1.
Introduction
2.
Quickstart
2.1.
Getting Started
2.1.1.
Prerequisites
2.1.2.
Building
2.2.
Running
2.2.1.
Forwarder/logger Proxy
2.2.2.
Scenarios
3.
Architecture
3.1.
MITM Proxy
3.2.
Modularity
4.
Configuration
4.1.
Command Line Options
4.2.
Configuration File
4.2.1.
chain
4.2.2.
proxies
4.2.3.
data_dir
4.2.4.
logs_dir
4.2.5.
timeout
4.2.6.
libfaketime
4.2.7.
rpc_proxy
4.2.8.
delegate_selection
4.2.9.
committee
4.2.10.
quorum
4.2.11.
node_binary
4.2.12.
client_binary
4.2.13.
baker_binary
4.2.14.
accuser_binary
5.
Scenarios
5.1.
Scenario Language
5.1.1.
Variables and Constants
5.1.2.
Elementary Steps
5.1.2.1.
Proposal
5.1.2.2.
Preendorsement
5.1.2.3.
Endorsement
5.1.3.
Step Combinators
5.1.3.1.
Conjunction
5.1.3.2.
Disjunction
5.1.3.3.
Negation
5.1.3.4.
Sequence
5.1.3.5.
Loop
5.2.
Structure of a Scenario
5.2.1.
nodes
5.2.2.
parameters
5.2.2.1.
delegate_selection
5.2.2.2.
committee
5.2.2.3.
quorum
5.2.2.4.
round_durations
5.2.2.5.
constraints
5.2.2.6.
code
5.2.2.7.
timeout
5.3.
Running a Scenario
5.3.1.
Writing Scenario Files
5.3.2.
Compiling a Scenario File
5.4.
Constraints
5.4.1.
Grammar of Constraints
5.4.2.
Syntax
5.5.
The Mockup Engine
5.6.
Assertions
5.6.1.
Pre- and Post-conditions
5.6.2.
Assertions Language
5.6.2.1.
Code Execution
5.6.2.2.
Checks
5.6.2.3.
Asynchronous Checks
5.6.3.
Invariants
5.6.4.
Execution Reports
6.
Tutorial
Light
Rust
Coal
Navy
Ayu
Mitten - MITM proxy for the Tezos P2P network.
code
This is the actual
code
that should be executed by the scenario.