1. 1. Introduction
  2. 2. Quickstart
    1. 2.1. Getting Started
      1. 2.1.1. Prerequisites
      2. 2.1.2. Building
    2. 2.2. Running
      1. 2.2.1. Forwarder/logger Proxy
      2. 2.2.2. Scenarios
  3. 3. Architecture
    1. 3.1. MITM Proxy
    2. 3.2. Modularity
  4. 4. Configuration
    1. 4.1. Command Line Options
    2. 4.2. Configuration File
      1. 4.2.1. chain
      2. 4.2.2. proxies
      3. 4.2.3. data_dir
      4. 4.2.4. logs_dir
      5. 4.2.5. timeout
      6. 4.2.6. libfaketime
      7. 4.2.7. rpc_proxy
      8. 4.2.8. delegate_selection
      9. 4.2.9. committee
      10. 4.2.10. quorum
      11. 4.2.11. node_binary
      12. 4.2.12. client_binary
      13. 4.2.13. baker_binary
      14. 4.2.14. accuser_binary
  5. 5. Scenarios
    1. 5.1. Scenario Language
      1. 5.1.1. Variables and Constants
      2. 5.1.2. Elementary Steps
        1. 5.1.2.1. Proposal
        2. 5.1.2.2. Preendorsement
        3. 5.1.2.3. Endorsement
      3. 5.1.3. Step Combinators
        1. 5.1.3.1. Conjunction
        2. 5.1.3.2. Disjunction
        3. 5.1.3.3. Negation
        4. 5.1.3.4. Sequence
        5. 5.1.3.5. Loop
    2. 5.2. Structure of a Scenario
      1. 5.2.1. nodes
      2. 5.2.2. parameters
        1. 5.2.2.1. delegate_selection
        2. 5.2.2.2. committee
        3. 5.2.2.3. quorum
        4. 5.2.2.4. round_durations
        5. 5.2.2.5. constraints
        6. 5.2.2.6. code
        7. 5.2.2.7. timeout
    3. 5.3. Running a Scenario
      1. 5.3.1. Writing Scenario Files
      2. 5.3.2. Compiling a Scenario File
    4. 5.4. Constraints
      1. 5.4.1. Grammar of Constraints
      2. 5.4.2. Syntax
    5. 5.5. The Mockup Engine
    6. 5.6. Assertions
      1. 5.6.1. Pre- and Post-conditions
      2. 5.6.2. Assertions Language
        1. 5.6.2.1. Code Execution
        2. 5.6.2.2. Checks
        3. 5.6.2.3. Asynchronous Checks
      3. 5.6.3. Invariants
      4. 5.6.4. Execution Reports
  6. 6. Tutorial

Mitten - MITM proxy for the Tezos P2P network.

Invariants