Deploying and Calling Ethereum Smart Contracts on Hyperledger Burrow

  • Deploy Smart Contracts on Hyperledger Burrow

    Execute the following steps to deploy and run smart contract:

    1. Define the Burrow deploy configuration file for the Solidity contract. The deploy file for the BasicContract.sol sample contract is the basiccontractdeploy.yaml file. It specifies the job as deploy and the Solidity contract file as follows:

    jobs:

    name: BasicContract deploy:

     

    contract: BasicContract.sol

    2. Deploy the Solidity contract. After both the BasicContract.sol contract file and the basiccontractdeploy.yaml deploy file are written, the contract can be deployed to the Burrow validator with the burrow deploy command:

    burrow deploy –address=54EF1517D97E7A653D5FA5B05060A82A8856515D -f basiccontractdeploy.yaml

    The output should be as follows:

    ubuntu@ip-172-31-90-67:~/burrow/example/basic$ burrow deploy — address=54EF1517D97E7A653D5FA5B05060A82A8856515D -f basiccontractdeploy.yaml

    *****Executing Job***

    Job Name => defaultAddr

    *****Executing Job***

    Job Name => BasicContract

    Deploying Contract name => BasicContract

    addr => 5486CD7F1453396A1C9E4B24CC07AA507C4CD88A

    Saving Binary =>

    /home/ubuntu/burrow/example/basic/bin/BasicContract.bin

    Writing [basiccontractdeploy.output.json] to current directory

    The deployed contract address is in the preceding output. For our contract, it’s 5486CD7F1453396A1C9E4B24CC07AA507C4CD88A, which will be used when calling this contract.

    3. Call the contract. To call the deposit function in the sample contract, specify the Burrow deploy configure file, basiccontractdeposit.yaml, as follows:

    jobs:

    name: deposit call:

     

    destination: 5486CD7F1453396A1C9E4B24CC07AA507C4CD88A

    function: deposit data:

    1000

     

    4. Run the Burrow CLI command:

    burrow deploy –address=54EF1517D97E7A653D5FA5B05060A82A8856515D -f basiccontractdeposit.yaml

    5. To call the withdraw function in the sample contract, specify the Burrow deploy configure file, basiccontractwithdraw.yaml, as follows:

    jobs:

    name: withdraw call:

     

    destination: 5486CD7F1453396A1C9E4B24CC07AA507C4CD88A

    function: withdraw data:

    200

    6. Run the Burrow CLI command:

    burrow deploy –address=54EF1517D97E7A653D5FA5B05060A82A8856515D -f basiccontractwithdraw.yaml

    7. To call the getBalance function in the sample contract, specify the Burrow deploy configure file, as follows:

    jobs:

    name: getBalance query-contract: 

    destination: 5486CD7F1453396A1C9E4B24CC07AA507C4CD88A

    function: getBalance

    name: getAddress query-contract: 

    destination: 5486CD7F1453396A1C9E4B24CC07AA507C4CD88A

    function: getAddress

    8. Run the Burrow CLI command:

    burrow deploy –address=54EF1517D97E7A653D5FA5B05060A82A8856515D -f basiccontractquery.yaml

    The output for the query should look as follows:

    ubuntu@ip-172-31-90-67:~/burrow/example/basic$ burrow deploy

    –address=54EF1517D97E7A653D5FA5B05060A82A8856515D -f

    basiccontractquery.yaml

    *****Executing Job***

    Job Name => defaultAddr

    *****Executing Job***

    Job Name => getBalance

    Return Value => 800

    *****Executing Job***

    Job Name => getAddress

    Return Value => 54EF1517D97E7A653D5FA5B05060A82A8856515D Writing [basiccontractquery.output.json] to current directory

  • Related:

    • No Related Posts

    Hyperledger Welcomes Eight New Members Including Giants Like Microsoft and Salesforce

    This is the default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems. It is based on the equivalent page on Debian, from which the Ubuntu Apache packaging is derived. If you can read this page, it means that the Apache HTTP server installed at this site is working properly. You should replace this file (located at /var/www/html/index.html) before continuing to operate your HTTP server.

    If you are a normal user of this web site and don’t know what this page is about, this probably means that the site is currently unavailable due to maintenance. If the problem persists, please contact the site’s administrator.

    Related:

    • No Related Posts

    Microsoft Windows Security Updates June 2019 overview

    Microsoft released security updates for all supported versions of the Microsoft Windows operating system on the June 11, 2019 Patch Day.

    Our overview of the June 2019 Patch Tuesday provides with you information about security and non-security updates that Microsoft released on this day.

