You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/operators/chain-operators/tutorials/migrating-permissionless.mdx
+10-14
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ categories:
17
17
is_imported_content: 'false'
18
18
---
19
19
20
-
# Transitioning from permissioned to permissionless proofs in OP Stack
20
+
# Migrating to permissionless fault proofs on OP Stack
21
21
22
22
This guide provides a high-level overview for chain operators looking to transition their OP Stack from permissioned to permissionless fault proofs. It's designed to be accessible for technical decision makers while providing sufficient detail for implementation teams.
23
23
@@ -27,8 +27,8 @@ The OP Stack architecture uses fault proofs to ensure the validity of transactio
* Deploying and configuring smart contracts using [OPCM](/stack/opcm)
32
32
* Testing the new system before activation
33
33
* Switching the chain to use the new permissionless system
34
34
@@ -37,20 +37,19 @@ This migration involves several key components:
37
37
Before beginning this transition, your chain should:
38
38
39
39
* Be running a standard OP Stack implementation
40
-
* Have a functioning permissioned proof system
41
-
* Be operating with the recommended infrastructure components including `op-challenger` and `op-dispute-mon`
40
+
* Be operating with the recommended infrastructure services including [`op-challenger`](/stack/fault-proofs/challenger) and [`op-dispute-mon`](/operators/chain-operators/tools/chain-monitoring#dispute-mon)
42
41
43
42
## 1. Configure the dispute monitoring stack
44
43
45
44
The `op-challenger` and `op-dispute-mon` services are critical security components that participate in the dispute game process to challenge invalid proposals.
46
45
47
46
### Upgrade to the latest `op-challenger`
48
47
49
-
Upgrade to version 1.3.2 or later, which contains important improvements to simplify the upgrade process.
48
+
Upgrade to `version 1.3.3` or [later](https://github.com/ethereum-optimism/optimism/releases), which contains important improvements to simplify the upgrade process.
50
49
51
50
```bash
52
51
# Example upgrade command (implementation may vary based on your deployment)
Ensure `op-dispute-mon` is properly configured according to these [steps](/operators/chain-operators/tools/chain-monitoring#dispute-mon)
135
131
136
132
## 2. Deploy and configure smart contracts using OPCM
137
133
138
134
This section requires privileged actions by the `ProxyAdminOwner` and may involve the `Guardian` role depending on your security setup.
139
135
140
-
### Using OP Chain Manager (OPCM) for deployment
136
+
### Using OPCM for deployment
141
137
142
-
The OP Chain Manager (OPCM) is the recommended tool for safely managing OP Stack upgrades:
138
+
OPCM is the recommended tool for safely managing OP Stack upgrades:
143
139
144
140
```bash
145
141
# Install OPCM
@@ -308,4 +304,4 @@ After completing all previous steps and verifying their successful operation:
308
304
309
305
Transitioning to permissionless proofs represents a significant security improvement for your OP Stack chain. This transition decentralizes the validation process, allowing any participant to challenge invalid state transitions rather than relying on a limited set of trusted validators.
310
306
311
-
By following this guide, you'll be able to safely configure and test your system before making the final switch to permissionless proofs. Remember to thoroughly test each component before proceeding to the next step, and ensure that your security monitoring is properly configured to track the health of the system after the transition.
307
+
By following this guide, you'll be able to safely configure and test your system before making the final switch to permissionless proofs. Remember to thoroughly test each service before proceeding to the next step, and ensure that your security monitoring is properly configured to track the health of the system after the transition.
0 commit comments