swarm: remove incorrect statement about revoking secret access

Closes #18990

Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
This commit is contained in:
David Karlsson 2024-01-04 10:12:14 +01:00
parent 0386831b6e
commit 49514473f1
1 changed files with 1 additions and 6 deletions

View File

@ -748,11 +748,6 @@ line.
wvnh0siktqr3 mysql replicated 1/1 mysql:latest
```
At this point, you could actually revoke the `mysql` service's access to the
`mysql_password` and `mysql_root_password` secrets because the passwords
have been saved in the MySQL system database. Don't do that for now, because
we use them later to facilitate rotating the MySQL password.
5. Now that MySQL is set up, create a WordPress service that connects to the
MySQL service. The WordPress service has the following characteristics:
@ -1041,4 +1036,4 @@ Each service uses environment variables to specify where the service should look
for that secret data.
More information on short and long syntax for secrets can be found in the
[Compose Specification](../../compose/compose-file/09-secrets.md).
[Compose Specification](../../compose/compose-file/09-secrets.md).