    The overview includes an executive summary, statistics, links to all updates, the list of known issues sorted by operating system, download links, and more.

    Microsoft released the May 2019 Update for Windows 10 recently but it is available to users who seek for updates manually only at the time and only if the system is compatible.

    You can check out the May 2019 Update overview here in case you missed it.

    Microsoft Windows Security Updates June 2019

    The following Excel spreadsheet lists security update information for June 2019. Click on the following link to download it to your system: Microsoft Windows Security Updates June 2019 Overview

    Executive Summary

    • Microsoft released security updates for all supported versions of the Windows operating system in June 2019.
    • All client and server versions have critically rated vulnerabilities patched.
    • Microsoft released security updates for other products such as Internet Explorer, Microsoft Edge, Microsoft Office, Azure, Microsoft Exchange Server, and Skype.

    Operating System Distribution

    • Windows 7: 42 vulnerabilities of which 3 are rated critical and 39 are rated important
      • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
      • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability
      • CVE-2019-0985 | Microsoft Speech API Remote Code Execution Vulnerability
    • Windows 8.1: 35 vulnerabilities of which 3 are rated critical and 32 are rated important
      • same as 1903
    • Windows 10 version 1703: 41 vulnerabilities of which 4 is critical and 37 are important
      • same as 1709
    • Windows 10 version 1709: 43 vulnerabilities of which 4 is critical and 39 are important
      • CVE-2019-0709 | Windows Hyper-V Remote Code Execution Vulnerability
      • same as 1903
    • Windows 10 version 1803: 45 vulnerabilities of which 3 are critical and 43 are important
      • same as 1903
    • Windows 10 version 1809: 47 vulnerabilities of which 3 are critical and 44 are important
      • same as 1903
    • Windows 10 version 1903: 42 vulnerabilities of which 3 are critical and 39 are important.
      • CVE-2019-0620 | Windows Hyper-V Remote Code Execution Vulnerability
      • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
      • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability

    Windows Server products

    • Windows Server 2008 R2: 42 vulnerabilities: 3 are critical and 39 are important.
      • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
      • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability
      • CVE-2019-0985 | Microsoft Speech API Remote Code Execution Vulnerability
    • Windows Server 2012 R2: 34 vulnerabilities: 3 are critical and 31 are important.
      • Same as Server 2019
    • Windows Server 2016: 39 vulnerabilities: 4 are critical and 35 are important
      • CVE-2019-0709 | Windows Hyper-V Remote Code Execution Vulnerability
      • Same as Server 2019
    • Windows Server 2019: 47 vulnerabilities: 3 are critical and 44 are important.
      • CVE-2019-0620 | Windows Hyper-V Remote Code Execution Vulnerability
      • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
      • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability

    Other Microsoft Products

    • Internet Explorer 11: 7 vulnerability, 5 critical, 2 important
      • CVE-2019-1080 | Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-1055 | Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-1038 | Microsoft Browser Memory Corruption Vulnerability
      • CVE-2019-0988 | Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-0920 | Scripting Engine Memory Corruption Vulnerability
    • Microsoft Edge: 14 vulnerabilities, 12 critical, 2 important
      • CVE-2019-0989 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-0990 | Scripting Engine Information Disclosure Vulnerability
      • CVE-2019-0991 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-0992 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-0993 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-1002 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-1003 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-1023 | Scripting Engine Information Disclosure Vulnerability
      • CVE-2019-1024 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-1038 | Microsoft Browser Memory Corruption Vulnerability
      • CVE-2019-1051 | Chakra Scripting Engine Memory Corruption Vulnerability
      • CVE-2019-1052 | Chakra Scripting Engine Memory Corruption Vulnerability

    Windows Security Updates

    Windows 7 SP1 and Server 2008 R2

    KB4503292 — Monthly Rollup

    • Fixed a HTTP and HTTPS string character limit issue in Internet Explorer.
    • Security updates

    KB4503269 — Security-only Update

    • Security updates only

    Windows 8.1 and Server 2012 R2

    KB4503276 — Monthly Rollup

    • Patched a security vulnerability by “intentionally preventing connections between Windows and Bluetooth devices that are not secure and use well-known keys to encrypt connections”.
    • Fixed the Preboot Execution Environment known issue.
    • Fixed a HTTP and HTTPS string character limit issue in Internet Explorer.
    • Security updates.

    KB4503290 — Security-only Rollup

    • Same as KB4503276 with the exception of the IE string character limit issue.

