Skip to content

Commit 584c615

Browse files
0xLuccaeshaben
andauthored
Apply suggestions from code review
Co-authored-by: Erin Shaben <[email protected]>
1 parent 0e08db2 commit 584c615

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

develop/parachains/deployment/generate-chain-specs.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -128,11 +128,11 @@ The raw chain specification can be used to initialize the genesis storage for a
128128

129129
To securely deploy your parachain, you must generate custom cryptographic keys for your collators (block producers). Each collator requires two distinct sets of keys with different security requirements and operational purposes.
130130

131-
- **Account keys** - serve as the primary identity and financial controller for your collator. These keys are used to interact with the network and manage funds. They should be treated as cold storage and must never exist on the filesystem of the collator node. Secure offline backup is essential
131+
- **Account keys**: Serve as the primary identity and financial controller for your collator. These keys are used to interact with the network and manage funds. They should be treated as cold storage and must never exist on the filesystem of the collator node. Secure offline backup is essential.
132132

133-
- **Session keys** - handle block production operations to identify your node and sign blocks on the network. These keys are stored in the parachain keystore and function as operational "hot wallet" keys. If compromised, an attacker could impersonate your node, potentially resulting in slashing of your funds. To minimize these risks, implement regular session key rotation and treat them with the same caution as hot wallet keys
133+
- **Session keys**: Handle block production operations to identify your node and sign blocks on the network. These keys are stored in the parachain keystore and function as operational "hot wallet" keys. If compromised, an attacker could impersonate your node, potentially resulting in slashing of your funds. To minimize these risks, implement regular session key rotation and treat them with the same caution as hot wallet keys.
134134

135-
To perform this step, you can use [subkey](https://docs.rs/crate/subkey/latest){target=\_blank}, a command-line tool for generating and managing keys:
135+
To perform this step, you can use [Subkey](https://docs.rs/crate/subkey/latest){target=\_blank}, a command-line tool for generating and managing keys:
136136

137137
```bash
138138
docker run -it parity/subkey:latest generate --scheme sr25519
@@ -154,11 +154,11 @@ In the `collatorSelection.invulnerables` array, add the SS58 addresses (account
154154
--8<-- 'code/develop/parachains/deployment/generate-chain-specs/invulnerables.json:2:10'
155155
```
156156

157-
- **candidacyBond**: Minimum stake required for collator candidates (in planck units)
157+
- **`candidacyBond`**: Minimum stake required for collator candidates (in Planck units).
158158

159-
- **desiredCandidates**: Number of candidates beyond invulnerables (set to 0 for invulnerables-only)
159+
- **`desiredCandidates`**: Number of candidates beyond invulnerables (set to 0 for invulnerables-only).
160160

161-
- **invulnerables**: Use the SS58 addresses from your generated account keys as collators
161+
- **`invulnerables`**: Use the SS58 addresses from your generated account keys as collators.
162162

163163
### Add Session Keys
164164

0 commit comments

Comments
 (0)