build Configtxgen
Similar to the previous 1.1, we can generate the Configtxgen program with the Make command:
CD ~/go/src/github.com/hyperledger/fabric make
Configtxgen
The result after the run is:
Build/bin/configtxgen
cgo_cflags= "" Gobin=/home/studyzy/go/src/github.com/hyperledger/fabric/build/bin go Install-tags "NOPKCS11"-ldflags "-X github.com/hyperledger/fabric/common/configtx/tool/configtxgen/metadata. version=1.0.0 "Github.com/hyperledger/fabric/common/configtx/tool/configtxgen
Bi
-artifacts/org1mspanchors.tx-channelid $ Channel_name-asorg Org1msp
Configtxgen-profile twoorgschannel-outputanchorpeersupdate./channel-artifacts/org2mspanchors.tx-channelid $ Channel_name-asorg Org2msp
(generates two anchor peer anchor peers)
6: The preparation work is done, you can start the network. Because we need to use COUCHDB .
So execute: channel_name= $CHANNEL _name timeout=1000 docker-compose-f docker-compose-cli.yaml-f Docker-compose-couch.yaml Up-d
7: Setting the Manual environment:
The inner joins only select records that match each other in two tables. So, this leads to sometimes the records we need are not included.
For a better understanding of this concept, we introduce two tables for demonstration. The party table and the Parliamentarians (MSP) of the Scottish Parliament.
Party (Code,name,leader)Code: Party CodesName: Party namesLeader: Party leader
MSP (Name,party,constituency)N
that I don't know how to handle it. After collecting a large amount of information, we found that Silverlight must be installed as an administrator. The method that comes to mind later is domain distribution, while the Silverlight installation package is a compressed package exe program, which cannot be identified during domain distribution.
The Silverlight. MSI and Silverlight. MSP (Windows Install patches) are found to be decompressed. In fact, the
In the previous section we introduced the table connection, or rather the inner joins inner join.
The inner joins only select records that match each other in two tables. So, this leads to sometimes the records we need are not included.
For a better understanding of this concept, we introduce two tables for demonstration. The party table and the Parliamentarians (MSP) of the Scottish Parliament.
Party (Code,name,leader)Code: Party CodesName: Party
I wrote an SP helper class.Although the writing is a bit verbose, but also their own results. As follows:Package Com.yqy.yqy_testsputil;import Android.annotation.suppresslint;import Android.app.activity;import Android.content.context;import android.content.sharedpreferences;/** * SP Helper class * @author YQY * * */@SuppressLint (" Commitprefedits ") public class Sputil {private static sharedpreferences msp;private static String spname =" Yqy_testsput
\local\temp\microsoft Visual Studio sp1\vc_ia64runtime.exe-exe installer ' s log file/ Hint (%temp%\dd_vc_ia64runtime*.txt|%temp%\. \dd_vc_ia64runtime*.txt) does not exist or is invalid.Exe (C:\users\admini~1\appdata\local\temp\microsoft Visual Studio Sp1\vc_ia64runtime.exe) succeeded.Patch (C:\users\admini~1\appdata\local\temp\microsoft Visual Studio sp1\webdesignercore_kb950278.msp) Install Succeeded on product (Microsoft Office Visual Web Developer
$PWD/creds/* ~/.hfc-key-store/# Enter the Basic-network directory, open the Blockchain network, create the channel, and add the nodes in./start.sh
Let's take a look at what has been done in this start.sh.
Set-ev#先停掉之前启动的网络Docker-compose-f docker-compose.yml DownDocker-compose-f docker-compose.yml up-d ca.example.com orderer.example.com peer0.org1.example.com couchdb
Through Docker, the network of blockchain is started, and the topology of the network is as follows:
The next step is to ins
function validates the received Signedprop data using Validateproposalmessage, and returns the data after Unmarshal of some fields in Signedprop. This function is still relatively round, and write here is not too logical, because it involves data validation, so at least to know what data received or what kind of data is legitimate, you can verify, and this involves the client operation, we have not mentioned. You can look at this in the future when it comes to client-related operations.
The val
CORE_LEDGER_STATE_COUCHDBCONFIG_USERNAME and CORE_LEDGER_STATE_COUCHDBCONFIG_PASSWORD
# provide the credentials for ledger to connect to CouchDB. The username and password must
# match the username and password set for the associated CouchDB.
- CORE_LEDGER_STATE_COUCHDBCONFIG_USERNAME=
- CORE_LEDGER_STATE_COUCHDBCONFIG_PASSWORD=
depends_on:
- couchdb0 Modified: Fabric-samples/chaincode-docker-devmode/docker-compose-simple.yaml in the peer module Before modific
First, we will talk about wiring. To trigger events on CTS and other pins, a high level must be applied to the CTS and other pins. The source of the high level can come from the fourth foot, and the fourth foot must be set to a high level in the software.
C # Some code is as follows:
MSP. portName = "COM1"; mSP. baudRate = 9600; mSP. dtrEnable = true; // This i
hyperledger/fabric-peer "PE ER node start "seconds ago up seconds 0.0.0.0:9051->7051/tcp, 0.0.0.0:9053->7053/tcp peer0.or g2.example.com e2a14716ff5b hyperledger/fabric-orderer "orderer" seconds ago up seconds 0.0.0.0:7050->7050/TCP orderer.example.com b88215b96968 Hyperledger/fabric-peer "Peer node start" 4 6 seconds ago up seconds 0.0.0.0:7051->7051/tcp, 0.0.0.0:7053->7053/tcp peer0.org1.example.com
Enter CLI container
Docker exec-it CLI Bash
Execution results:
Set the ORG1 PEER0 en
technologies used by fabric are defined in/fabric/bccsp/opts.go, such as ECDSA support for several types of ecdsap256,ecdsap384. BCCSP Service Structure
BCCSP , which is the abbreviation for Blockchain cryptographic service provider , personal translation area chain Cryptographic service provider The , which provides a variety of encryption techniques for fabric projects, signature technology, and the nature of the tools, are used in the MSP Serv
\ Internet logs
Even for general applications, the files in this directory can be hundreds of MB a year later, if not 2 GB. Fortunately, there is nothing special about it. Just delete it all. If it cannot be deleted, unlocker will keep up with it. (I often do this. It's okay)
2. x: \ windows \ Fonts
Among them, 90% of the English fonts are not used once in most people's lives. There are several kinds of styles to keep. Let's just over the others. (Develop good habits without frequent visits)
3.
to function Vportsetuptimerinterrupt () sets the Systick timer interrupt period and enables the timer to run this function is relatively simple, is to set the corresponding register Systick hardware.Then there is a key function that is Prvstartfirsttask(), which is used to start the first task. Let's look at the source code first:__asm void Prvstartfirsttask (void) { PRESERVE8/ * CORTEXT-M3 hardware, 0xe000ed08 address at vtor (vector table offset) register, storage vector table start Ad
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.