    Windows 10 version Windows 10 version 1709

    KB4503284

    • Fixed Bluetooth vulnerability.
    • Fixed an IE11 issue that could prevent IE from opening if no or a malformed search provider was set as the default.
    • security updates

    Windows 10 version 1803

    • Fixed the Preboot Execution Environment issue.
    • Same as 1709

    Windows 10 version 1809

    • Fixed a Windows Mixed Reality keyboard rendering issue.
    • Fixed a Bluetooth vulnerability.
    • Fixed the Preboot environment issue.
    • Updated Broadcom Wi-Fi firmware to Microsoft HoloLens.
    • Fixed the IE11 default search provider issue.
    • Security updates

    Windows 10 version 1903

    • Fixed Bluetooth vulnerability.
    • Security updates.

    Other security updates

    KB4503259 — Cumulative security update for Internet Explorer: June 11, 2019

    KB4474419 — SHA-2 code signing support update for Windows Server 2008 R2, Windows 7, and Windows Server 2008: March 12, 2019

    KB4503285 — Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012

    KB4503287 — Security Only Quality Update for Windows Server 2008

    KB4503308 — Security update for Adobe Flash Player

    KB4503267 — Cumulative Update for Windows 10 Version 1607 and Windows Server Version 1607

    KB4503291 — Cumulative Update for Windows 10 Version 1507

    KB4503537 — Servicing Stack Update for Windows 10 Version 1607, and Windows Server 2016

    KB4504369 — Servicing Stack Update for Windows 10 Version 1809, and Windows Server 2019

    Known Issues

    Windows 7 SP1 and Server 2008 R2

    1. Issue with McAfee Enterprise products that may cause the system to have slow startups or become unresponsive.
    2. Internet Explorer 11 may stop working when “loading or interacting with Power BI reports”.
      • Workaround: republish with Markers turned off.

    Windows 8.1 and Server 2012 R2

    1. Same as Windows 7 SP1 and Server 2008 R2
    2. Certain operations on Cluster Shared Volumes still fail. Workaround is still valid.

    Windows 10 version 1709, 1803

    1. Certain operations on Cluster Shared Volumes still fail. Workaround is still valid.

    Windows 10 version 1809

    1. Certain operations on Cluster Shared Volumes still fail. Workaround is still valid.
    2. A printing issue in Microsoft Edge and other UWP apps that throws “Your printer has experienced an unexpected configuration problem. 0x80070007e.” errors.
      • Workaround: use another browser to print.
    3. Error “0x800f0982 – PSFX_E_MATCHING_COMPONENT_NOT_FOUND”after installing KB4493509 on devices with certain Asian languages.

    Windows 10 version 1903

    1. Windows Sandbox may fail to start with ERROR_FILE_NOT_FOUND (0x80070002)

    Security advisories and updates

    ADV190015 | June 2019 Adobe Flash Security Update

    ADV190016 | Bluetooth Low Energy Advisory

    ADV990001 | Latest Servicing Stack Updates

    Non-security related updates

    KB4497935 for Windows 10 version 1903 and Windows Server 1903

    KB4497934 for Windows 10 version 1809 and Windows Server 2019

    KB4505056 for Windows 10 version 1809 and Windows Server 2019

    KB4499183 for Windows 10 version 1803

    KB4505064 for Windows 10 version 1803

    KB4499147 for Windows 10 version 1709

    KB4505062 for Windows 10 version 1709

    KB4499162 for Windows 10 version 1703

    KB4505055 for Windows 10 version 1703

    KB4499177 for Windows 10 version 1607 and Windows Server 2016

    KB4505052 for Windows 10 version 1607 and Windows Server 2016

    KB4503539 — Dynamic Update for Windows 10 Version 1803

    KB4494454 — Update for Windows 10

    KB4501226 — Update for POSReady 2009

    KB890830 — Windows Malicious Software Removal Tool – June 2019

    Microsoft Office Updates

    You find Office update information here.

    How to download and install the June 2019 security updates

    windows security updates june 2019

    All Windows client systems are configured to download and install security updates automatically shortly after release. It is possible to run manual checks for updates to install these as early as possible.

    We suggest that backups are created before any updates are installed as updates may introduce issues of their own or in worst case, break the system.

    You can run a manual check for updates in the following way:

    1. Tap on the Windows-key, type Windows Update, and select the result.
    2. A click on “check for updates” runs a manual check. Updates may be installed automatically or on user request depending on system settings.

