From afb409d7d0993b9bfdb725e8eae91d6d727e151f Mon Sep 17 00:00:00 2001 From: Yngve Svendsen Date: Sat, 21 Mar 2015 08:37:48 -0400 Subject: [PATCH] Tweak description of MYSQL_ALLOW_EMPTY_PASSWORD --- mysql/README.md | 2 +- mysql/content.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/mysql/README.md b/mysql/README.md index 8d3249c4f..462166c9a 100644 --- a/mysql/README.md +++ b/mysql/README.md @@ -88,7 +88,7 @@ Do note that there is no need to use this mechanism to create the root superuser ### `MYSQL_ALLOW_EMPTY_PASSWORD` -Set to `yes` to allow the container to be started with a blank password for the root user. *NOTE*: Setting this variable to `yes` is not recommended unless you really know what you are doing, since this will leave your MySQL instance completely unprotected, allowing anyone to gain complete superuser access. +This is an optional variable. Set to `yes` to allow the container to be started with a blank password for the root user. *NOTE*: Setting this variable to `yes` is not recommended unless you really know what you are doing, since this will leave your MySQL instance completely unprotected, allowing anyone to gain complete superuser access. # Caveats diff --git a/mysql/content.md b/mysql/content.md index 81f41a929..791c3d3c6 100644 --- a/mysql/content.md +++ b/mysql/content.md @@ -80,7 +80,7 @@ Do note that there is no need to use this mechanism to create the root superuser ### `MYSQL_ALLOW_EMPTY_PASSWORD` -Set to `yes` to allow the container to be started with a blank password for the root user. *NOTE*: Setting this variable to `yes` is not recommended unless you really know what you are doing, since this will leave your MySQL instance completely unprotected, allowing anyone to gain complete superuser access. +This is an optional variable. Set to `yes` to allow the container to be started with a blank password for the root user. *NOTE*: Setting this variable to `yes` is not recommended unless you really know what you are doing, since this will leave your MySQL instance completely unprotected, allowing anyone to gain complete superuser access. # Caveats