Skip to content

Commit 87c2fd2

Browse files
committed
updated statements
1 parent 3579aee commit 87c2fd2

File tree

1 file changed

+10
-14
lines changed

1 file changed

+10
-14
lines changed

pages/operators/chain-operators/tutorials/migrating-permissionless.mdx

+10-14
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ categories:
1717
is_imported_content: 'false'
1818
---
1919

20-
# Transitioning from permissioned to permissionless proofs in OP Stack
20+
# Migrating to permissionless fault proofs on OP Stack
2121

2222
This guide provides a high-level overview for chain operators looking to transition their OP Stack from permissioned to permissionless fault proofs. It's designed to be accessible for technical decision makers while providing sufficient detail for implementation teams.
2323

@@ -27,8 +27,8 @@ The OP Stack architecture uses fault proofs to ensure the validity of transactio
2727

2828
This migration involves several key components:
2929

30-
* Configuring security-critical dispute monitoring services
31-
* Deploying and configuring smart contracts using OP Chain Manager (OPCM)
30+
* Configuring security-critical dispute [monitoring services](/operators/chain-operators/tools/chain-monitoring)
31+
* Deploying and configuring smart contracts using [OPCM](/stack/opcm)
3232
* Testing the new system before activation
3333
* Switching the chain to use the new permissionless system
3434

@@ -37,20 +37,19 @@ This migration involves several key components:
3737
Before beginning this transition, your chain should:
3838

3939
* Be running a standard OP Stack implementation
40-
* Have a functioning permissioned proof system
41-
* Be operating with the recommended infrastructure components including `op-challenger` and `op-dispute-mon`
40+
* Be operating with the recommended infrastructure services including [`op-challenger`](/stack/fault-proofs/challenger) and [`op-dispute-mon`](/operators/chain-operators/tools/chain-monitoring#dispute-mon)
4241

4342
## 1. Configure the dispute monitoring stack
4443

4544
The `op-challenger` and `op-dispute-mon` services are critical security components that participate in the dispute game process to challenge invalid proposals.
4645

4746
### Upgrade to the latest `op-challenger`
4847

49-
Upgrade to version 1.3.2 or later, which contains important improvements to simplify the upgrade process.
48+
Upgrade to `version 1.3.3` or [later](https://github.com/ethereum-optimism/optimism/releases), which contains important improvements to simplify the upgrade process.
5049

5150
```bash
5251
# Example upgrade command (implementation may vary based on your deployment)
53-
git clone https://github.com/ethereum-optimism/optimism -b op-challenger/v1.3.2 --recurse-submodules
52+
git clone https://github.com/ethereum-optimism/optimism -b op-challenger/v1.3.3 --recurse-submodules
5453
cd optimism
5554
make op-challenger
5655
```
@@ -128,18 +127,15 @@ Unlike with permissioned games, the challenger will need to post bonds with each
128127

129128
### Set Up `op-dispute-mon`
130129

131-
Ensure `op-dispute-mon` is properly configured according to:
132-
133-
* [Optimism Documentation](/operators/chain-operators/tools/chain-monitoring#dispute-mon)
134-
* [GitHub Repository](https://github.com/ethereum-optimism/optimism/tree/develop/op-dispute-mon)
130+
Ensure `op-dispute-mon` is properly configured according to these [steps](/operators/chain-operators/tools/chain-monitoring#dispute-mon)
135131

136132
## 2. Deploy and configure smart contracts using OPCM
137133

138134
This section requires privileged actions by the `ProxyAdminOwner` and may involve the `Guardian` role depending on your security setup.
139135

140-
### Using OP Chain Manager (OPCM) for deployment
136+
### Using OPCM for deployment
141137

142-
The OP Chain Manager (OPCM) is the recommended tool for safely managing OP Stack upgrades:
138+
OPCM is the recommended tool for safely managing OP Stack upgrades:
143139

144140
```bash
145141
# Install OPCM
@@ -308,4 +304,4 @@ After completing all previous steps and verifying their successful operation:
308304

309305
Transitioning to permissionless proofs represents a significant security improvement for your OP Stack chain. This transition decentralizes the validation process, allowing any participant to challenge invalid state transitions rather than relying on a limited set of trusted validators.
310306

311-
By following this guide, you'll be able to safely configure and test your system before making the final switch to permissionless proofs. Remember to thoroughly test each component before proceeding to the next step, and ensure that your security monitoring is properly configured to track the health of the system after the transition.
307+
By following this guide, you'll be able to safely configure and test your system before making the final switch to permissionless proofs. Remember to thoroughly test each service before proceeding to the next step, and ensure that your security monitoring is properly configured to track the health of the system after the transition.

0 commit comments

Comments
 (0)