6 changes: 6 additions & 0 deletions docs/changelog/118370.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
pr: 118370
summary: Fix concurrency issue with `ReinitializingSourceProvider`
area: Mapping
type: bug
issues:
- 118238
5 changes: 5 additions & 0 deletions docs/changelog/118380.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
pr: 118380
summary: Restore original "is within leaf" value in `SparseVectorFieldMapper`
area: Mapping
type: bug
issues: []
2 changes: 1 addition & 1 deletion docs/plugins/analysis-nori.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -475,7 +475,7 @@ The input is untokenized text and the result is the single term attribute emitte
- 영영칠 -> 7
- 일영영영 -> 1000
- 삼천2백2십삼 -> 3223
- 조육백만오천일 -> 1000006005001
- 일조육백만오천일 -> 1000006005001
- 3.2천 -> 3200
- 1.2만345.67 -> 12345.67
- 4,647.100 -> 4647.1
Expand Down
28 changes: 20 additions & 8 deletions docs/reference/connector/docs/connectors-salesforce.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,7 @@ Once the permissions are set, assign the Profiles, Permission Set or Permission
Follow these steps in Salesforce:
1. Navigate to `Administration` under the `Users` section.
2. Select `Users` and choose the user to set the permissions to.
2. Select `Users` and choose the user to set the permissions to.
3. Set the `Profile`, `Permission Set` or `Permission Set Groups` created in the earlier steps.
[discrete#es-connectors-salesforce-sync-rules]
Expand Down Expand Up @@ -249,7 +249,7 @@ Allowed values are *SOQL* and *SOSL*.
[
{
"query": "FIND {Salesforce} IN ALL FIELDS",
"language": "SOSL"
"language": "SOSL"
}
]
----
Expand Down Expand Up @@ -381,7 +381,13 @@ See <<es-connectors-content-extraction,content extraction>> for more specifics o
[discrete#es-connectors-salesforce-known-issues]
===== Known issues
There are currently no known issues for this connector.
* *DLS feature is "type-level" not "document-level"*
+
Salesforce DLS, added in 8.13.0, does not accomodate specific access controls to specific Salesforce Objects.
Instead, if a given user/group can have access to _any_ Objects of a given type (`Case`, `Lead`, `Opportunity`, etc), that user/group will appear in the `\_allow_access_control` list for _all_ of the Objects of that type.
See https://github.com/elastic/connectors/issues/3028 for more details.
+
Refer to <<es-connectors-known-issues,connector known issues>> for a list of known issues for all connectors.
[discrete#es-connectors-salesforce-security]
Expand All @@ -396,7 +402,7 @@ This connector is built with the {connectors-python}[Elastic connector framework
View the {connectors-python}/connectors/sources/salesforce.py[source code for this connector^] (branch _{connectors-branch}_, compatible with Elastic _{minor-version}_).
// Closing the collapsible section
// Closing the collapsible section
===============


Expand Down Expand Up @@ -598,7 +604,7 @@ Once the permissions are set, assign the Profiles, Permission Set or Permission
Follow these steps in Salesforce:
1. Navigate to `Administration` under the `Users` section.
2. Select `Users` and choose the user to set the permissions to.
2. Select `Users` and choose the user to set the permissions to.
3. Set the `Profile`, `Permission Set` or `Permission Set Groups` created in the earlier steps.
[discrete#es-connectors-salesforce-client-sync-rules]
Expand Down Expand Up @@ -648,7 +654,7 @@ Allowed values are *SOQL* and *SOSL*.
[
{
"query": "FIND {Salesforce} IN ALL FIELDS",
"language": "SOSL"
"language": "SOSL"
}
]
----
Expand Down Expand Up @@ -781,7 +787,13 @@ See <<es-connectors-content-extraction,content extraction>> for more specifics o
[discrete#es-connectors-salesforce-client-known-issues]
===== Known issues
There are currently no known issues for this connector.
* *DLS feature is "type-level" not "document-level"*
+
Salesforce DLS, added in 8.13.0, does not accomodate specific access controls to specific Salesforce Objects.
Instead, if a given user/group can have access to _any_ Objects of a given type (`Case`, `Lead`, `Opportunity`, etc), that user/group will appear in the `\_allow_access_control` list for _all_ of the Objects of that type.
See https://github.com/elastic/connectors/issues/3028 for more details.
+
Refer to <<es-connectors-known-issues,connector known issues>> for a list of known issues for all connectors.
[discrete#es-connectors-salesforce-client-security]
Expand All @@ -797,5 +809,5 @@ This connector is built with the {connectors-python}[Elastic connector framework
View the {connectors-python}/connectors/sources/salesforce.py[source code for this connector^] (branch _{connectors-branch}_, compatible with Elastic _{minor-version}_).
// Closing the collapsible section
// Closing the collapsible section
===============
Loading

0 comments on commit 5d13449

Please sign in to comment.