[ https://issues.apache.org/jira/browse/ZOOKEEPER-2779?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16033072#comment-16033072 ]
Jordan Zimmerman commented on ZOOKEEPER-2779: --------------------------------------------- [~fpj] I'm OK with either. But, this works best for us - essentially restoring the old behavior. The hack - from my view - is requiring that your entire ZooKeeper ensemble be open to a root-style single password (that is discoverable via a simple {{ps ax | grep java}} in order to use the reconfig() APIs. > Add option to not set ACL for reconfig node > ------------------------------------------- > > Key: ZOOKEEPER-2779 > URL: https://issues.apache.org/jira/browse/ZOOKEEPER-2779 > Project: ZooKeeper > Issue Type: Improvement > Components: server > Affects Versions: 3.5.3 > Reporter: Jordan Zimmerman > Assignee: Jordan Zimmerman > Fix For: 3.5.4, 3.6.0 > > > ZOOKEEPER-2014 changed the behavior of the /zookeeper/config node by setting > the ACL to {{ZooDefs.Ids.READ_ACL_UNSAFE}}. This change makes it very > cumbersome to use the reconfig APIs. It also, perversely, makes security > worse as the entire ZooKeeper instance must be opened to "super" user while > enabled reconfig (per {{ReconfigExceptionTest.java}}). Provide a mechanism > for savvy users to disable this ACL so that an application-specific custom > ACL can be set. -- This message was sent by Atlassian JIRA (v6.3.15#6346)