    Direct update downloads

    Windows 7 SP1 and Windows Server 2008 R2 SP

    • KB4503292 — 2019-06 Security Monthly Quality Rollup for Windows 7
    • KB4503269 — 2019-06 Security Only Quality Update for Windows 7

    Windows 8.1 and Windows Server 2012 R2

    • KB4503276 — 2019-06 Security Monthly Quality Rollup for Windows 8.1
    • KB4503290 — 2019-06 Security Only Quality Update for Windows 8.1

    Windows 10 (version 1709)

    • KB4503279 — 2019-06 Cumulative Update for Windows 10 Version 1709

    Windows 10 (version 1803)

    • KB4503286 — 2019-06 Cumulative Update for Windows 10 Version 1803

    Windows 10 (version 1809)

    • KB4503327 — 2019-06 Cumulative Update for Windows 10 Version 1809

    Windows 10 (version 1903)

    • KB4503293 — 2019-06 Cumulative Update for Windows 10 Version 1903

    Additional resources

    Summary
    Article Name
    Microsoft Windows Security Updates June 2019 overview
    Description
    Detailed overview of the Microsoft June 2019 Patch Day covering Windows security and non-security updates, advisories, known issues, and more.
    Author
    Martin Brinkmann
    Publisher
    Ghacks Technology News
    Logo
    Ghacks Technology News
    Advertisement

    Related:

    • No Related Posts

    Retail Giant Target Secretly Sneaks Into the Blockchain Space

    This is the default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems. It is based on the equivalent page on Debian, from which the Ubuntu Apache packaging is derived. If you can read this page, it means that the Apache HTTP server installed at this site is working properly. You should replace this file (located at /var/www/html/index.html) before continuing to operate your HTTP server.

    If you are a normal user of this web site and don’t know what this page is about, this probably means that the site is currently unavailable due to maintenance. If the problem persists, please contact the site’s administrator.

    Related:

    • No Related Posts

    Inactive Computers won’t become Active

    I need a solution

    Hi Everyone,

    I have nearly 200 machines inside of my Ghost console. For some reason over the last few weeks maybe…10 of them, actually show as active. The rest are greyed out; however, they do come alive if and only if a user is signed into the computer. But, even that doesn’t seem to be universal as there are a few that show inactive no matter what I do.

    I’ve read that sometimes there can be issues with Dagent if the “encrypt sessions” options are enabled, but I’ve checked and that option is turned off both in Dagent on the clients and inside the “Configuation” window of the Ghost console.

    I checked the settings of the Dagent service and it’s set for automatic and to log on as a Local Systems Account.

    This did start roughly after I had to reinstall Windows, but it was a fresh installation of everything including GSS and Windows 10.

    If it helps I’m running GSS 3.2 on Windows 10 v1809 (I’m aware that Ghost prefers a server OS, but it’s always been successful on W10).

    My company has the licenses for GSS 3.3, but I’ve held off updating since we’re close to renewal and I don’t want to deal with Symantec’s convoluted licensing process any more than I have to. However, is it possible that this is some kind of compatibility issue I’m looking at? At the moment I’m at a complete loss to explain this, much less fix it.

    I appreciate any helpful suggestions you can offer!

    Thanks,

    –Frank

    0

    Related:

    • No Related Posts

    Uninstalling software CMS didn’t install

    I need a solution

    I’ve never had to do this before, can someone point me to an article or discussion about removing software from windows 10 PCs that symantec didn’t install?

    Windows is installing a “Dell Pointstick” piece of software I don’t want on my machines.  It’s not part of the drivers I deploy, and I have GPO set to not allow windows to install drivers, but this may be coming down before the computer gets the GPO.  In any case, it is breaking scrolling on our new Dell 5400 Latitude laptop touchpads.

    Thanks!

    0

    Related:

    • No Related Posts

    Salesforce Launches Debut Blockchain Product for Business

    This is the default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems. It is based on the equivalent page on Debian, from which the Ubuntu Apache packaging is derived. If you can read this page, it means that the Apache HTTP server installed at this site is working properly. You should replace this file (located at /var/www/html/index.html) before continuing to operate your HTTP server.

    If you are a normal user of this web site and don’t know what this page is about, this probably means that the site is currently unavailable due to maintenance. If the problem persists, please contact the site’s administrator.

    Related:

    • No Related Posts

    Bosch is All About to Implement Ethereum Blockchain for Its New Products

    This is the default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems. It is based on the equivalent page on Debian, from which the Ubuntu Apache packaging is derived. If you can read this page, it means that the Apache HTTP server installed at this site is working properly. You should replace this file (located at /var/www/html/index.html) before continuing to operate your HTTP server.

    If you are a normal user of this web site and don’t know what this page is about, this probably means that the site is currently unavailable due to maintenance. If the problem persists, please contact the site’s administrator.

    Related:

    • No Related Posts