1.
Introduction
2.
Quickstart
2.1.
Getting Started
2.1.1.
Prerequisites
2.1.2.
Building
2.2.
Running
2.2.1.
Forwarder/logger Proxy
2.2.2.
Scenarios
3.
Architecture
3.1.
MITM Proxy
3.2.
Modularity
4.
Configuration
4.1.
Command Line Options
4.2.
Configuration File
4.2.1.
chain
4.2.2.
proxies
4.2.3.
data_dir
4.2.4.
logs_dir
4.2.5.
timeout
4.2.6.
libfaketime
4.2.7.
rpc_proxy
4.2.8.
delegate_selection
4.2.9.
committee
4.2.10.
quorum
4.2.11.
node_binary
4.2.12.
client_binary
4.2.13.
baker_binary
4.2.14.
accuser_binary
5.
Scenarios
5.1.
Scenario Language
5.1.1.
Variables and Constants
5.1.2.
Elementary Steps
5.1.2.1.
Proposal
5.1.2.2.
Preendorsement
5.1.2.3.
Endorsement
5.1.3.
Step Combinators
5.1.3.1.
Conjunction
5.1.3.2.
Disjunction
5.1.3.3.
Negation
5.1.3.4.
Sequence
5.1.3.5.
Loop
5.2.
Structure of a Scenario
5.2.1.
nodes
5.2.2.
parameters
5.2.2.1.
delegate_selection
5.2.2.2.
committee
5.2.2.3.
quorum
5.2.2.4.
round_durations
5.2.2.5.
constraints
5.2.2.6.
code
5.2.2.7.
timeout
5.3.
Running a Scenario
5.3.1.
Writing Scenario Files
5.3.2.
Compiling a Scenario File
5.4.
Constraints
5.4.1.
Grammar of Constraints
5.4.2.
Syntax
5.5.
The Mockup Engine
5.6.
Assertions
5.6.1.
Pre- and Post-conditions
5.6.2.
Assertions Language
5.6.2.1.
Code Execution
5.6.2.2.
Checks
5.6.2.3.
Asynchronous Checks
5.6.3.
Invariants
5.6.4.
Execution Reports
6.
Tutorial
Light
Rust
Coal
Navy
Ayu
Mitten - MITM proxy for the Tezos P2P network.
Getting Started