Skip to content

Commit 7451ea2

Browse files
committed
Merge remote-tracking branch 'origin/main' into bugfix/synonyms-index-searchable-refresh
2 parents fcf5f5a + f9d813a commit 7451ea2

File tree

59 files changed

+2106
-996
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+2106
-996
lines changed

build-tools-internal/version.properties

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
elasticsearch = 9.1.0
2-
lucene = 10.2.0
2+
lucene = 10.2.1-snapshot-ae6484f43e6
33

44
bundled_jdk_vendor = openjdk
55
bundled_jdk = 24+36@1f9ff9062db4449d8ca828c504ffae90

distribution/tools/keystore-cli/src/test/java/org/elasticsearch/cli/keystore/AddStringKeyStoreCommandTests.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ public void testStdinInputWithCarriageReturn() throws Exception {
193193
String password = "keystorepassword";
194194
KeyStoreWrapper.create().save(env.configDir(), password.toCharArray());
195195
terminal.addSecretInput(password);
196-
terminal.addSecretInput("Typedthisandhitenter\r");
196+
terminal.addSecretInput("Typedthisandhitenter\r\n");
197197
execute("-x", "foo");
198198
assertSecureString("foo", "Typedthisandhitenter", password);
199199
}

docs/Versions.asciidoc

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11

22
include::{docs-root}/shared/versions/stack/{source_branch}.asciidoc[]
33

4-
:lucene_version: 10.2.0
5-
:lucene_version_path: 10_2_0
4+
:lucene_version: 10.2.1
5+
:lucene_version_path: 10_2_1
66
:jdk: 11.0.2
77
:jdk_major: 11
88
:build_type: tar

docs/changelog/126397.yaml

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
pr: 126397
2+
summary: "ESQL: Preserve single aggregate when all attributes are pruned"
3+
area: ES|QL
4+
type: bug
5+
issues:
6+
- 126392

docs/changelog/126653.yaml

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 126653
2+
summary: Retry shard movements during ESQL query
3+
area: ES|QL
4+
type: enhancement
5+
issues: []

docs/reference/elasticsearch/mapping-reference/mapping-date-format.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Many APIs which support date values also support [date math](/reference/elastics
2727

2828
## Custom date formats [custom-date-formats]
2929

30-
Completely customizable date formats are supported. The syntax for these is explained in [DateTimeFormatter docs](https://docs.oracle.com/en/java/javase/21/docs/api/java.base/java/time/format/DateTimeFormatter.md).
30+
Completely customizable date formats are supported. The syntax for these is explained in [DateTimeFormatter docs](https://docs.oracle.com/en/java/javase/21/docs/api/java.base/java/time/format/DateTimeFormatter.html).
3131

3232
Note that while the built-in formats for week dates use the ISO definition of weekyears, custom formatters using the `Y`, `W`, or `w` field specifiers use the JDK locale definition of weekyears. This can result in different values between the built-in formats and custom formats for week dates.
3333

docs/release-notes/known-issues.md

+20
Original file line numberDiff line numberDiff line change
@@ -7,3 +7,23 @@ mapped_pages:
77
# Elasticsearch known issues [elasticsearch-known-issues]
88
Known issues are significant defects or limitations that may impact your implementation. These issues are actively being worked on and will be addressed in a future release. Review the Elasticsearch known issues to help you make informed decisions, such as upgrading to a new version.
99

10+
## 9.0.0 [elasticsearch-9.0.0-known-issues]
11+
* Elasticsearch on Windows might fail to start, or might forbid some file-related operations, when referencing paths with a case different from the one stored by the filesystem. Windows treats paths as case-insensitive, but the filesystem stores them with case. Entitlements, the new security system used by Elasticsearch, treat all paths as case-sensitive, and can therefore prevent access to a path that should be accessible.
12+
13+
For example: If Elasticsearch is installed in `C:\ELK\elasticsearch`, and you try to launch it as `c:\elk\elasticsearch\bin\elasticsearch.bat`, you will get a `NotEntitledException` while booting. This is because Elasticsearch blocks access to `c:\elk\elasticsearch`, because does not match `C:\ELK\elasticsearch`. \
14+
This issue will be fixed in a future patch release (see [PR #126990](https://github.com/elastic/elasticsearch/pull/126990)).
15+
16+
As a workaround, make sure that all paths you specify have the same casing as the paths stored in the filesystem. Files and directory names should be entered as they appear in Windows Explorer or in a command prompt. This applies to paths specified in the command line, config files, environment variables and secure settings.
17+
18+
* Active Directory authentication is blocked by default. Entitlements, the new security system used by Elasticsearch, has a policy for the `x-pack-core` module that is too restrictive, and does not allow the LDAP library used for AD authentication to perform outbound network connections. This issue will be fixed in a future patch release (see [PR #126992](https://github.com/elastic/elasticsearch/pull/126992)).
19+
20+
As a workaround, you can temporarily patch the policy using a JVM option:
21+
22+
1. Create a file called `${ES_CONF_PATH}/jvm_options/workaround-127061.options`.
23+
2. Add the following line to the new file:
24+
25+
```
26+
-Des.entitlements.policy.x-pack-core=dmVyc2lvbnM6CiAgLSA4LjE4LjAKICAtIDkuMC4wCnBvbGljeToKICB1bmJvdW5kaWQubGRhcHNkazoKICAgIC0gc2V0X2h0dHBzX2Nvbm5lY3Rpb25fcHJvcGVydGllcwogICAgLSBvdXRib3VuZF9uZXR3b3Jr
27+
```
28+
29+
For information about editing your JVM settings, refer to [JVM settings](https://www.elastic.co/docs/reference/elasticsearch/jvm-settings).

0 commit comments

Comments
 (0)